Amazon VPC deployment tool
Project description
# Floresta - VPC automation tool
## Installing
```sh
pip install floresta
```
## Creating the whole VPC
it takes around 10 minutes to create a brand new VPC from scratch: all
the security groups, subnets, route tables, ec2 instances, internet
gateway, stitch them together and run their ansible playbooks, if you want to.
```sh
# supposing that you keep your vpc yaml files inside of ./vpcs/
floresta vpcs/myvpc.yml
```
# Amazon Policy
When running boteco with `--ensure-vpc` your user will need the following policy
```json
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:CreateTags",
"ec2:CreateVpc",
"ec2:CreateSubnet",
"ec2:DescribeAvailabilityZones",
"ec2:CreateRouteTable",
"ec2:CreateRoute",
"ec2:CreateInternetGateway",
"ec2:AttachInternetGateway",
"ec2:AssociateRouteTable",
"ec2:ModifyVpcAttribute",
"ec2:DescribeInternetGateways",
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"ec2:DescribeRouteTables",
"ec2:DescribeAddresses",
"ec2:DescribeSecurityGroups",
"ec2:DescribeNetworkAcls",
"ec2:DescribeDhcpOptions",
"ec2:DescribeTags",
"ec2:DescribeInstances",
"ec2:DescribeInstanceStatus",
"ec2:DeleteRoute",
"route53:GetHostedZone",
"route53:ListResourceRecordSets",
"route53:ChangeResourceRecordSets",
"ec2:AttachVolume",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupEgress",
"ec2:RevokeSecurityGroupIngress",
"ec2:RunInstances",
"ec2:StartInstances",
"ec2:CreateVpcPeeringConnection",
"ec2:AcceptVpcPeeringConnection",
"ec2:CreateSecurityGroup",
"ec2:ModifyInstanceAttribute"
],
"Resource": "*",
"Effect": "Allow"
}
]
}
```
## Installing
```sh
pip install floresta
```
## Creating the whole VPC
it takes around 10 minutes to create a brand new VPC from scratch: all
the security groups, subnets, route tables, ec2 instances, internet
gateway, stitch them together and run their ansible playbooks, if you want to.
```sh
# supposing that you keep your vpc yaml files inside of ./vpcs/
floresta vpcs/myvpc.yml
```
# Amazon Policy
When running boteco with `--ensure-vpc` your user will need the following policy
```json
{
"Version": "2012-10-17",
"Statement": [
{
"Action": [
"ec2:CreateTags",
"ec2:CreateVpc",
"ec2:CreateSubnet",
"ec2:DescribeAvailabilityZones",
"ec2:CreateRouteTable",
"ec2:CreateRoute",
"ec2:CreateInternetGateway",
"ec2:AttachInternetGateway",
"ec2:AssociateRouteTable",
"ec2:ModifyVpcAttribute",
"ec2:DescribeInternetGateways",
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"ec2:DescribeRouteTables",
"ec2:DescribeAddresses",
"ec2:DescribeSecurityGroups",
"ec2:DescribeNetworkAcls",
"ec2:DescribeDhcpOptions",
"ec2:DescribeTags",
"ec2:DescribeInstances",
"ec2:DescribeInstanceStatus",
"ec2:DeleteRoute",
"route53:GetHostedZone",
"route53:ListResourceRecordSets",
"route53:ChangeResourceRecordSets",
"ec2:AttachVolume",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:RevokeSecurityGroupEgress",
"ec2:RevokeSecurityGroupIngress",
"ec2:RunInstances",
"ec2:StartInstances",
"ec2:CreateVpcPeeringConnection",
"ec2:AcceptVpcPeeringConnection",
"ec2:CreateSecurityGroup",
"ec2:ModifyInstanceAttribute"
],
"Resource": "*",
"Effect": "Allow"
}
]
}
```
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
floresta-0.0.4.tar.gz
(17.8 kB
view hashes)