Cloud Modules
Amazon
- cloudformation - Create or delete an AWS CloudFormation stack
- cloudtrail (E) - manage CloudTrail creation and deletion
- dynamodb_table (E) - Create, update or delete AWS Dynamo DB tables.
- ec2 - create, terminate, start or stop an instance in ec2
- ec2_ami - create or destroy an image in ec2
- ec2_ami_copy (E) - copies AMI between AWS regions, return new image id
- ec2_ami_find - Searches for AMIs to obtain the AMI ID and other information
- ec2_ami_search (D) - Retrieve AWS AMI information for a given operating system.
- ec2_asg - Create or delete AWS Autoscaling Groups
- ec2_eip - associate an EC2 elastic IP with an instance.
- ec2_elb - De-registers or registers instances from EC2 ELBs
- ec2_elb_facts (E) - Gather facts about EC2 Elastic Load Balancers in AWS
- ec2_elb_lb - Creates or destroys Amazon ELB.
- ec2_eni (E) - Create and optionally attach an Elastic Network Interface (ENI) to an instance
- ec2_eni_facts (E) - Gather facts about ec2 ENI interfaces in AWS
- ec2_facts - Gathers facts about remote hosts within ec2 (aws)
- ec2_group - maintain an ec2 VPC security group.
- ec2_key - maintain an ec2 key pair.
- ec2_lc - Create or delete AWS Autoscaling Launch Configurations
- ec2_metric_alarm - Create/update or delete AWS Cloudwatch ‘metric alarms’
- ec2_remote_facts (E) - Gather facts about ec2 instances in AWS
- ec2_scaling_policy - Create or delete AWS scaling policies for Autoscaling groups
- ec2_snapshot - creates a snapshot from an existing volume
- ec2_tag - create and remove tag(s) to ec2 resources.
- ec2_vol - create and attach a volume, return volume id and device map
- ec2_vol_facts (E) - Gather facts about ec2 volumes in AWS
- ec2_vpc - configure AWS virtual private clouds
- ec2_vpc_dhcp_options (E) - Manages DHCP Options, and can ensure the DHCP options for the given VPC match what’s requested
- ec2_vpc_igw (E) - Manage an AWS VPC Internet gateway
- ec2_vpc_net - Configure AWS virtual private clouds
- ec2_vpc_net_facts (E) - Gather facts about ec2 VPCs in AWS
- ec2_vpc_route_table (E) - Manage route tables for AWS virtual private clouds
- ec2_vpc_route_table_facts (E) - Gather facts about ec2 VPC route tables in AWS
- ec2_vpc_subnet (E) - Manage subnets in AWS virtual private clouds
- ec2_vpc_subnet_facts (E) - Gather facts about ec2 VPC subnets in AWS
- ec2_win_password (E) - gets the default administrator password for ec2 windows instances
- ecs_cluster (E) - create or terminate ecs clusters
- ecs_service (E) - create, terminate, start or stop a service in ecs
- ecs_service_facts (E) - list or describe services in ecs
- ecs_task (E) - run, start or stop a task in ecs
- ecs_taskdefinition (E) - register a task definition in ecs
- elasticache - Manage cache clusters in Amazon Elasticache.
- elasticache_subnet_group - manage Elasticache subnet groups
- iam - Manage IAM users, groups, roles and keys
- iam_cert - Manage server certificates for use on ELBs and CloudFront
- iam_policy - Manage IAM policies for users, groups, and roles
- rds - create, delete, or modify an Amazon rds instance
- rds_param_group - manage RDS parameter groups
- rds_subnet_group - manage RDS database subnet groups
- route53 - add or delete entries in Amazons Route53 DNS service
- route53_facts (E) - Retrieves route53 details using AWS methods
- route53_health_check (E) - add or delete health-checks in Amazons Route53 DNS service
- route53_zone (E) - add or delete Route53 zones
- s3 - manage objects in S3.
- s3_bucket (E) - Manage s3 buckets in AWS
- s3_lifecycle (E) - Manage s3 bucket lifecycle rules in AWS
- s3_logging (E) - Manage logging facility of an s3 bucket in AWS
- sns_topic (E) - Manages AWS SNS topics and subscriptions
- sqs_queue (E) - Creates or deletes AWS SQS queues.
- sts_assume_role (E) - Assume a role using AWS Security Token Service and obtain temporary credentials
Webfaction
Note
- (D): This marks a module as deprecated, which means a module is kept for backwards compatibility but usage is discouraged. The module documentation details page may explain more about this rationale.
- (E): This marks a module as ‘extras’, which means it ships with ansible but may be a newer module and possibly (but not necessarily) less actively maintained than ‘core’ modules.
- Tickets filed on modules are filed to different repos than those on the main open source project. Core module tickets should be filed at ansible/ansible-modules-core on GitHub, extras tickets to ansible/ansible-modules-extras on GitHub