aws_vpc
This role will create VPC with specified CIDR IP
Prerequisites
To run this role successfully you must have already installed the AWS CLI.
Also, you need to have AWS user credentials configured via aws configure
command or simply export AWS_ACCESS_KEY_ID
and AWS_SECRET_ACCESS_KEY
environment variables with your corresponding AWS username credentials prior running this role.
Role Variables
mas_config_dir
Generate k8 resources like username and password Secret for created user will be saved in this directory
- Required
- Environment Variable:
MAS_CONFIG_DIR
- Default Value: None.
aws_region
Specify AWS Region where vpc will be created
- Optional
- Environment Variable:
AWS_REGION
- Default Value:
us-east-1
vpc_action
Specify action(provision/deprovision) to performed by the role
- Optional
- Environment Variable:
VPC_ACTION
- Default Value:
provision
vpc_cidr
Specify IP Address CIDR range for VPC
- Required
- Environment Variable:
VPC_CIDR
- Default Value: None
vpc_name
Specify Name for VPC
- Required
- Environment Variable:
VPC_NAME
- Default Value: None
Example Playbook
- hosts: localhost
vars:
mas_config_dir: ~/masconfig
vpc_name: test-vpc
vpc_cidr: 10.0.0.0/16
vpc_action: provision
roles:
- ibm.mas_devops.aws_vpc
Run Role Playbook
After installing the Ansible Collection you can easily run the role standalone using the run_role
playbook provided.
export VPC_NAME=test-vpc
export VPC_CIDR='10.0.0.0/16'
export VPC_ACTION=provision
export MAS_CONFIG_DIR=/pathtoconfig
ROLE_NAME=aws_vpc ansible-playbook ibm.mas_devops.run_role
License
EPL-2.0