Cfn

 view release on metacpan or  search on metacpan

t/001_parse/datepipeline_pipeline.res  view on Meta::CPAN

{
  "Type": "AWS::DataPipeline::Pipeline",
  "Properties": {
    "Name": "DynamoDBInputS3OutputHive",
    "Description": "Pipeline to backup DynamoDB data to S3",
    "Activate": "true",
    "ParameterObjects": [
      {
        "Id": "myDDBReadThroughputRatio",
        "Attributes": [
          {
            "Key": "description",
            "StringValue": "DynamoDB read throughput ratio"
          },
          {

t/cfn_json/WebServer-Stack.json  view on Meta::CPAN

{
  "AWSTemplateFormatVersion" : "2010-09-09",

  "Description" : "AWS CloudFormation template to deploy a full LAMP server stack. This template creates an Amazon EC2 instance with an elastic IP, an Amazon RDS database instance, an IAM Role for the EC2 instance to make API requests to S3, EC2 and ...

  "Parameters" : {
    "KeyPair" : {
      "Description" : "Amazon EC2 Key Pair",
      "Type" : "AWS::EC2::KeyPair::KeyName"
    },
    "InstanceType" : {
      "Description" : "EC2 instance class",
      "Type" : "String",
      "Default" : "t2.micro",

t/cfn_json/WebServer-Stack.json  view on Meta::CPAN

                "Resource": "*"
              } ]
            } 
          }, 
          { "PolicyName": "S3Access",
            "PolicyDocument": {
              "Version" : "2012-10-17",
              "Statement": [ {
                "Effect": "Allow",
                "Action": "s3:*",
                "Resource": ["arn:aws:s3:::opentodo-backups","arn:aws:s3:::opentodo-backups/*","arn:aws:s3:::opentodo-logs","arn:aws:s3:::opentodo-logs/*"]
              } ]
            }
          },
          { "PolicyName": "CfnAccess",
            "PolicyDocument": {
              "Version" : "2012-10-17",
              "Statement": [ {
                "Effect": "Allow",
                "Action": ["cloudformation:DescribeStackResource"],
                "Resource": "*"

t/cfn_json/WebServer-Stack.json  view on Meta::CPAN

        "PreferredBackupWindow" : "02:30-03:30",
  "PreferredMaintenanceWindow" : "sun:04:30-sun:05:30",
        "VPCSecurityGroups": [ { "Fn::GetAtt": [ "DBEC2SecurityGroup", "GroupId" ] } ]
      }
    },
    "S3BackupBucket" : {
      "Type" : "AWS::S3::Bucket",
      "DeletionPolicy" : "Retain",
      "Properties" : {
        "AccessControl" : "Private",
        "BucketName" : "opentodo-backups",
        "LifecycleConfiguration" : {
          "Rules" : [ {
            "ExpirationInDays" : 15,
            "Status" : "Enabled"
          } ] 
        }
      }
    },
    "S3LogBucket" : {
      "Type" : "AWS::S3::Bucket",

t/cfn_json/WebServer-Stack.json  view on Meta::CPAN

    "WebsiteURL" : {
      "Value" : { "Fn::Join" : ["", ["http://", { "Fn::GetAtt" : [ "WebServerEc2Instance", "PublicIp" ]}, "/" ]]},
      "Description" : "URL of WebServer site"
    },
    "RDSInstance" : {
      "Value" : { "Fn::Join" : [ "", [ { "Fn::GetAtt" : [ "DBInstance", "Endpoint.Address" ] }, ":" , { "Fn::GetAtt" : [ "DBInstance", "Endpoint.Port" ] } ] ] },
      "Description" : "RDS instance Endpoint"
    },
    "S3BackupBucketURL" : {
      "Value" : { "Fn::Join" : [ "", [ "https://", { "Fn::GetAtt" : [ "S3BackupBucket", "DomainName" ] } ] ] },
      "Description" : "URL of the S3 bucket to store backups"
    },
    "S3LogBucketURL" : {
      "Value" : { "Fn::Join" : [ "", [ "https://", { "Fn::GetAtt" : [ "S3LogBucket", "DomainName" ] } ] ] },
      "Description" : "URL of the S3 bucket to store logs"
    }
  }
}



( run in 1.687 second using v1.01-cache-2.11-cpan-49f99fa48dc )