Skip to content

Commit

Permalink
removed new lines after h2 and h3
Browse files Browse the repository at this point in the history
  • Loading branch information
michaelwittig committed Aug 17, 2016
1 parent 93075fd commit d05aad9
Show file tree
Hide file tree
Showing 8 changed files with 0 additions and 26 deletions.
1 change: 0 additions & 1 deletion ec2/DEV.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
# Developer notes

## RegionMap

To update the region map execute the following lines in your terminal:

```
Expand Down
2 changes: 0 additions & 2 deletions ec2/README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,11 @@
# EC2 Templates for AWS CloudFormation

## EC2 with auto-recovery

This template describes an EC2 instance with auto-recovery. If the instance fails it will be replaced automatically. All data stored on EBS volumes will still be available. The public and private IP address won't change. Auto-recovery does only work inside of a single availability zone (AZ).

![Architecture](./ec2-auto-recovery.png?raw=true "Architecture")

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=ec2-auto-recovery&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/ec2/ec2-auto-recovery.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand Down
1 change: 0 additions & 1 deletion jenkins/DEV.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
# Developer notes

## RegionMap

To update the region map execute the following lines in your terminal:

```
Expand Down
6 changes: 0 additions & 6 deletions security/README.md
Original file line number Diff line number Diff line change
@@ -1,11 +1,9 @@
# Security Templates for AWS CloudFormation

## CloudTrail across all regions

This template enables CloudTrail to records AWS API calls across all regions in your AWS account. API calls are archived in S3 and also pushed CloudWatch Logs. If new API calls are available in S3 a SNS topic is notified.

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=security-cloudtrail&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/security/cloudtrail.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand All @@ -16,7 +14,6 @@ This template enables CloudTrail to records AWS API calls across all regions in
1. Wait until the stack reaches the state **CREATE_COMPLETE**

## Account Password Policy

This template creates an account password policy for your IAM users. You can:

* set IAM user passwords to be valid for only the specified number of days.
Expand All @@ -32,7 +29,6 @@ This template creates an account password policy for your IAM users. You can:
Or just use the suggested defaults.

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=security-account-password-policy&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/security/account-password-policy.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand All @@ -43,11 +39,9 @@ Or just use the suggested defaults.
1. Wait until the stack reaches the state **CREATE_COMPLETE**

## AWS Config setup

This template enables AWS Config to deliver a AWS resource inventory to S3.

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=security-config&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/security/config.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand Down
2 changes: 0 additions & 2 deletions static-website/README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,11 @@
# Static Website Templates for AWS CloudFormation

## Static website with CDN

This template describes the infrastructure for hosting a static website behind a CDN.

![Architecture](./static-website.png?raw=true "Architecture")

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=ec2-auto-recovery&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/static-website/static-website.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand Down
1 change: 0 additions & 1 deletion vpc/DEV.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,6 @@
# Developer notes

## RegionMap

To update the region map execute the following lines in your terminal:

```
Expand Down
10 changes: 0 additions & 10 deletions vpc/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,13 +3,11 @@
A VPC is a virtual network inside AWS where you can isolate your setup using private IP addresses. A VPC consists of several subnets. Each subnet is bound to an Availability Zone. A **public** subnet has a direct route to the Internet. As long as your EC2 instances have an public IP they can communicate (in and out) with the Internet. A **private** subnet does not have a route to the Internet. Instances in private subnets can not be accessed from the public Internet. If you want to access the Internet from a private subnet you need to create a NAT instance.

## VPC with private and public subnets in two Availability Zones

This template describes a VPC with two private and two public subnets.

![Architecture](./vpc-2azs.png?raw=true "Architecture")

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=vpc-2azs&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/vpc/vpc-2azs.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand All @@ -19,13 +17,11 @@ This template describes a VPC with two private and two public subnets.
1. Wait until the stack reaches the state **CREATE_COMPLETE**

## VPC with private and public subnets in three Availability Zones

This template describes a VPC with three private and three public subnets.

![Architecture](./vpc-3azs.png?raw=true "Architecture")

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=vpc-3azs&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/vpc/vpc-3azs.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand All @@ -35,13 +31,11 @@ This template describes a VPC with three private and three public subnets.
1. Wait until the stack reaches the state **CREATE_COMPLETE**

## VPC with private and public subnets in four Availability Zones

This template describes a VPC with four private and four public subnets.

![Architecture](./vpc-4azs.png?raw=true "Architecture")

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=vpc-4azs&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/vpc/vpc-4azs.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand All @@ -51,13 +45,11 @@ This template describes a VPC with four private and four public subnets.
1. Wait until the stack reaches the state **CREATE_COMPLETE**

## NAT Gateway

This template describes a NAT Gateway that forwards HTTP, HTTPS and NTP traffic from private subnets to the Internet.

![Architecture](./vpc-nat-gateway.png?raw=true "Architecture")

### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=vpc-nat-gateway&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/vpc/vpc-nat-gateway.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand All @@ -68,12 +60,10 @@ This template describes a NAT Gateway that forwards HTTP, HTTPS and NTP traffic
1. Wait until the stack reaches the state **CREATE_COMPLETE**

## NAT instance

This template describes a **highly available** Network Address Translation (NAT) instance that forwards HTTP, HTTPS and NTP traffic from private subnets to the Internet.

![Architecture](./vpc-nat-instance.png?raw=true "Architecture")
### Installation Guide

1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=vpc-nat-instance&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/vpc/vpc-nat-instance.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
1. Specify a name and all parameters for the stack.
Expand Down
3 changes: 0 additions & 3 deletions wordpress/README.md
Original file line number Diff line number Diff line change
@@ -1,13 +1,11 @@
# Wordpress Templates for AWS CloudFormation

## Wordpress: fault tolerant + scalable

This template describes a **fault tolerant** and **scalable** Wordpress environment.

![Architecture](./wordpress-ha.png?raw=true "Architecture")

### Installation Guide

1. This templates depends on one of our [VPC templates](/vpc-templates-for-aws-cloudformation/). Please create a VPC stack first: <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=vpc-2azs&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/vpc/vpc-2azs.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. <a href="https://console.aws.amazon.com/cloudformation/home#/stacks/new?stackName=wordpress-ha&templateURL=https://s3-eu-west-1.amazonaws.com/widdix-aws-cf-templates/wordpress/wordpress-ha.json"><img src="../cloudformation-launch-stack.png?raw=true" alt="Launch Stack"></a>
1. Click **Next** to proceed with the next step of the wizard.
Expand All @@ -20,7 +18,6 @@ This template describes a **fault tolerant** and **scalable** Wordpress environm
1. Grab the URL of the Wordpress environment from the **Outputs** tab of your stack.

### Limitations

Installing and updating core, plugins and themes is disabled. You need to edit the `/root/config.sh` to change core, plugins and themes during bootstrapping of EC2 instances.

## Support
Expand Down

0 comments on commit d05aad9

Please sign in to comment.