起動テンプレートの例については、Amazon EC2 スニペットの「AWS CloudFormation を使用した起動テンプレートの作成」、および「AWS::EC2::LaunchTemplateリソース」の「Examples」のセクションを参照してください。 "myASG":{"Type":"AWS::AutoSc
For examples of the assembly of aUserDataproperty in a AWS CloudFormation template, seeBase64 Encoded UserData PropertyandBase64 Encoded UserData Property with AccessKey and SecretKey. For an example of running commands on an instance within an Auto Scaling group that works with lifecycle hooks, see...
Deploy the AWS lambda function using the CloudWatchAutoAlarms.yaml CloudFormation template and the deployment package you uploaded to your S3 bucket. You will also need to enter the ARN for the SNS topic you created in step 3: aws cloudformation create-stack --stack-name amaz...
The CloudFormation template 2-YourAWSAccount_Configuration.yaml creates the IAM role SSMStartSession_IAM_Role_ThirdPartyA, with tags and associated permissions for the third party. Step 5a: To add mandatory tags To enforce the ABAC, this IAM role required as ...
There is a provided CloudFormation TemplateProvisioning/TestWorkloadInstances_CF.yamlavailable, that provisions 4 instances for you to test with. The instances are t2.nanos to minimize cost. Here is an example workload to get you quickly up to speed. The steps are very straight forward. Simply...
Here is the AWS CLI command to create an SQS queue to hold termination events from ASG and EC2, although this should really be configured via your favorite infrastructure-as-code tool like CloudFormation (templatehere) or Terraform: ## Queue Policy QUEUE_POLICY=$(cat <<EOF { "Version": "...
AWS : Creating VPC with CloudFormation WAF (Web Application Firewall) with preconfigured CloudFormation template and Web ACL for CloudFront distribution AWS : CloudWatch & Logs with Lambda Function / S3 AWS : Lambda Serverless Computing with EC2, CloudWatch Alarm, SNS AWS : Lambda and SNS -...
To declare this entity in your AWS CloudFormation template, use the following syntax: JSON { "Type" : "AWS::EC2::Subnet", "Properties" : { "AssignIpv6AddressOnCreation" : Boolean, "AvailabilityZone" : String, "AvailabilityZoneId" : String, "CidrBlock" : String, "EnableDns64" : Boolean...
To declare this entity in your AWS CloudFormation template, use the following syntax: JSON { "Type" : "AWS::EC2::TransitGatewayMulticastGroupSource", "Properties" : { "GroupIpAddress" : String, "NetworkInterfaceId" : String, "TransitGatewayMulticastDomainId" : String } } Y...
We need a couple of things to launch the CloudFormation Template Your Dynatrace Tenant ID Your Dynatrace Tenant URL: For SaaS that would be something like http://<yourtenant>.live.dynatrace.com. For Managed it would be http://<yourserver>/e/<your-env-id> Your Dynatrace OneAgent for Linux...