Find the Exponential Software extensions you want
UNIX name | Owner | Status |
---|---|---|
ansible-role-aws-tools | 7x | stable |
Version | Compatible with |
---|---|
N/A | N/A |
In vars file main.yaml there are the variables to select which components install or not.
Override them with value false to not install that role. By default all variables are true and all components are installed
Add this repository in the roles folder of your playbook and use it as normale role.
For example for an ubuntu instance:
---
- hosts: all
remote_user: ubuntu
become: yes
become_method: sudo
roles:
- ansible-role-aws-tools
Define a logs variable in your task to include and format logs. For example:
vars:
- logs:
- file: /var/log/tomcat8/spring.log
format: "%Y-%m-%d %H:%M:%S.%f"
group_name: spring
- file: /var/log/auth.log
group_name: auth.log
format: "%H: %M: %S%y%b%-d"
To ensure that the metrics, log, codedeploy agent work correctly assign to EC2 instance a role with the following permssion:
Cloudformation yaml format:
- PolicyName: metrics
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- cloudwatch:PutMetricData
- cloudwatch:GetMetricStatistics
- cloudwatch:ListMetrics
- ec2:DescribeTags
Resource:
- '*'
JSON Format:
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"cloudwatch:PutMetricData",
"cloudwatch:GetMetricStatistics",
"cloudwatch:ListMetrics"
],
"Effect": "Allow",
"Resource": "*"
}
]
}
Cloudformation yaml format:
- PolicyName: logs
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- logs:CreateLogGroup
- logs:CreateLogStream
- logs:PutLogEvents
- logs:DescribeLogStreams
Resource:
- arn:aws:logs:*:*:*
JSON format
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"logs:CreateLogGroup",
"logs:CreateLogStream",
"logs:PutLogEvents",
"logs:DescribeLogStreams"
],
"Effect": "Allow",
"Resource": "arn:aws:logs:*:*:*"
}
]
}
- PolicyName: s3-codedeploy
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- s3:Get*
- s3:List*
Resource:
- arn:aws:s3:::bucket-name-for-codedeploy-archive/*
JSON Format:
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"s3:Get*",
"s3:List*"
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::bucket-name-for-codedeploy-archive/*"
}
]
}
- PolicyName: associateEIP
PolicyDocument:
Version: '2012-10-17'
Statement:
- Effect: Allow
Action:
- ec2:AssociateAddress
- ec2:Describe*
Resource: "*"