Marco Hoyer
Marco Hoyer
People working with several AWS accounts might deploy a stack config into a wrong account by accident. Cfn-Sphere should somehow protect from this. Maybe by a stack config property like...
As recently decribed in https://aws.amazon.com/de/about-aws/whats-new/2016/11/aws-cloudformation-supports-aws-serverless-application-model-aws-lambda-environment-variables-and-new-cli-commands CloudFormation introduces some kind of template mechanism for serverless apps called SAM (serverless application model). The idea is to have pseudo resources like "AWS::Serverless::Function" in...
AWS introduced StackSets which allow to deploy stacks for several accounts and regions. This is a pretty interesting feature which should be supported in cfn-sphere. https://aws.amazon.com/de/blogs/aws/use-cloudformation-stacksets-to-provision-resources-across-multiple-aws-accounts-and-regions/?sc_channel=sm&sc_campaign=Launch&sc_publisher=TWITTER&sc_country=Global&sc_geo=GLOBAL&sc_outcome=awareness&sc_content=launch_7feab086&sc_category=AWS_CloudFormation&linkId=40192023
To improve visibility into stack dependencies, such a tag could be a good idea.
AWS introduced a new feature for change prediction called change sets (https://aws.amazon.com/de/blogs/aws/new-change-sets-for-aws-cloudformation/?sc_channel=sm&sc_campaign=launches_2016&sc_publisher=tw_go&sc_content=change_sets_cloudformation&sc_country=global&sc_geo=global&sc_category=cloudformation&adbsc=social_20160329_59922656&adbid=714956683982741504&adbpl=tw&adbpr=66780587). This is what cfn-sphere should support to allow users to see what a change to their template or...
Hi there, I would prefer the resource creation to be done by cloudformation templates. For VPC for example this would mean to ignore the default VPC and maybe always delete...