Create paved roads
Blueprints for creating cloud resources with best practices embedded
This blueprint creates an AWS Auto Scaling Group with best practices in mind, such as configuring minimum and maximum instance counts for efficient scaling, using private subnets for enhanced security, setting health checks and termination policies with sensible defaults, and encouraging the use of tags for resource identification and management. The blueprint is organized into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.
This blueprint creates an AWS RDS Cluster following best practices such as enabling encryption at rest for data security, setting deletion protection by default to prevent accidental deletion, and configuring sensible defaults for backup retention and preferred backup windows. It encourages the use of tags for resource identification and management. The blueprint is organized into intuitive groups to assist users—including those not well-versed in cloud infrastructure—in configuring essential and advanced settings easily.
This blueprint creates an AWS RDS DB instance following best practices such as enabling encryption at rest for data security, setting Multi-AZ deployment by default for high availability, and disabling public access to enhance security. It organizes variables into intuitive groups to assist users—especially those not well-versed in cloud infrastructure—in configuring essential and advanced settings easily. The blueprint also encourages tagging for better resource identification and management.
This blueprint creates an AWS S3 bucket with best practices in mind, such as blocking public access by default, enabling server-side encryption and versioning to protect data integrity and security. It provides options for access logging and tagging for better resource management. The blueprint is organized to guide users through essential settings while offering flexibility for advanced configurations.
This blueprint creates an AWS Subnet with best practices in mind, such as disabling public IP assignment by default to enhance security. It allows customization of CIDR blocks and availability zones to suit different network requirements. The blueprint encourages the use of tagging for better resource management and organizes variables into groups to assist users who may not be cloud infrastructure experts.
This blueprint creates a Google Cloud Service Account adhering to best practices by requiring a valid account_id
that meets naming conventions and encouraging the use of meaningful display_name
and description
for better resource management. It allows association with a specific project and offers advanced options like disabling the service account when necessary.
This blueprint creates an Azure Public IP with best practices in mind, such as defaulting to a 'Static' allocation method and using the 'Standard' SKU for enhanced security and features. It encourages the use of tags for better resource management and identification. Advanced settings like idle timeout can be customized if needed. The blueprint organizes variables into intuitive groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.
This Blueprint sets up a Google Compute Address with customizable options, emphasizing best practices by defaulting to an external address in the "us-central1" region using the "PREMIUM" network tier. Variables are organized into "Basic Settings" for essential configurations and "Advanced Settings" for additional customization, aiding software engineers in deploying cloud resources securely and efficiently without deep expertise in cloud infrastructure.l offering flexibility for advanced users.
This blueprint creates an Azure SQL Database with best practices in mind, such as defaulting to the 'Basic' edition and service objective for cost-effectiveness, setting a standard collation, and encouraging the use of tags for better resource identification and management. It allows customization of advanced settings like collation and maximum size, organizing variables into logical groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.
This blueprint creates an Azure SQL Server with best practices such as requiring secure administrator credentials, defaulting to version 12.0, and encouraging the use of managed identities for enhanced security. It promotes the use of tags for better resource identification and management and organizes variables into logical groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential and advanced settings easily.
This blueprint creates an Azure Virtual Machine with best practices such as disabling password authentication by default to enhance security and encouraging the use of SSH keys for authentication. It uses managed disks and defaults to the latest Ubuntu LTS image. Variables are organized into intuitive groups to assist users who may not be cloud infrastructure experts. The blueprint also promotes the use of tags for better resource identification and management.
This blueprint creates an AWS IAM Role with best practices in mind, such as requiring an assume role policy for security and encouraging the use of tags for resource identification and management. It provides advanced options like setting a permissions boundary for better security control. The blueprint is organized into groups to assist users, including those who may not be cloud infrastructure experts, in configuring essential and advanced settings easily.
This blueprint creates an AWS IAM Policy by requiring users to provide a valid JSON policy document, adhering to best practices in security and compliance. It encourages the use of tags for resource identification and management, organizing variables into groups to assist users—including those who may not be cloud infrastructure experts—in configuring essential settings easily.
This blueprint creates an AWS Lambda function following best practices, such as setting a default runtime environment (Python 3.8) and handler, enabling secure configuration by requiring an IAM role, and encouraging the use of tags for resource identification and management. It allows customization of memory size and timeout for performance tuning and supports the inclusion of environment variables to provide flexibility for various use cases.
This blueprint creates an AWS IAM User with best practices in mind, such as encouraging the use of tagging for resource identification and management. It provides advanced options like setting a permissions boundary for enhanced security control. The blueprint organizes variables into groups to assist users, including those who may not be cloud infrastructure experts, in configuring essential and advanced settings easily.
.webp)
.webp)
.webp)
.webp)