Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save jedi4ever/917543 to your computer and use it in GitHub Desktop.
Save jedi4ever/917543 to your computer and use it in GitHub Desktop.
Mccloud definition
mcclouddevelopmentpatrickmcollectivestack - ROLLBACK_COMPLETE
-- Timestamp: Wed Apr 13 13:23:14 UTC 2011
-- LogicalResourceId: mcclouddevelopmentpatrickmcollectivestack
-- ResourceType: AWS::CloudFormation::Stack
-- ResourceStatus: ROLLBACK_COMPLETE
--
-- Timestamp: Wed Apr 13 13:23:11 UTC 2011
-- LogicalResourceId: ActiveMQSecurityGroup
-- ResourceType: AWS::EC2::SecurityGroup
-- ResourceStatus: DELETE_COMPLETE
--
-- Timestamp: Wed Apr 13 13:23:08 UTC 2011
-- LogicalResourceId: ActiveMQSecurityGroup
-- ResourceType: AWS::EC2::SecurityGroup
-- ResourceStatus: DELETE_IN_PROGRESS
--
-- Timestamp: Wed Apr 13 13:23:08 UTC 2011
-- LogicalResourceId: ActiveMQInstance
-- ResourceType: AWS::EC2::Instance
-- ResourceStatus: DELETE_COMPLETE
--
-- Timestamp: Wed Apr 13 13:23:06 UTC 2011
-- LogicalResourceId: ActiveMQInstance
-- ResourceType: AWS::EC2::Instance
-- ResourceStatus: DELETE_IN_PROGRESS
--
-- Timestamp: Wed Apr 13 13:22:58 UTC 2011
-- LogicalResourceId: mcclouddevelopmentpatrickmcollectivestack
-- ResourceType: AWS::CloudFormation::Stack
-- ResourceStatus: ROLLBACK_IN_PROGRESS
-- ResourceStatusReason: The following resource(s) failed to create: [ActiveMQInstance]. Rollback requested by user.
--
-- Timestamp: Wed Apr 13 13:22:56 UTC 2011
-- LogicalResourceId: ActiveMQInstance
-- ResourceType: AWS::EC2::Instance
-- ResourceStatus: CREATE_FAILED
-- ResourceStatusReason: The AMI ID 'ami-3fb4804b' does not exist
--
-- Timestamp: Wed Apr 13 13:22:53 UTC 2011
-- LogicalResourceId: ActiveMQInstance
-- ResourceType: AWS::EC2::Instance
-- ResourceStatus: CREATE_IN_PROGRESS
--
-- Timestamp: Wed Apr 13 13:22:53 UTC 2011
-- LogicalResourceId: ActiveMQSecurityGroup
-- ResourceType: AWS::EC2::SecurityGroup
-- ResourceStatus: CREATE_COMPLETE
--
-- Timestamp: Wed Apr 13 13:22:49 UTC 2011
-- LogicalResourceId: ActiveMQSecurityGroup
-- ResourceType: AWS::EC2::SecurityGroup
-- ResourceStatus: CREATE_IN_PROGRESS
--
-- Timestamp: Wed Apr 13 13:22:45 UTC 2011
-- LogicalResourceId: mcclouddevelopmentpatrickmcollectivestack
-- ResourceType: AWS::CloudFormation::Stack
-- ResourceStatus: CREATE_IN_PROGRESS
-- ResourceStatusReason: User Initiated
--
config.stack.define "mcollectivestack" do |stack_config|
stack_config.stack.provider="AWS"
# Set the json file to read, can be an URL too
stack_config.stack.jsonfile="mcollective_cloud.json"
# Parameters to pass to the cloudformation stack
# These will be passed on the Parameters section of the cloudformation
stack_config.stack.params={ "KeyName" => "mccloud-key-patrick" , "Password" => "demo" , "PSK" => "demo" }
# Sets a default for EC2 machines defined in the json
# If you want to override individual you have to manually define the machines
stack_config.stack.user[:default]="root"
stack_config.stack.private_key[:default]="/Users/patrick/.ssh/mccloud_rsa"
stack_config.stack.public_key[:default]="/Users/patrick/.ssh/mccloud_rsa.pub"
end
{
"AWSTemplateFormatVersion" : "2010-09-09",
"Description" : "Marionette Collective 1.0.1 demo network with 1 ActiveMQ broker and 5 managed instances",
"Parameters" : {
"KeyName" : {
"Description" : "Name of an existing EC2 KeyPair to enable SSH access to the instances",
"Type" : "String"
},
"Password" : {
"Description" : "Password for ActiveMQ",
"NoEcho": "true",
"Type" : "String"
},
"PSK" : {
"Description" : "Pre Shared Key for MCollective",
"NoEcho": "true",
"Type" : "String"
}
},
"Resources" : {
"ActiveMQInstance" : {
"Type" : "AWS::EC2::Instance",
"Properties" : {
"InstanceType" : "m1.small",
"SecurityGroups" : [ { "Ref" : "ActiveMQSecurityGroup" } ],
"AvailabilityZone" : "eu-west-1b",
"ImageId" : "ami-3fb4804b",
