latest--environment
shared| Type | object |
|---|---|
| Schema URL | https://catalog.lintel.tools/schemas/schemastore/aws-copilot-manifest/_shared/latest--environment.json |
| Parent schema | aws-copilot-manifest |
Environment manifest for AWS Copilot https://aws.github.io/copilot-cli/docs/manifest/environment/
Properties
The name of your environment.
Must be set to 'Environment'.
The network section contains parameters for importing an existing VPC or configuring the Copilot-generated VPC.
1 nested properties
The vpc section contains parameters to configure CIDR settings and subnets.
5 nested properties
The ID of the VPC to import. This field is mutually exclusive with cidr.
An IPv4 CIDR block to associate with the Copilot-generated VPC. This field is mutually exclusive with id.
Configure public and private subnets in a VPC.
2 nested properties
A list of public subnets configuration.
A list of private subnets configuration.
Rules for the environment's security group.
2 nested properties
A list of inbound security group rules.
A list of outbound security group rules.
If you specify 'true', Copilot will enable VPC flow logs to capture information about the IP traffic going in and out of the environment VPC. The default value for VPC flow logs is 14 days (2 weeks).
The cdn section contains parameters related to integrating your service with a CloudFront distribution. To enable the CloudFront distribution, specify cdn: true.
The http section contains parameters to configure the public load balancer shared by Load Balanced Web Services and the internal load balancer shared by Backend Services.
2 nested properties
Configuration for the public load balancer.
4 nested properties
List of public AWS Certificate Manager certificate ARNs. By attaching public certificates to your load balancer, you can associate your Load Balanced Web Services with a domain name and reach them with HTTPS.
Enable Elastic Load Balancing access logs. If you specify true, Copilot will create an S3 bucket where the Public Load Balancer will store access logs.
Optional. Specify an SSL policy for the HTTPS listener of your Public Load Balancer, when applicable.
Ingress rules to restrict the Public Load Balancer's traffic.
2 nested properties
Restrict ingress traffic for the public load balancer to come from a CloudFront distribution.
Restrict public load balancer ingress traffic to source IPs.
Configuration for the internal load balancer.
4 nested properties
List of AWS Certificate Manager certificate ARNs. By attaching public or private certificates to your load balancer, you can associate your Backend Services with a domain name and reach them with HTTPS.
The subnet IDs to place the internal load balancer in.
Ingress rules to allow for the internal load balancer.
1 nested properties
Enable traffic from within the VPC to the internal load balancer.
Optional. Specify an SSL policy for the HTTPS listener of your Internal Load Balancer, when applicable.
The observability section lets you configure ways to collect data about the services and jobs deployed in your environment.
1 nested properties
Whether to enable CloudWatch container insights in your environment's ECS cluster.