The Create ElastiCache Cluster action can be used to create an ElastiCache cluster. Later, it can (optionally) be deleted.
For example, at 8am, an ElastiCache cluster can be created for development purposes, then 8 hours later, it can be deleted.
Please see Common Action Settings for a description of settings common to all action types.
Indicates the ID of the new cluster. Macros can be used in the cluster ID to include run-time data. See below.
Indicates whether a Memcached or Redis cluster should be created.
The version of the engine to be used in the new cluster.
The type of nodes that will be created in the cluster.
Number of Nodes
Number of nodes in the cluster. A minimum of 1 node must be created. Memcached clusters only support 1 node.
Indicates the desired availability zone in which the new cluster will be created.
Optional.If the cluster is to be created inside a VPC, specify the subnet group in which to place the new cluster.
Optional. By default, the cluster will use the 'default' security group. Specify an alternate security group to have it assigned to the new cluster.
Optional. Name of the parameter group for the new cluster.
Snapshot Retention Limit
Optional. Supported by Redis only. Number of days which automatic snapshots will be kept.
Replication Group to Create
Optional. Supported by Redis only. Specify the name of a replication group to have a new group created and the new cluster assigned.
Delete the Cluster
Indicate whether the new cluster should be automatically deleted later. The running time of the cluster must also be specified if this is enabled.
Indicate the length of time the cluster should remain running before it is deleted. This value is only required if "Delete the Cluster" is enabled.
The following macros can be used to include some run-time information.
Date of snapshot in year-month-day format
Time of snapshot in 24-hour format
ID of the cluster
Macros are case-sensitive. For example, $(Time) is not valid. $(TIME) must be used.
Amazon Commands Used
The following Amazon AWS commands are used. The access key should have permission to execute all of them.