AWS CloudFormation Resource Types
Internal
AWS::ApiGateway
AWS::ApiGateway::RestApi
AWS::ApiGateway::Deployment
AWS::ApiGateway::Stage
AWS::CloudFormation
AWS::CloudFormation::Stack
AWS::CloudFormation::Stack enables nesting another stack as a resource within a template.
AWS::CodeBuild
AWS::CodeBuild::Project
Note that if the "Name" property is used, the physical ID of the created CodeBuild project will use that value, otherwise the name will be generated with the pattern CodeBuildProjectLogicalID-apCFy5I1KyH8. Recommended name:
Resources: CodeBuildProject: Type: AWS::CodeBuild::Project Properties: Name: !Ref AWS::StackName
For an example of a CodeBuild build project that integrates with a CodePipeline see:
AWS::CodePipeline
AWS::CodePipeline::Pipeline
Creates a CodePipeline pipeline. Other pipeline examples:
Note that if the "Name" property is used, the physical ID of the created pipeline will use that value, otherwise the name will be generated with the pattern stack-name-Pipeline-24RCYXM52UE6A. Recommended name:
Resources: Pipeline: Type: AWS::CodePipeline::Pipeline Properties: Name: !Ref AWS::StackName
AWS::EC2
AWS::EC2::SecurityGroup
Resources: ServiceSecurityGroup: Type: AWS::EC2::SecurityGroup Properties: GroupDescription: '...' VpcId: Fn::ImportValue: !Join [':', [!Ref 'DeploymentStackName', 'VPCId']] GroupName: !Sub ${ECRRepository}-sg SecurityGroupIngress: - IpProtocol: -1 CidrIp: 10.0.0.0/8
AWS::ECR
AWS::ECR::Repository
Resources: Repository: Type: AWS::ECR::Repository Properties: RepositoryName: some-docker-repository-name
AWS::ECS
AWS::ECS::TaskDefinition
Resources: TaskDefinition: Type: AWS::ECS::TaskDefinition Properties: Family: 'some-family' RequiresCompatibilities: ["FARGATE"] NetworkMode: "awsvpc" Cpu: '2048' Memory: '4096' TaskRoleArn: !GetAtt TaskRole.Arn ExecutionRoleArn: !GetAtt TaskExecutionRole.Arn ContainerDefinitions: - Name: 'some-name' Cpu: '2048' Memory: '4096' Essential: 'true' Environment: - Name: SPRING_PROFILES_ACTIVE Value: 'something' Image: !Sub ${Image}:${Tag} PortMappings: - HostPort: 10002 ContainerPort: 10002 LogConfiguration: LogDriver: "awslogs" Options: awslogs-group: 'some-group' awslogs-region: !Sub ${AWS::Region} awslogs-stream-prefix: 'some-prefix'
AWS::ECS::Service
Resources: ServiceDefinition: Type: AWS::ECS::Service DependsOn: LoadBalancerListener Properties: ServiceName: themyscira LaunchType: FARGATE Cluster: 'some-cluster' TaskDefinition: !Ref TaskDefinition DesiredCount: 1 HealthCheckGracePeriodSeconds: 60 NetworkConfiguration: AwsvpcConfiguration: AssignPublicIp: DISABLED SecurityGroups: - !Ref ServiceSecurityGroup Subnets: - 'blue-subnet' - 'green-subnet' ServiceRegistries: - RegistryArn: !GetAtt ServiceDiscovery.Arn LoadBalancers: - ContainerName: 'some-name' ContainerPort: 10002 TargetGroupArn: !Ref TargetGroup
AWS::ElasticLoadBalancingV2
AWS::ElasticLoadBalancingV2::TargetGroup
Resources: TargetGroup: Type: AWS::ElasticLoadBalancingV2::TargetGroup Properties: HealthCheckIntervalSeconds: 60 HealthCheckPath: '/myservice/actuator/health' HealthCheckProtocol: HTTP HealthCheckTimeoutSeconds: 5 HealthyThresholdCount: 2 TargetType: ip Name: myservice Port: 8086 Protocol: HTTP UnhealthyThresholdCount: 10 VpcId: !Ref MyVpcId
AWS::ElasticLoadBalancingV2::Listener
Resources: LoadBalancerListener: Type: AWS::ElasticLoadBalancingV2::Listener DependsOn: - TargetGroup Properties: DefaultActions: - TargetGroupArn: !Ref 'TargetGroup' Type: 'forward' LoadBalancerArn: Fn::ImportValue: !Join [':', [!Ref 'DeploymentStackName', 'ServiceALB']] Port: 10002 Protocol: HTTP
AWS::IAM
AWS::IAM::Role
The following sequence creates an IAM Role:
Resources: CodeBuildServiceRole: Type: AWS::IAM::Role Properties: RoleName: !Sub '${AWS::StackName}-codebuild-service-role' Path: '/service-role/' AssumeRolePolicyDocument: Version: '2012-10-17' Statement: - Effect: 'Allow' Principal: Service: - "codebuild.amazonaws.com" Action: - "sts:AssumeRole" Policies: - PolicyName: 'aggregated-inline-policy' PolicyDocument: Version: '2012-10-17' Statement: - Effect: 'Allow' Action: - 's3:ListBucket' Resource: - '*'
Naming. If this role is declared by a "thalarion" stack, then, after successful creation, the role's physical ID will be "thalarion-CodeBuildServiceRole-A479B6WNRHSSG". A custom name can be forced with the "RoleName", as shown above.
AWS::Logs
AWS::Logs::LogGroup
Resources: ServiceLogGroup: Type: "AWS::Logs::LogGroup" Properties: LogGroupName: some-name RetentionInDays: 7
AWS::S3
AWS::S3::Bucket
Resources: TestdBucket: Type: AWS::S3::Bucket Properties: BucketName: !Sub '${AWS::StackName}-test-bucket' AccessControl: BucketOwnerFullControl
Naming If no "BucketName" property is specified, the bucket will be named based on the pattern <stack-name>-<resource-name-all-lowercases>-2a3et4c9f3bas. A custom name can be set with "BucketName".