-
Notifications
You must be signed in to change notification settings - Fork 254
Configuring Target Group to Forward 443 to 80 #693
Comments
An initial implementation did supported port forwarding as If your service only expose port 80, why does your compose file declare port 443? About HTTPS termination managed by AWS LoadBalancer and forwarded to services as HTTP:80 this is indeed a relevant use-case. Maybe we should introduce a custom extension for this purpose, which would look like: webserver:
image: nginx
x-aws-pull_credentials: "xxxxx"
ports:
- target 80
published: 80
x-aws-ssl-certificate: ./myserver.crt |
Thanks for responding! What would you think about, as another option besides the |
I'd very much like to be able to terminate SSL at the load balancer and then forward over http to the ECS cluster. Even better would be to allow the SSL certificate to be specified as a URN for an AWS SSL cert, e.g.
As an example -> so connections to the load balancer on port 443 are terminated there and forwarded to port 80 on the container? |
Ability to tweak the CloudFormation template to patch Listener configuration and associate a certificate has been released, see https://deploy-preview-12080--docsdocker.netlify.app//cloud/ecs-integration/#setting-ssl-termination-by-load-balancer |
My initial
docker-compose.yml
file contained an entry for an nginx task, e.g.This causes an additional target group to be created checking the health on port 443. Since I have not configured nginx to accept connections on port 443, nor an installed cert, the health checks of course fail.
What I instead want to do is configure the load balancer to forward connections to port 443 to port 80, which I believe is best practice.
Is there a way to specify this in the
docker-compose.yml
file, or is this currently a manual change I would need to make either directly or using the cloudformation template?The text was updated successfully, but these errors were encountered: