• Stars
    star
    571
  • Rank 77,595 (Top 2 %)
  • Language
    Shell
  • License
    MIT License
  • Created over 8 years ago
  • Updated over 4 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

AWS - CloudFormation Templates

Stelligent CloudFormation Templates

Purpose

This repository contains a collaboration of general and specific Amazon Web Services CloudFormation Template Examples. The basic design is a layered approach so there is less repeat content between all the templates. That way you can build a custom environment by picking the solution templates you wish to use. In other words you won't see a VPC created over and over throughout the templates. You simply use the VPC template then move to the next piece you would like to create.

Also, The general design leans towards not having to refactor the template to fit your account/environment. By using the configured parameters from the console or CLI you should be able to use the template without the need to edit it. The templates generally output all the information you may need for another template. So, be sure to examine the Outputs tab after creating the stack.

The AWS CLI examples can be dropped in a shell script and/or added to your CI/CD solution to spin up solutions in a fully automated fashion. Of course logic around updating stacks, deleting and checking for success/failure should be addressed.

With a simple shell script and a customized parameter json file you can spin up stacks quickly and consistently. Furthermore it's just as easy to tear a CloudFormation stack versus if all the objects where created manually.

Templates

Categories

Orchestrators

Back to Top

One template to rule them all... These are master templates that call nested templates. These are good to build out a full environment without having to run each template individually. Coupled with a custom parameters JSON file can give you a one command solution to a complex setup and eliminate the need to duplicate code.

For instance you could have a VPC, NAT, RDS and Autoscaling Webapp behind an ELB and Update DNS all in one command using various foundational templates that I've creates to be used together.

Infrastructure

Select the foundational pieces for building out an infrastructure from the ground up.

Create Details
  1. VPC
  2. Nat Gateway (Optional)
  3. Bastion Host (Optinoal)
  4. VPN (Optional)
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/infrastructure.yml
Launch
View in Designer
View in Designer

Infrastructure

Back to Top

VPC (Virtual Private Cloud)

Creates an entire VPC from scratch for Lab or Permanent.

Create Details
  1. Single VPC
  2. 3 Public Subnets
  3. 3 Private Subnets
  4. Public Route Table
  5. Private Route Table
  6. Internet Gateway
    • Attached to the Public Route Table
  7. Public Network ACL
  8. Private Network ACL
  9. VPC Endpoint
  10. Instance Access Security Group
    • Instance to Instance Access
  11. Remote Access Security Group
    • This can be used for to allow site-to-site VPN or Direct Connect Networks access to instances.
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/vpc.yml
Launch
View in Designer
View in Designer
How To Video
HowTo Video

NAT Gateway (Network Addresss Translation)

Creates a NAT Gateway on an existing VPC with Public (IGW) and Private subnets. Private route table is updated to route traffic to the NAT gateway a Public subnet that has an Internet Gateway Attached.

Prerequisites
  1. VPC
    • Public Subnet, IGW, Private Subnet/s.
    • Either use an existing VPC Infrastructure or you can use the following VPC Template to create a one.
  2. AWS Privileges
Create Details
  1. NAT Gateway
  2. EIP
  3. Add Route to Private Route Table
Advantages over NAT Instance
  1. Redundancy built in.
  2. Easier setup and management.
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/nat-gateway.yml
Launch
View in Designer
View in Designer
How To Video
HowTo Video

VPN BGP (Virtual Private Network using Border Gateway Protocol)

Creates a Site-to-Site BGP VPN Connection in and existing VPC with public and/or private networks. There is an option to not exclude allowing VPN access to the public networks. Simply select false for the 'Include Public Subnets', leave default value in Public Network ACL and Route Table. The values will just be ignored. This only sets up the AWS side of the VPN. After the CloudFormation creates the objects you'll then need to configure your remote VPN Device. Here's an article that gives the configuration steps for configuring a Sophos UTM v9 VPN endpoint. This assumes that the Private Network ACL allows all outbound. Lastly, the Private Network ACL inbound is updated to allow the remote network block specified.

Prerequisites
  1. VPC
    • Public Subnet, IGW, Private Subnet/s.
    • Either use an existing VPC Infrastructure or you can use the following VPC Template to create a one.
  2. Remote Network (Office) VPN Device WAN IP
  3. Remote Network CIDR Block to Allow Access and Propagate.
Create Details
  1. Customer Gateway
  2. Virtual Private Gateway
  3. VPN Connection
  4. Enable Route Propagation on Route Table/s
  5. Add Network ACL to Allow Remote Network
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/vpn-bgp.yml
Launch
View in Designer
View in Designer
How To Video
HowTo Video

Bastion

Creates a single Bastion host on a Public subnet in an existing VPC. Select from either a RHEL, Ubuntu or Windows OS.

Prerequisites
  1. VPC
    • Public Subnet, IGW, Private Subnet/s.
    • Either use an existing VPC Infrastructure or you can use the following VPC Template to create a one.
  2. Available EIP
Create Details
  1. EC2 Instance
  2. EIP
  3. IAM Role
  4. IAM Instance Profile
  5. Security Group
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/bastion.yml
Launch
us-west-2
View in Designer
View in Designer

Proxy AWSAPI & DevOps Sites Access for Private Instances

Create EC2 Single Proxy Instance

Prerequisites
  1. VPC
  2. 1 Public Subnet
CloudFormation Tasks
  1. Create Single EC2 Instance on Public Network with Public IP
  2. Create Autoscaling Group of 1 for DR
  3. Create Proxy Access Security Group
  4. Install Chef Client
  5. Create Chef Configurations Files (environment, roles, etc.)
  6. Download Cookbooks from Github Repo
  7. Checkout Specific Version of Cookbook
  8. Run Chef Client using Chef Zero
  9. Warm EBS Volume
Chef Cookbook Tasks
  1. Install, Configure and Start Squid Proxy
  2. Setup CloudWatch Logs
  3. Create Route53 DNS Update Script
  4. Configure DNS Update Cron Job
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/proxy-awsapi-devops-access.yml
Launch

Storage

Back to Top

EFS

Creates an Elastic File System with 3 Mounts

Prerequisites
  1. VPC
  2. 3 Subnets
Create Details
  1. EFS Filesystem
  2. 3 Mount Targets
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/efs.yml
Launch

S3 Backup Bucket

Create S3 Backup Bucket

Prerequisites
  1. VPC
  2. VPC Endpoint
Create Details
  1. Single S3 Bucket
  2. Enabled Versioning
  3. Enforced Encryption
  4. Creates LifeCycle to Delete Previous Versions after X Days
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/s3-backup-bucket-delete-previous.yml
Launch

Database

Back to Top

MySQL RDS

Creates a MySQL RDS Database Instance.

Prerequisites
  1. VPC
    • Public Subnet, IGW, Private Subnet/s.
    • Either use an existing VPC Infrastructure or you can use the following VPC Template to create a one.
Create Details
  1. DB Instance
  2. DB Subnet Group
  3. Security Group
  4. Cloud Watch Alarms
  5. Route 53 Record Set (Optional)
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/mysql-rds.yml
Launch

Create RDS From Snapshot

Creates an RDS Instance From Snapshot. Can be great for Blue/Green or pull Prd DB to Nonprod for testing.

Prerequisites
  1. RDS Snapshot in Same Region
  2. 2+ Subnets if Enabling Multi AZ
Create Details
  1. Create RDS Instance from Snapshot
  2. Create Subnet Group
  3. Create Access Security Group
  4. Optionally Configure DNS Record in Route53
Notes
  1. Because it's a restore several options are not available. Such as:
    1. Can't set Master User and Password
    2. Can't select what DB Engine
    3. Can't set allocated storage
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/create-rds-from-snapshot.yml
Launch

Autoscaling

Back to Top

Baked AMI, ELB, RDS Backend

Create an Autoscaling group in 3 private subnets from a baked AMI, an Elastic Load Balancer in 3 public subnets and S3 ELB Logging Bucket. Option to use SSL/TLS on ELB. Option to update Route 53 Hosted DNS alias to point to the ELB. Setup to add RDS Access Security Group. Does not create an RDS Instance. Use an RDS Instance Cloudformation Template first.

Create Details
  1. EC2 Instances
  2. AutoScaling
  3. Launch Configuration
  4. Elastic Load Balancer
  5. IAM Role
  6. IAM Instance Profile
  7. Security Group
  8. Scale Up Policy
  9. Scale Down Policy
  10. Cloud Watch Alarm
  11. Network ACL Entry
  12. Route 53 Record Set (Optional)
  13. S3 Bucket (Optional)
  14. S3 Bucket Policy (Optional)
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/autoscaling-bakedami-rdsbackend.yml
Launch
View in Designer
View in Designer

Labs

Back to Top

AWS Lambda CodePipeline Lab

Automates the integration between AWS Lambda and CodePipeline

Prerequisites
  1. N/A
Supported Regions
  1. us-east-1
Create Details
  1. IAM Policy and Roles
  2. Lambda Function
  3. CodePipeline
Launch

us-east-1

View in Designer
View in Designer

Bitbucket Lab

Creates a Bitbucket Server in a private or public subnet in an existing VPC.

Prerequisites
  1. VPC
    • Public or Private Subnet
    • Internal Instance Access Security Group
    • Either use an existing VPC Infrastructure or you can use the following VPC Template to create a one.
  2. Internet Access from the EC2 Instance or Yum access solution
  3. EC2 Key Pair
  4. Available EIP if Selected Public Facing
  5. IAM Role Creation Permissions
Supported Regions
  1. cn-north-1
  2. us-east-1
  3. us-west-1
  4. us-west-2
  5. eu-west-1
  6. eu-central-1
  7. ap-northeast-1
  8. ap-northeast-2
  9. ap-southeast-1
  10. ap-southeast-2
  11. sa-east-1
Create Details
  1. EC2 Instance (Amazon Linux)
  2. EIP (Optional)
  3. IAM Role
  4. IAM Instance Profile
  5. Security Group
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/bitbucket.yml
Launch
View in Designer
View in Designer

Chef Compliance Lab

Creates a Chef Complianc Web server in a Public Subnet with Internet Gatewayy attached on an existing VPC. It then attaches an EIP and finally adds the instance to an existing instance-to-instance security group.

Prerequisites
  1. VPC
    • Public Subnet, IGW, Private Subnet/s.
    • Either use an existing VPC Infrastructure or you can use the following VPC Template to create a one.
  2. Available EIP
Supported Regions
  1. us-west-2
  2. us-east-1
Create Details
  1. EC2 Instance
  2. EIP
  3. IAM Role
  4. IAM Instance Profile
  5. Security Group
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/chef-compliance.yml
Launch
View in Designer
View in Designer

CodeBuild and AWS Developer Tools SuiteLab

Automates the integration between AWS CodeBuild, CodeCommit, CodeDeploy, and CodePipeline

Prerequisites
  1. EC2 Key Pair
Supported Regions
  1. us-east-1
Create Details
  1. IAM Roles
  2. EC2 instance (for CodeDeploy)
  3. CodeCommit
  4. CodeDeploy
  5. CodePipeline
Launch

us-east-1

View in Designer
View in Designer
How To Video
HowTo Video

CodeCommit CodePipeline Lab

Automates the integration between AWS CodeCommit and CodePipeline

Prerequisites
  1. EC2 Key Pair
  2. CodeCommit Repo
Supported Regions
  1. us-east-1
Create Details
  1. IAM InstanceProfile, Policy, and Roles
  2. EC2 Instance for CodeDeploy
  3. CodeDeploy
  4. CodePipeline with CodeCommit Integration
Launch

us-east-1

View in Designer
View in Designer

CodePipeline Approvals Labs

Adds a Manual Approval to a CodePipeline

Prerequisites
  1. CodeCommit Repository
Supported Regions
  1. us-east-1
Create Details
  1. IAM Policy and Roles
  2. AWS Lambda Function
  3. SNS
  4. CodePipeline
Launch

us-east-1

View in Designer
View in Designer
How To Video
HowTo Video

Containerized CI Solutions in AWS: Jenkins in ECS Lab

Containerized CI Solutions in AWS: Jenkins in ECS

Prerequisites
  1. EC2 Key Pair
Supported Regions
  1. us-east-1
Create Details
  1. VPC and associated resources
  2. IAM
  3. EFS
  4. EC2 Instances
  5. Auto Scaling
  6. ELB
  7. ECS Service, Cluster, Task Definition
Launch

us-east-1

View in Designer
View in Designer

EC2 Container Service Lab

Automates the integration between EC2 Container Service (ECS), EC2 Container Registry (ECR), CodeCommit, and CodePipeline

Prerequisites
  1. EC2 Key Pair
  2. Existing Docker Image
  3. CodeCommit Repository
  4. ECR Repository
Supported Regions
  1. us-east-1
Create Details
  1. Virtual Private Cloud (VPC) (and associated resources)
  2. Auto Scaling Group, Auto Scaling Launch Configuration
  3. ECS Cluster, ECS Service, ECS Task Definition
  4. Elastic Load Balancer
  5. IAM Instance Profile, IAM Roles
  6. EC2 Instance (Jenkins, Docker)
  7. CodePipeline with CodeCommit Integration
Launch

us-east-1

View in Designer
View in Designer

Elastic Beanstalk CodePipeline Lab

Automates the integration between AWS Elastic Beanstalk and CodePipeline

Prerequisites
  1. CodeCommit Repo
Supported Regions
  1. us-east-1
Create Details
  1. IAM InstanceProfile, Policy, and Roles
  2. Elastic Beanstalk - ConfigurationTemplate, Environment
  3. CodePipeline with CodeCommit Integration
Launch

us-east-1

View in Designer
View in Designer

Mediawiki on Nginx

Create S3 Backup Bucket

Prerequisites
  1. VPC
  2. Public Subnet
  3. Internal Access Security Group
  4. RDS Security Group
  5. EFS Security Group
Create Details
  1. Single Amazon Linux EC2 Instance
  2. Create Web Access Security Group
  3. Create IAM Instance Profile Role
  4. Create CloudWatch Logs Group
  5. No External IP
Deploy Details
  1. Installs Nginx
  2. Installs PHP-FPM 7.0
  3. Installs MySQL 5.6 Client
  4. Installs Specfic Release of Mediawiki (Default REL1_28)
  5. Installs Creates Nginx Config for Mediawiki
  6. Assumes RDS Backend
  7. Assumes EFS Shared Content Mount
Launch

Mock Stages and Actions in AWS CodePipeline and AWS Lambda

Creates a deployment pipeline in AWS CodePipeline using a pre-built Lambda function. It can be used to model a pipeline without initial implementation

Prerequisites
  1. AWS Account
Supported Regions
  1. us-east-1
Create Details
  1. Amazon S3 bucket for CodePipeline artifacts
  2. AWS SNS Topic
  3. AWS IAM Policy and Roles
  4. AWS Lambda Function
  5. AWS CodePipeline Stages and Actions
Launch

us-east-1

View in Designer
View in Designer

OpsWorks CodePipeline Lab

Automates the integration between AWS OpsWorks, CodeCommit and CodePipeline

Prerequisites
  1. EC2 Key Pair
Supported Regions
  1. us-east-1
Create Details
  1. IAM InstanceProfile, Policy, and Roles
  2. SecurityGroupIngress and SecurityGroup
  3. OpsWorks Stack, Layer, App and Instance
  4. CodePipeline
Launch

us-east-1

View in Designer
View in Designer

Pipeline for Single-Page Appliation

Creates an S3 bucket to host a single-page application and a continuous delivery pipeline with CodeBuild and CodePipeline.

Prerequisites
  1. GitHub token (with access to repo and admin:repo_hook)
Supported Regions
  1. us-east-1
  2. us-west-2
Create Details
  1. IAM Role for CodePipeline
  2. IAM Role for CodeBuild
  3. S3 Bucket
  4. CodeBuild Project
  5. CodePipeline Project
Launch

us-west-2

us-east-1

Test Instances

Creates three test instances in an existing VPC. Each instance is a different operating system. They are; Red Hat Enterprise Linux 7, Ubuntu 14 and Windows 2012 R2.

Create Details
  1. 3 EC2 Instances
  2. IAM Role
  3. IAM Instance Profile
Public S3 URL
    https://s3.amazonaws.com/stelligent-public/cloudformation-templates/github/rhel-ubuntu-win2012.yml
Launch
View in Designer
View in Designer

Wordpress on Nginx

Create S3 Backup Bucket

Prerequisites
  1. VPC
  2. Public Subnet
  3. Internal Access Security Group
  4. RDS Security Group
  5. EFS Security Group
Create Details
  1. Single Amazon Linux EC2 Instance
  2. Create Web Access Security Group
  3. Create IAM Instance Profile Role
  4. Create CloudWatch Logs Group
  5. No External IP
Deploy Details
  1. Installs Nginx
  2. Installs PHP-FPM 7.0
  3. Installs MySQL 5.6 Client
  4. Installs Latest Wordpress
  5. Installs Creates Nginx Config for Wordpress
  6. Assumes RDS Backend
  7. Assumes EFS Shared Content Mount
Launch

Back to Top

More Repositories

1

cfn_nag

Linting tool for CloudFormation templates
Ruby
1,253
star
2

mu

A full-stack DevOps on AWS framework
Go
973
star
3

config-lint

Command line tool to validate configuration files
HCL
193
star
4

devops-essentials

Source code samples for DevOps Essentials on AWS Complete Video Course
HTML
161
star
5

pipeline-dashboard

Simple dashboard for pipelines on AWS
JavaScript
155
star
6

cloudformation-custom-resources

Java
122
star
7

dromedary

Sample app to demonstrate a working pipeline using Infrastructure as Code and AWS Code Services
JavaScript
106
star
8

stelligent-u

Templates and code for Stelligent U lessons
JavaScript
98
star
9

sagemaker-pipeline

Sagemaker pipeline for AWS Summit New York
Python
58
star
10

devopsinthecloud

HTML
50
star
11

stelligent_commons

Scripts and other utilities we commonly use
Ruby
48
star
12

aws-devsecops-workshop

A continuous security pipeline demo for the AWS DevSecOps Workshop.
Ruby
45
star
13

cfn-leaprog

cfn-LEAst-Privilege-ROle-Generator: Experimental tool for generating least privileged IAM roles for CloudFormation and Service Catalog Launch Constraints.
Ruby
40
star
14

dromedary-serverless

Dromedary...without servers.
JavaScript
38
star
15

serverspec-aws-resources

Some serverspec resources to allow testing AWS resources. This repository is deprecated - you should instead use: https://github.com/k1LoW/awspec
Ruby
27
star
16

microservice-exemplar

Sample microservice built with Spring Boot to manage bananas. 🍌
Java
23
star
17

mutato

Repo formerly known as mu-cdk. A.K.A Mu2. Pronounced: mew-tah-toe
TypeScript
23
star
18

config-rule-status

A project to create AWS Config Rules and use them to test AWS Resource compliance.
JavaScript
21
star
19

