AWS CloudFormation Adds Support for Amazon VPC NAT Gateway, Amazon EC2 Container Registry, and More

Posted on: Feb 26, 2016

AWS CloudFormation has added support for four additional AWS services and several new features.

You can now provision the following AWS services using CloudFormation. Visit here for a full list of supported services.

  • Network Address Translation (NAT) Gateway: You can now provision a Network Address Translation (NAT) Gateway using CloudFormation. NAT Gateway is a highly available AWS managed service that makes it easy to connect to the Internet from instances within a private subnet in an Amazon Virtual Private Cloud (VPC). Learn more.
  • Amazon EC2 Container Registry (Amazon ECR): You can now use CloudFormation to provision Amazon ECR, a fully-managed Docker container registry that makes it easy for developers to store, manage, and deploy Docker container images. Learn more.
  • Amazon Elastic MapReduce (Amazon EMR): You can now provision Amazon EMR using CloudFormation. Amazon EMR is a web service that makes it easy to quickly and cost-effectively process vast amounts of data using frameworks such as Hadoop, Apache Spark, and Presto. 
  • Amazon Elasticsearch Service (Amazon ES): You can now use CloudFormation to provision Amazon ES, a managed service that makes it easy to deploy, operate, and scale Elasticsearch clusters on AWS. Learn more.

You can now provision the following features using CloudFormation:

  • AWS CloudTrail multi-region trail creation: Specify whether newly created trails apply to the region in which your stack was created or to all regions.
  • AWS Config global resource types: Indicate whether AWS Config should automatically start recording newly added global resource types, such as IAM users, groups, roles, and customer managed policies.
  • Amazon Relational Database Service (Amazon RDS) encryption: Encrypt Amazon RDS database instances using AWS Key Management System.
  • Edit tags when updating stacks: Add, modify, or remove stack tags when you update your stack. Previously, you could not make changes to tags when updating your stack.
  • Retain resources when deleting stacks: Specify the AWS resources you would like to retain when deleting a stack. This is useful when your stack deletion has failed because it contains a resource that cannot be deleted, such as a non-empty Amazon S3 bucket.

Please visit our website for more information on AWS CloudFormation: