These are the input parameters for this template. All of these parameters must be supplied for this template to be deployed.
Email Address to be passed into the Ansible scripts for notifications.
SSH Key Pair to be used on the application EC2 instances for emergency administrative access.
Branch to pull down and run.
HostName to be used in tagging the EC2 instance.
SSH Key Pair to be used on the application EC2 instances for emergency administrative access.
VPCID is the ID of the VPC where this template will be deployed.
Zabbix Agent Parameters
The following tags are applied to all resources created by this template.
Metadata is mostly for organizing and presenting Parameters in a better way when using CloudFormation in the AWS Web UI.
This is the EC2 instance deployed by the template.
Deploys the EC2 instance with some tags.
Put config files and service-catalog in place.
Create the following files on the host
Config files for CloudWatch Logs Agent (awslogs)
Download and unpack the following archives
A CreationPolicy prevents this resource creation from completing until it receives the signal from cfn-signal.
Install basic packages
Install CloudWatch Logs Agnet
Kick off CloudFormation Init processing
Init setsup the config files for awslogs, so start that service now
Install Amazon SSM
Try to install Zabbix Agent
Install Ansible
Run Foundation Playbook if this isn't a Dry Run.
This shell script is create above in the metadata section of the Ec2Instance
Signal CloudFormation with the result of the playbook
Security group for the EC2 instance, that allows you to SSH into the instance
This is the IAM role that will be applied to the EC2 Instances. Again this policy is pretty broad, so be careful!
Output values that can be viewed from the AWS CloudFormation console.
Ansible Admin EC2 CloudFormation Deployment
This CloudFormation template will deploy a single EC2 instance with its own security group. That security group has Admin rights in this account, so be sure to remove this stack as soon as you are finished.