Examples of using Cloudformation template in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
All the resources in a stack are defined by the stack's AWS CloudFormation template.
You now have a complete AWS CloudFormation template that you can use to create a basic web server in a VPC.
All the resources included in each stackare defined by the stack set's AWS CloudFormation template.
You can use an AWS CloudFormation template from AWS CloudHSM Classic to automatically set up your AWS environment for AWS CloudHSM Classic.
For more information about creating AWS CloudFormation templates, see Template Anatomy.
AWS CloudFormation Designer(Designer) is a graphic tool for creating,viewing, and modifying AWS CloudFormation templates.
On the Select template page, to use the same AWS CloudFormation template, keep the default option, Current template. .
If your AWS CloudFormation template defines a VPC, a gateway, and a gateway attachment, any resources that require the gateway are dependent on the gateway attachment.
Otherwise, your resources might get out of sync with your AWS CloudFormation template and cause stack errors.
If you didn't use the AWS CloudFormation template, modify the security group associated with the ENI assigned to the HSM appliance.
Use the aws cloudformation package command to uploadlocal artifacts that are referenced in an AWS CloudFormation template to an S3 bucket.
You can now refer to the AWS AccountID inside AWS CloudFormation templates by referring to the AWS::AccountID pseudo parameter.
To see the metric filters and alarms in the template, and the API calls thattrigger email notifications, see CloudFormation Template Contents.
You can design an AWS CloudFormation template(a JSON or YAML-formatted document) in AWS CloudFormation Designer or write one in a text editor.
You can retrieve the latestrecommended Amazon ECS-optimized AMI in an AWS CloudFormation template by referencing the SSM parameter store name; for example.
If you used the AWS CloudFormation template to create your AWS CloudHSM Classic environment, modify the security group that allows SSH and NTLS from the public subnet.
This command creates an AWS CloudFormation stack named CodeDeployDemoStack,using the AWS CloudFormation template in the specified Amazon S3 bucket.
A reference architecture automated by the AWS CloudFormation template integrating AWS services such as Amazon Simple Storage Service(Amazon S3), Amazon Elastic Compute Cloud(Amazon EC2), and Amazon Redshift.
Additional CloudWatch alarm examples have been added to Creating CloudWatch Alarms for CloudTrail Events, and a new page has been added:Using a AWS CloudFormation Template to Create CloudWatch Alarms.
The following diagram shows the AWS environment that the AWS CloudFormation template automatically sets up for you to use with AWS CloudHSM Classic.
If you use the AWS CloudFormation template to launch Amazon EC2 instances, the calling IAM user must have access to AWS CloudFormation and AWS services and actions on which AWS CloudFormation depends.
Before end users can use a product to which you give access, you must provide them additional IAM permissionsto allow them to use each of the underlying AWS resources in a product's AWS CloudFormation template.
You can use the AWS::Include transform anywhere within the AWS CloudFormation template except in the template parameters section or the template version field.
Since paths on Windows use a backslash('\') character, you must always remember to properly escape all backslashes by prepending another backslashwhenever you refer to a Windows path in the AWS CloudFormation template.
Using an administrator account, you define and manage an AWS CloudFormation template, and use the template as the basis for provisioning stacks into selected target accounts across specified regions.
For information, see Step 4: Create an IAM Instance Profile for Your Amazon EC2 Instances, Create an Amazon EC2 Instance for AWS CodeDeploy(AWS CLI or Amazon EC2 Console), andCreate an Amazon EC2 Instance for AWS CodeDeploy AWS CloudFormation Template.
If you want to use the service role generated by the AWS CloudFormation template instead of one you created by following the instructions in Step 3: Create a Service Role for AWS CodeDeploy, note the following.
You can also configure your AWS CloudFormation template so that the logs are published to Amazon CloudWatch, which displays logs in the AWS Management Console so you don't have to connect to your Amazon EC2 instance.
Creating a new stack set includes specifying an AWS CloudFormation template that you want to use to create stacks, specifying the target accounts in which you want to create stacks, and identifying the AWS regions in which you want to deploy stacks in your target accounts.
If you are using our AWS CloudFormation template to launch new Amazon EC2 instances, and the number is larger than you're expecting, choose Cancel, start the wizard from the beginning, and in Step 3: Configure instances, specify a tag value different from the default.