Tag: AWS CloudFormation stacks
Learn how to change the name of a CloudFormation stack without deleting the resources that it manages. In the walkthrough, which uses a simple architecture with a single resource, a virtual private cloud (VPC), you add a Retain attribute to the resource’s deletion policy so that the resource isn’t lost when that stack is deleted.
Automate and consolidate IAM credential reports for your AWS accounts using a scalable infrastructure-as-code automation.
Use Python and AWS CloudFormation to create, register, and use a resource type.
Learn how to save time, effort, and frustration when automating your workload deployments using AWS CloudFormation.
Learn why you want to shift from path-style to virtual-hosted-style S3 endpoints in your AWS CloudFormation templates.
Here are two patterns that you can add to AWS CloudFormation to customize automated deployments based on values provided during the launch. The first pattern is for designing nested stacks that are optional. The second pattern allows you to change template URLs based on the current scenario.
AWS CloudFormation nested stacks execute in the same account and AWS Region as the parent stack. This post shows you how to nest stacks in different accounts, Regions, or IAM identities.
Instead of manually cleaning up your temporary AWS CloudFormation stacks, use this mechanism to automatically delete your demonstration stacks after a specified amount of time has elapsed.