aws-grafana-billing-dashboard
terraform
aws-grafana-billing-dashboard | terraform | |
---|---|---|
10 | 540 | |
8 | 43,127 | |
- | 1.2% | |
4.6 | 9.9 | |
about 1 year ago | 3 days ago | |
JavaScript | Go | |
MIT License | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws-grafana-billing-dashboard
-
How to setup AWS Billing metrics in Grafana Cloud via Terraform
In this case it’s in the file variable.tf like described here.
terraform
-
Terraform state with native s3 locking
Starting in Terraform v1.10 the S3 backend features S3 native state locking. Prior to this feature state file lock setups required access to a DynamoDB table - which can be completely foregone now!
-
S3 native state locking in Terraform
Since the Terraform 0.5.0 release from May 2015th we've been able to store our state on S3 buckets.
-
Top 8 Terraform Security Best Practices to Protect Your Infrastructure
Enable logging and monitoring for your Terraform backend, such as AWS CloudTrail or GCP Audit Logs.
-
AI Coding Assistants, Starter Templates, and More: A Guide to Working Less
Coding isn’t just about writing frontend or backend logic — it’s about setting up the entire ecosystem for your app to thrive. Tools like AWS CDK, Pulumi, or Terraform let you define your cloud infrastructure as code.
-
What is Configuration Drift?
Similarly, on the infrastructure provisioning side, IaC tools - which are usually declarative - are a great fit for observing and managing drifts. Tools such as OpenTofu, Hashicorp Terraform, or AWS CloudFormation use declarative templates to define the environment's state. This provides the option to detect drift by comparing the current state of resources to the defined infrastructure in the code.
-
Globally Replicated Services for the Rest of Us
To configure Route53 we really just need to create a hosted zone and add geolocation records for each region. I usually do that with Terraform or AWS CDK, but in this case we are just doing it manually in the console.
-
How I Set Up Cross-Account ECR Access for Lambda Functions
Reading the AWS documentation gave me a good sense of what configurations are necessary. Nonetheless, in this blog I will show you how I did it - the terraform way, while providing some tips and tricks to achieve the solution for my use case. Terraform, an Infrastructure as Code (IaC) tool, provides a consistent and automated way to manage resources across multiple AWS accounts and regions. While this blog won't dive into all the details of Terraform, you can learn more about it here.
-
From License to Freedom: Embracing Open Source Forks Knowing What to Expect
OpenTofu, (forked from Hashicorp Terraform), is a newer example along with OpenBao (forked from Hashicorp Vault). When HashiCorp changed the license for Terraform and Vault to the Business Source License (BSL), the community quickly responded by forking the project under the name OpenTofu & OpenBao. These forks aim to preserve the tool’s open nature and ensure that the developer community has a truly open source alternative to some of the industries widely adapted softwares.
-
Forget CDK and AWS's insane costs. Pulumi and DigitalOcean to the rescue
I haven't used Terraform in years (because I changed jobs, not because of the tech itself), but back in the day v0.12 solved most of my gripes. I have always wished they'd implement a better "if" syntax for blocks, because the language itself pseudo-supports it: https://github.com/hashicorp/terraform/issues/21512
But yeah, at $previous_job, Terraform enabled some really fantastic cross-SaaS integrations. Stuff like standing up a whole stack on AWS and creating a statuspage.io page and configuring Pingdom all at once. Perfect for customers who wanted their own instance of an application in an isolated fashion.
We also built an auto-approver for Terraform plans based on fingerprinting "known-good" (safe to execute) plans, but that's a story for a different day.
-
Efficient Kubernetes Cluster Deployment: Accelerating Setup with EKS Blueprints
EKS Blueprints is implemented in two popular IaC frameworks, HashiCorp Terraform and AWS Cloud Development Kit (AWS CDK), which help you automate infrastructure deployments. To get started, please visit the Getting Started guides for either EKS Blueprints for Terraform or EKS Blueprints for CDK.
What are some alternatives?
terraform-security-scan - Run a security scan on your terraform with the very nice https://github.com/aquasecurity/tfsec
terragrunt - Terragrunt is a flexible orchestration tool that allows Infrastructure as Code written in OpenTofu/Terraform to scale.
grafana-unraid-stack - Meet Gus! He has everything you need to start monitoring Unraid (Grafana - Influxdb - Telegraf - Loki - Promtail).
Docker Compose - Define and run multi-container applications with Docker
geodesic - 🚀 Geodesic is a DevOps Linux Toolbox in Docker
terraform-provider-restapi - A terraform provider to manage objects in a RESTful API
tomato-grafana
crossplane - The Cloud Native Control Plane
docker-android - Android in docker solution with noVNC supported and video recording
boto3 - AWS SDK for Python
brain-dump - Cheat sheets, customizations and configurations I use across multiple systems.
sceptre - Build better AWS infrastructure