Lab complete!
Now that you have completed this lab, make sure to update your Well-Architected review if you have implemented these changes in your workload.
Click here to access the Well-Architected Tool
This portion of the lab shows you how to deploy an EC2 instance using a CloudFormation template. The CloudFormation template will deploy the following:
security-lab-stack.yaml
template you downloaded.security-cw-lab
. Note the name down, as you will need to re-visit this stack for Outputs later on.DisplayedName
field, this will be the name that appears on your sample website!BucketName
field. Amazon S3 bucket names are globally unique, and the namespace is shared by all AWS accounts, so make sure your bucket is names as uniquely as possible. For example: wa-lab-<your-account-id>-<date>
.LatestAmiId
field. This uses a public parameter stored in Systems Manager Parameter Store that will automatically use the latest Amazon Machine Image (AMI) for the EC2 instance.No changes are needed on the Configure Stack Options page. Click through Next.
On the Review page, check the box in the Capabilities section to allow the creation of an IAM role. This selection gives the CloudFormation template permission to create IAM roles - in particular, the role used to allow the EC2 instance to interact with SSM and CloudWatch. Click Create Stack. You will be taken back to the CloudFormation console, where your stack will be launched.
CREATE COMPLETE
, click on the Outputs tab and click on the WebsiteURL
, you will be brought to your sample web server.Recap: In this portion of the lab, you deployed a CloudFormation stack to create the base resources needed for this lab.
Now that you have completed this lab, make sure to update your Well-Architected review if you have implemented these changes in your workload.
Click here to access the Well-Architected Tool