skaffold_on_aws

example of running skaffold on an aws eks cluster
HTML
21
star
20

continuous_integration_example

Demo project for Continuous Integration - from the book Continuous Integration (Duvall, et. al)
XSLT
20
star
21

opendelivery_platform

Open platform for CD
Ruby
17
star
22

tophat

If I have to stand up a Jenkins server ONE MORE TIME, I'm going to turn this car around!
Ruby
12
star
23

asgard-in-the-cloud

Setup Asgard in ten minutes using a CloudFormation and Chef.
Ruby
11
star
24

potemkin-decorator

Potemkin is a decorator to setup initial conditions for a boto "integration test" with real AWS services via CloudFormation, and to tear them down as well.
Python
11
star
25

keystore

Secure storage of secrets using Amazon Web Services
Ruby
10
star
26

crossing

Utility for storing objects in S3 while taking advantage of client side envelope encryption with KMS
Ruby
10
star
27

packer-ami-pipeline

Demo CodePipeline for building and publishing AMIs with Packer
Ruby
10
star
28

cfn-nag-pipeline

Lambda function to run cfn_nag in CodePipeline
Ruby
10
star
29

stelligent_pipelines

CI/CD pipelines
Shell
9
star
30

crossing-go

Utility for storing objects in S3 while taking advantage of client side envelope encryption with KMS
Go
9
star
31

aws-anchore-engine-scanner

This guide details steps and procedures you can follow to create, launch and implement your own standalone container scanning solution within AWS ecosystem. This approach uses an opensource container scanning tool called Anchore Engine as a proof-of-concept and provides examples of how Anchore integrates with your favorite CI/CD systems orchestration platforms.
Python
9
star
32

minimal-pipeline-gem

Minimal helpers for automating CloudFormation pipelines with ruby
Ruby
8
star
33

python-testing

Examples of testing with python related to AWS boto3 use
Python
7
star
34

zap

Build tools for OWASP Zed Attack Proxy
Ruby
7
star
35

cloudpatrol

Rails App for AWS Policy Management and Cleanup
Ruby
7
star
36

cfn-model

An object model for CloudFormation templates
Ruby
6
star
37

cfnctl

Control Cloudformation lifecycle
Python
6
star
38

inspector-status

A pipeline plugin to get the AWS Inspector findings from AWS Resources
Ruby
6
star
39

stelligent_demo

Python
6
star
40

aws_group_policy

templates for creating a full privilege group and a read only group, as well as a script for moving non-mfa'd users from the privileged group to the read only group
Ruby
6
star
41

aws-inspector-quickstart

aws-inspector-quickstart
Python
6
star
42

test-platform

Python
5
star
43

cfn_nag_examples

5
star
44

lockdown

AWS Emergency Compromise Response
Python
5
star
45

openvpn-ami

Automation for generating an OpenVPN AMI
Ruby
5
star
46

aws-int-test-rspec-helper

RSpec helper for doing AWS SDK integration testing
Ruby
5
star
47

ciexample_jenkins

5
star
48

honolulu_jenkins_cookbooks

Cookbooks for spinning up a Jenkins Server for the Honolulu Answers application
Ruby
5
star
49

jenkins_chef_cookbooks

A collection of cookbooks used to set up a Jenkins server
Ruby
4
star
50

empty-stack

Creating an empty stack in cloudformation to reduce the errors on creation.
Python
4
star
51

yq

YAML query, tool for querying YAML from the command line
Go
4
star
52

mu-cloud9

mu extension for AWS Cloud9
4
star
53

vpc-with-client-vpn

Shell
4
star
54

developer-sandboxes

Using Access Based Access Controls (Tags) in AWS to create Developer Sandboxes for EC2.
Python
4
star
55

stellitime-api

Example mini-app to use during interview process.
Python
3
star
56

cfn-nag-service

Exposes cfn-nag as a service through a Lambda/APIGW or Docker image
Ruby
3
star
57