"KeyName" : { "Ref" : "KeyName" },
"Tags" : [ { "Key" : "Name",
"Value" : "management_node"
} ],
"UserData" : {"Fn::Base64" :
{"Fn::Join": [ "\n", [
"mcollective=server",
{"Fn::Join": [ "", ["mcollective_password=", { "Ref": "Password" }]]},
{"Fn::Join": [ "", ["mcollective_psk=", { "Ref": "PSK" }]]}
]
]
}
}
}
},
"ManagedInstance1" : {
"Type" : "AWS::EC2::Instance",
"Properties" : {
"InstanceType" : "m1.small",
"AvailabilityZone" : "eu-west-1b",
"SecurityGroups" : [ { "Ref" : "ActiveMQSecurityGroup" } ],
"ImageId" : "ami-3fb4804b",
"KeyName" : { "Ref" : "KeyName" },
"Tags" : [ { "Key" : "Name",
"Value" : "node1"
} ],
"UserData" : {"Fn::Base64" :
{"Fn::Join": [ "\n", [
{"Fn::Join": [ "", ["mcollective=", {"Fn::GetAtt": [ "ActiveMQInstance", "PublicIp" ]}]] },
{"Fn::Join": [ "", ["mcollective_password=", { "Ref": "Password" }]]},
{"Fn::Join": [ "", ["mcollective_psk=", { "Ref": "PSK" }]]}
]
]
}
}
}
},
"ManagedInstance2" : {
"Type" : "AWS::EC2::Instance",
"Properties" : {
"InstanceType" : "m1.small",
"AvailabilityZone" : "eu-west-1b",
"SecurityGroups" : [ { "Ref" : "ActiveMQSecurityGroup" } ],
"ImageId" : "ami-3fb4804b",
"KeyName" : { "Ref" : "KeyName" },
"Tags" : [ { "Key" : "Name",
"Value" : "node2"
} ],
"UserData" : {"Fn::Base64" :
{"Fn::Join": [ "\n", [
{"Fn::Join": [ "", ["mcollective=", {"Fn::GetAtt": [ "ActiveMQInstance", "PublicIp" ]}]] },
{"Fn::Join": [ "", ["mcollective_password=", { "Ref": "Password" }]]},
{"Fn::Join": [ "", ["mcollective_psk=", { "Ref": "PSK" }]]}
]
]
}
}
}
},
"ManagedInstance3" : {
"Type" : "AWS::EC2::Instance",
"Properties" : {
"InstanceType" : "m1.small",
"AvailabilityZone" : "eu-west-1a",
"SecurityGroups" : [ { "Ref" : "ActiveMQSecurityGroup" } ],
"ImageId" : "ami-3fb4804b",
"KeyName" : { "Ref" : "KeyName" },
"Tags" : [ { "Key" : "Name",
"Value" : "node3"
} ],
"UserData" : {"Fn::Base64" :
{"Fn::Join": [ "\n", [
{"Fn::Join": [ "", ["mcollective=", {"Fn::GetAtt": [ "ActiveMQInstance", "PublicIp" ]}]] },
{"Fn::Join": [ "", ["mcollective_password=", { "Ref": "Password" }]]},
{"Fn::Join": [ "", ["mcollective_psk=", { "Ref": "PSK" }]]}
]
]
}
}
}
},
"ManagedInstance4" : {
"Type" : "AWS::EC2::Instance",
"Properties" : {
"InstanceType" : "m1.small",
"AvailabilityZone" : "eu-west-1a",
"SecurityGroups" : [ { "Ref" : "ActiveMQSecurityGroup" } ],
"ImageId" : "ami-3fb4804b",
"KeyName" : { "Ref" : "KeyName" },
"Tags" : [ { "Key" : "Name",
"Value" : "node4"
} ],
"UserData" : {"Fn::Base64" :
{"Fn::Join": [ "\n", [
{"Fn::Join": [ "", ["mcollective=", {"Fn::GetAtt": [ "ActiveMQInstance", "PublicIp" ]}]] },
{"Fn::Join": [ "", ["mcollective_password=", { "Ref": "Password" }]]},
{"Fn::Join": [ "", ["mcollective_psk=", { "Ref": "PSK" }]]}
]
]
}
}
}
},
"ManagedInstance5" : {
"Type" : "AWS::EC2::Instance",
"Properties" : {
"InstanceType" : "m1.small",
"AvailabilityZone" : "eu-west-1a",
"SecurityGroups" : [ { "Ref" : "ActiveMQSecurityGroup" } ],
"ImageId" : "ami-3fb4804b",
"KeyName" : { "Ref" : "KeyName" },
"Tags" : [ { "Key" : "Name",
"Value" : "node5"
} ],
"UserData" : {"Fn::Base64" :
{"Fn::Join": [ "\n", [
{"Fn::Join": [ "", ["mcollective=", {"Fn::GetAtt": [ "ActiveMQInstance", "PublicIp" ]}]] },
{"Fn::Join": [ "", ["mcollective_password=", { "Ref": "Password" }]]},
{"Fn::Join": [ "", ["mcollective_psk=", { "Ref": "PSK" }]]}
]
]
}
}
}
},
"ActiveMQSecurityGroup" : {
"Type" : "AWS::EC2::SecurityGroup",
"Properties" : {
"GroupDescription" : "Enable SSH and ActiveMQ access",
"SecurityGroupIngress" : [
{
"IpProtocol" : "tcp",
"FromPort" : "22",
"ToPort" : "22",
"CidrIp" : "0.0.0.0/0"
},
{
"IpProtocol" : "tcp",
"FromPort" : "6163",
"ToPort" : "6163",
"CidrIp" : "0.0.0.0/0"
}
]
}
}
},
"Outputs": {
"ManagementConsole": {
"Value" : { "Fn::GetAtt" : [ "ActiveMQInstance", "PublicIp" ] },
"Description" : "Address for the management instance"
}
}
}
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment