particles-vpc

0.7.0 • Public • Published

particles-vpc

condensation

NPM Gitter Build Status Dependency Status

Summary

Condensation particles that create VPC resources.

Particles

cftemplates/simple

simple/subnet

Simple implemention of a Subnet. Good base to start from.

simple/vpc

Simple implemention of a VPC. Good base to start from.

outputs

security_group/id

Output ID of a SecurityGroup

Extends base from particles-core

Parameters

  • securityGroupLogicalId {String} required LogicalId of the SecurityGroup

security_group/name

Output Name of a SecurityGroup

Extends base from particles-core

Parameters

  • securityGroupLogicalId {String} required LogicalId of the SecurityGroup

parameters

availability_zone/name

Name for an AvailabilityZone

Extends base from particles-core

availability_zone/id

ID for an AvailabilityZone

Extends base from particles-core

security_group/id_list

ID List for SecurityGroups

Extends base from particles-core

subnet/id_list

ID List for Subnets

Extends base from particles-core

vpc/cidr

CIDR range

Extends cidr_range from particles-core

vpc/id

ID for a VPC

Extends base from particles-core

vpc/route_table_id

ID for a VPC RouteTable

Extends base from particles-core

resources

internet_gateway

Type AWS::EC2::InternetGateway

Extends base from particles-core

network_acl

Type AWS::EC2::NetworkAcl

Extends base from particles-core

Parameters

  • vpcId {String} required The ID of the VPC
  • tags {Array} An arbitrary set of tags

security_group

Type AWS::EC2::SecurityGroup

Extends base from particles-core

Parameters

  • groupDescription {String} required Description of the security group
  • vpcId {String} required The physical ID of the VPC
  • securityGroupEgress {Array} A list of Amazon EC2 security group egress rules
  • securityGroupIngress {Array} A list of Amazon EC2 security group ingress rules
  • tags {Array} An arbitrary set of tags

security_group/egress

Type AWS::EC2::SecurityGroupEgress

Extends base from particles-core

Parameters

  • fromPort {String} required Start of port range for the TCP and UDP protocols, or an ICMP type number
  • groupId {String} required ID of the Amazon VPC security group to modify
  • ipProtocol {String} required IP protocol name or number
  • toPort {String} required End of port range for the TCP and UDP protocols, or an ICMP code
  • cidrIp {String} cidr range
  • destinationSecurityGroupId {String} group ID of the destination Amazon VPC security group

security_group/ingress

Type AWS::EC2::SecurityGroupIngress

Extends base from particles-core

Parameters

  • fromPort {Number} required Start of port range for the TCP and UDP protocols, or an ICMP type number
  • ipProtocol {String} required IP protocol name or number
  • toPort {Number} required End of port range for the TCP and UDP protocols, or an ICMP code
  • cidrIp {String} cidr range
  • groupId {String} ID of the Amazon VPC security group to modify
  • groupName {String} Name of the Amazon VPC security group to modify
  • sourceSecurityGroupId {String} group ID of the destination Amazon VPC security group
  • sourceSecurityGroupName {String} group name of the destination Amazon VPC security group
  • sourceSecurityGroupOwnerId {String} AWS Account ID of the owner of the Amazon EC2 security group specified in the SourceSecurityGroupName property

subnet

Type AWS::EC2::Subnet

Extends base from particles-core

Parameters

  • cidrBlock {String} required CIDR block that you want the subnet to cover
  • availabilityZone {String} required availability zone in which you want the subnet
  • vpcId {String} required VPC on which you want to create the subnet
  • mapPublicIpOnLaunch {Boolean=false} whether instances that are launched in this subnet receive a public IP address
  • tags {Array} An arbitrary set of tags

subnet/route_table_association

Type AWS::EC2::SubnetRouteTableAssociation

Extends base from particles-core

Parameters

  • RouteTableId {String} required The ID of the route table
  • SubnetId {String} required The ID of the subnet

vpc

Type AWS::EC2::Vpc

Extends base from particles-core

Parameters

  • cidrBlock {String} required The CIDR block you want the VPC to cover
  • enableDnsSupport {Boolean} whether DNS resolution is supported for the VPC
  • enableDnsHostnames {Boolean} whether the instances launched in the VPC get DNS hostnames
  • instanceTenancy {String} allowed tenancy of instances launched into the VPC
  • Tags {Array} An arbitrary set of tags

sets

security_group/output_all

All possible outputs for a SecurityGroup

Parameters

  • securityGroupLogicalId {String} required The LogicalId of the SecurityGroup

subnet_group/output_all

All possible outputs for a Subnet

Parameters

  • subnetLogicalId {String} required The LogicalId of the Subnet

vpc_group/output_all

All possible outputs for a Vpc

Parameters

  • vpcLogicalId {String} required The LogicalId of the VPC

simple/create_internet_gateway

A true_false set for creation of an InternetGateway

Extends particles-core true_false

simple/route_table_association

A RouteTableId parameter and a RouteTableAssociation resource

simple/subnet

A collection of particles that will create a simple, usable subnet.

Parameters

  • defaultCidr {String} the default CIDR range for the SubnetCidr parameter

simple/vpc

A collection of particles that will create a simple, usable vpc.

Parameters

  • defaultCidr {String} the default CIDR range for the VpcCidr parameter

Ready To Launch

Ready to Launch community available templates created from condensation particles

Simple VPC

region Stack
us-east-1 Launch Stack
us-west-1 Launch Stack
us-west-2 Launch Stack
eu-west-1 Launch Stack
eu-central-1 Launch Stack
ap-northeast-1 Launch Stack
ap-northeast-2 Launch Stack
ap-southeast-1 Launch Stack
ap-southeast-2 Launch Stack
sa-east-1 Launch Stack

Simple Subnet

region Stack
us-east-1 Launch Stack
us-west-1 Launch Stack
us-west-2 Launch Stack
eu-west-1 Launch Stack
eu-central-1 Launch Stack
ap-northeast-1 Launch Stack
ap-northeast-2 Launch Stack
ap-southeast-1 Launch Stack
ap-southeast-2 Launch Stack
sa-east-1 Launch Stack

License

Apache-2.0 ©

Sungard Availability Services | Labs

Sungard Availability Services | Labs

This project is maintained by the Labs team at Sungard Availability Services

GitHub: https://sungardas.github.io

Blog: http://blog.sungardas.com/CTOLabs/

Package Sidebar

Install

npm i particles-vpc

Weekly Downloads

2

Version

0.7.0

License

Apache-2.0

Last publish

Collaborators

  • kmcgrath
  • sungardas