drifter

Demo of CloudFormation Drift Detection
Shell
3
star
58

stelligent_jenkins_cookbooks

Cloudformation template, startup script, OpsWorks repo for setting up a production account VPC + Jenkins instance
Ruby
3
star
59

ghost-in-shell

Stelligent ghost in shell project repository
CSS
3
star
60

cloud-custodian-example

Example project for Cloud Custodian deployment using CloudFormation
3
star
61

cumulogenesis

Python
3
star
62

nando_automation_demo

nando_automation_demo
Python
3
star
63

sample-pipeline-with-cfn-nag

Sample repository to demonstrate using cfn_nag in CodePipeline
Makefile
3
star
64

deploy-button

functions and templates to have a deploy button for your code pipeline
Python
3
star
65

hab-demo-pipeline

POC for automating Habitat with AWS CodePipeline
JavaScript
2
star
66

utility-vagrants

A collection of utility VMs defined in a Vagrantfile
Shell
2
star
67

hamburgerstore

Data store for pipeline instance metadata. Nothing to do with hamburgers. Sorry.
Ruby
2
star
68

jenkins-factory

Ruby
2
star
69

banana-service

Sample microservice for mu Edit Add topics
Java
2
star
70

amz-linux-hardening

Ruby
2
star
71

aws-stubs-intro

Demonstrates the use of AWS Stubs for the Ruby v2 SDK
Ruby
2
star
72

devopsinthecloudpuppet

Puppet
2
star
73

jenkins_cookbooks

This is Stelligent's open source Jenkins server setup. It only have a few Jenkins-server-maintenance jobs, but is designed to be easily extended to create a pipeline for your application.
Ruby
2
star
74

mu-cfn_nag

mu extension for adding cfn_nag to your pipeline
2
star
75

parameter-store-example

Shows an example how to use the AWS Parameter Store Service
Ruby
2
star
76

serverless-synchronous-resource-plugin

Serverless plugin for deploying custom CFN stacks
JavaScript
2
star
77

mu-extension-example

JavaScript
2
star
78

docker-api-ecr-sample

Ruby
2
star
79

devopsinthecloudjenkins

1
star
80

mu-pipeline-dashboard

mu extension for Stelligent's Pipeline Dashboard
1
star
81

mu-elasticsearch

1
star
82

mu-minimal-ec2

Continuous Delivery for Microservices on EC2 with mu
Shell
1
star
83

iam_complexity_metrics

Experimenting with the notion of complexity metrics for IAM policy documents
Ruby
1
star
84

aws-trend-micro-dssc

An example of how to integrate Trend Micro Deep Security Smart Check with AWS CodePipeline
Makefile
1
star
85

dns-test

Testing multi-account public hosted zones
HTML
1
star
86

cfn-man

command line documentation for cloud formation resources
Python
1
star
87

MySQL-Vault

Shell
1
star
88

BenchOps-Resources

Useful resources from the bench
1
star
89

homebrew-tap

This is Stelligent's homebrew tap. Formulas should go in here.
Ruby
1
star
90

mu-workshop-lab1

Lab for learning mu
Java
1
star
91

lz-lambdas

Landing Zone Lambda Code
Python
1
star
92

iot-pipeline

JavaScript
1
star
93

elastic-volumes-lambda

Lambda and example terraform to demo automation of elastic volume live modifications
HCL
1
star
94

mu-workshop-lab2

Lab for learning mu
1
star
95

jenkins-worker-base

Provide a base docker image for jenkins workers
Shell
1
star
96

munatra

Mu implementation with Sinatra 'Hello World' app and CasperJS acceptance testing.
Ruby
1
star
97

opendelivery_jenkins

1
star
98

mu-workshop-lab3

Lab for learning mu
Java
1
star
99

cfn-nag-rule-repository-complete

Ruby
1
star
100

chat-app

A simple chat application for demo purposes
CSS
1
star