Creates a stack as specified in the template
Creates a stack as specified in the template. After the call completes
successfully, the stack creation starts. You can check the status of the
stack via the describe_stacks
API.
cloudformation_create_stack(StackName, TemplateBody, TemplateURL, Parameters, DisableRollback, RollbackConfiguration, TimeoutInMinutes, NotificationARNs, Capabilities, ResourceTypes, RoleARN, OnFailure, StackPolicyBody, StackPolicyURL, Tags, ClientRequestToken, EnableTerminationProtection)
StackName |
[required] The name that is associated with the stack. The name must be unique in the Region in which you are creating the stack. A stack name can contain only alphanumeric characters (case sensitive) and hyphens. It must start with an alphabetic character and cannot be longer than 128 characters. |
TemplateBody |
Structure containing the template body with a minimum length of 1 byte and a maximum length of 51,200 bytes. For more information, go to Template Anatomy in the AWS CloudFormation User Guide. Conditional: You must specify either the |
TemplateURL |
Location of file containing the template body. The URL must point to a template (max size: 460,800 bytes) that is located in an Amazon S3 bucket. For more information, go to the Template Anatomy in the AWS CloudFormation User Guide. Conditional: You must specify either the |
Parameters |
A list of |
DisableRollback |
Set to Default: |
RollbackConfiguration |
The rollback triggers for AWS CloudFormation to monitor during stack creation and updating operations, and for the specified monitoring period afterwards. |
TimeoutInMinutes |
The amount of time that can pass before the stack status becomes
CREATE_FAILED; if |
NotificationARNs |
The Simple Notification Service (SNS) topic ARNs to publish stack related events. You can find your SNS topic ARNs using the SNS console or your Command Line Interface (CLI). |
Capabilities |
In some cases, you must explicitly acknowledge that your stack template contains certain capabilities in order for AWS CloudFormation to create the stack.
|
ResourceTypes |
The template resource types that you have permissions to work with for
this create stack action, such as If the list of resource types doesn't include a resource that you're creating, the stack creation fails. By default, AWS CloudFormation grants permissions to all resource types. AWS Identity and Access Management (IAM) uses this parameter for AWS CloudFormation-specific condition keys in IAM policies. For more information, see Controlling Access with AWS Identity and Access Management. |
RoleARN |
The Amazon Resource Name (ARN) of an AWS Identity and Access Management (IAM) role that AWS CloudFormation assumes to create the stack. AWS CloudFormation uses the role's credentials to make calls on your behalf. AWS CloudFormation always uses this role for all future operations on the stack. As long as users have permission to operate on the stack, AWS CloudFormation uses this role even if the users don't have permission to pass it. Ensure that the role grants least privilege. If you don't specify a value, AWS CloudFormation uses the role that was previously associated with the stack. If no role is available, AWS CloudFormation uses a temporary session that is generated from your user credentials. |
OnFailure |
Determines what action will be taken if stack creation fails. This must
be one of: DO_NOTHING, ROLLBACK, or DELETE. You can specify either
Default: |
StackPolicyBody |
Structure containing the stack policy body. For more information, go to
Prevent Updates to Stack Resources
in the AWS CloudFormation User Guide. You can specify either the
|
StackPolicyURL |
Location of a file containing the stack policy. The URL must point to a
policy (maximum size: 16 KB) located in an S3 bucket in the same Region
as the stack. You can specify either the |
Tags |
Key-value pairs to associate with this stack. AWS CloudFormation also propagates these tags to the resources created in the stack. A maximum number of 50 tags can be specified. |
ClientRequestToken |
A unique identifier for this
All events triggered by a given stack operation are assigned the same
client request token, which you can use to track operations. For
example, if you execute a In the console, stack operations display the client request token on the
Events tab. Stack operations that are initiated from the console use the
token format Console-StackOperation-ID, which helps you easily
identify the stack operation . For example, if you create a stack using
the console, each stack event would be assigned the same token in the
following format:
|
EnableTerminationProtection |
Whether to enable termination protection on the specified stack. If a user attempts to delete a stack with termination protection enabled, the operation fails and the stack remains unchanged. For more information, see Protecting a Stack From Being Deleted in the AWS CloudFormation User Guide. Termination protection is disabled on stacks by default. For nested stacks, termination protection is set on the root stack and cannot be changed directly on the nested stack. |
A list with the following syntax:
list( StackId = "string" )
svc$create_stack( StackName = "string", TemplateBody = "string", TemplateURL = "string", Parameters = list( list( ParameterKey = "string", ParameterValue = "string", UsePreviousValue = TRUE|FALSE, ResolvedValue = "string" ) ), DisableRollback = TRUE|FALSE, RollbackConfiguration = list( RollbackTriggers = list( list( Arn = "string", Type = "string" ) ), MonitoringTimeInMinutes = 123 ), TimeoutInMinutes = 123, NotificationARNs = list( "string" ), Capabilities = list( "CAPABILITY_IAM"|"CAPABILITY_NAMED_IAM"|"CAPABILITY_AUTO_EXPAND" ), ResourceTypes = list( "string" ), RoleARN = "string", OnFailure = "DO_NOTHING"|"ROLLBACK"|"DELETE", StackPolicyBody = "string", StackPolicyURL = "string", Tags = list( list( Key = "string", Value = "string" ) ), ClientRequestToken = "string", EnableTerminationProtection = TRUE|FALSE )
Please choose more modern alternatives, such as Google Chrome or Mozilla Firefox.