aws-nuke VS vscode-infracost

Compare aws-nuke vs vscode-infracost and see what are their differences.

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
aws-nuke vscode-infracost
86 27
5,353 1,786
2.4% 0.0%
8.0 6.1
3 days ago about 1 month ago
Go TypeScript
MIT License Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

aws-nuke

Posts with mentions or reviews of aws-nuke. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-01-22.
  • Cutting down AWS cost by $150k per year simply by shutting things off
    8 projects | news.ycombinator.com | 22 Jan 2024
    To give this a slightly different spin:

    --> "The best optimization is simply not spinning things up."

    At least for local development and testing, as made possible by LocalStack (https://localstack.cloud), among other local testing solutions and emulators.

    We've seen so many teams fall into the trap of "someone forgot to shut down dev resource X for a week and now we've racked up a $$$ bill on AWS".

    What is everyone's strategy to avoid this kind of situation? Tools like `aws-nuke` (https://github.com/rebuy-de/aws-nuke) are awesome (!) to clean up unused resources, but frankly they should not be necessary in the first place.

  • I am afraid to spin up an EKS instance using AWS provider
    3 projects | /r/Terraform | 8 Dec 2023
    We use nuke aws at work to remove any leftovers: https://github.com/rebuy-de/aws-nuke
  • Route 53 Billing
    1 project | /r/aws | 6 Jul 2023
    You can use this tool on github to nuke all resources.
  • Need Help to Control Rising Costs of Elastic Cloud on AWS
    1 project | /r/aws | 3 Jun 2023
  • Best sandbox environment to learn AWS
    1 project | /r/AWSCertifications | 29 May 2023
    There's this. I haven't used it myself, but it looks to be pretty effective: https://github.com/rebuy-de/aws-nuke
  • Enterprise-scaled Self-Healing StackSets
    1 project | dev.to | 29 May 2023
    At this scale, operations can take a lot of time, because there are multiple operational tasks that we need to do when AWS accounts are leaving the AWS Organization or Teams are nuking the AWS account, StackSets Instances get drifted, because not all required resources for compliance can be secured ( SCP Limitations ), existing AWS accounts are joining the AWS Organization and all mandatory StackSets needs to be deployed, and manual steps should be reduced to a minimum. Furthermore, there is no feature from the Service itself to gain an overview of the status of drifted Instances and the general health of your StackSet health and compliance.
  • AWS - development environment
    1 project | /r/aws | 29 May 2023
    Since you're using CDK already, have a way to configure the deployment of the whole thing to a per-developer test account; that's still gonna cost you, but you can bundle everything in an organization / organizational unit for billing purposes, and you can also schedule https://github.com/rebuy-de/aws-nuke to run nightly to clean these accounts from longer-running resources.
  • Does your org create/destroy per-project AWS accounts?
    1 project | /r/aws | 25 May 2023
    And by extension, https://github.com/rebuy-de/aws-nuke as well.
  • I want to terminate my account but i cant delete this last VPC, what should i do? I dont want to be billed anymore!
    1 project | /r/aws | 21 May 2023
    I can also recommend aws-nuke which is an easy to way to destroy in your account.
  • Weekly: Share your EXPLOSIONS thread
    2 projects | /r/kubernetes | 11 May 2023
    nothing blew up accidentally this week, but our team at kubefirst is falling more and more in love with aws-nuke. it's an open source command line tool that lets you basically reset an aws account back to an empty state. if you have an environment where you regularly practice your platform provisioning, you probably know that failed destroys while iterating on orchestration can leave junk behind pretty easily. aws-nuke has been so nice to be able to blow away everything in an aws account - and then we just run terraform in the account to get all our core infra back afterward. nice allowlist filters and dryrun detail work too. check them out.

vscode-infracost

Posts with mentions or reviews of vscode-infracost. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-04-22.
  • Despliega una Infraestructura de Red AWS Robusta con Terraform
    2 projects | dev.to | 22 Apr 2024
  • Cutting down AWS cost by $150k per year simply by shutting things off
    8 projects | news.ycombinator.com | 22 Jan 2024
  • Show HN: Infracost (YC W21): Be proactive with your cloud costs
    1 project | news.ycombinator.com | 9 Aug 2023
    Hi, we are Ali, Hassan, and Alistair, co-founders of Infracost (https://www.infracost.io/). Infracost helps engineers see the cost of each Terraform change before launching resources. When changes are made, it posts a comment with the cloud cost impact. For example, “you’ve added 2 instances and volumes, and change an instance type from medium to large, your bill will increase by 25% next month, from $1000 to $1250 per month”.

    We launched in February 2021 (https://news.ycombinator.com/item?id=26064588), and Infracost is now being actively used by over 3,000 companies. However, there is a shift happening in the cloud cost management space. New teams, called FinOps teams (a combination of "Finance" and "DevOps"), are being formed within companies to manage cloud costs.

    One of the first tasks assigned to these teams is to determine "who is using what" - that is, which teams, business units, products, etc. are spending the most on cloud. To accomplish this, they use tags. Tags are labels that all cloud resources should have and are key-value pairs. For example, a server could be tagged with: product=HackerNews; environment=production; team=blueTeam. So if resources are not tagged properly, then you can’t tell who is using what.

    However, FinOps teams face challenges because their tools are reactive. These tools begin by analyzing cloud bills and providing visibility of tags from there. This means that they are looking at resources that are already running in production and costing money. A customer recently shared, “I want all resources to be properly tagged. But if they are not, I would rather a resource not be tagged at all than be tagged incorrectly.”

    My "aha" moment! FinOps teams can define a tagging policy that can be validated in CI/CD before resources are launched. This is important because if code is shipped with the wrong tags, FinOps teams will have to fight for sprint time to fix them. Even if you shut down an untagged resource directly in the cloud, the next time Terraform runs, the resource will launch again with no tag. You need to fix the issue at its root.

    I’d love your feedback on our solution to the tagging problem. You define your tag key-value policy in our SaaS product, and Infracost checks all Terraform resources per change. If anything fails the policy, it posts a comment with the details of which resources need tags, and what the allowed values are. Once fixed, it will let the code be shipped to production.

    Try it out by going to https://dashboard.infracost.io/, setting up with the GitHub app or GitLab app, and defining your tagging policy. It will then scan your repository and inform you of any missing tags and their file and line number. You can use the free trial, but if you need more time, please message me and I’ll extend it for you.

    I would also love to hear how others ensure that the correct tag keys and values are applied to all resources, and whether this is done proactively or reactively. Additionally, I would be interested in hearing about any lessons learned in the process.

    Cheers

  • What is the best `as Code` tool in 2023?
    4 projects | dev.to | 26 Jul 2023
    Great toolchain, including Infracost or tfsec.
  • Top 4 Infrastructure as Code Open-Source Tools for 2023
    3 projects | /r/webdevelopment | 3 May 2023
    Infracost is an open-source tool for estimating the cost of cloud infrastructure using Infrastructure as Code templates.
  • Enabling IPv6 on AWS using Terraform (Part 1)
    2 projects | dev.to | 16 Feb 2023
    Throughout this post, you will see me mention the cost of running this using an estimate. I have been using for a while, a tool called infracost which is an open source (with subscription based additions) cost estimator tool - https://www.infracost.io/. For this demonstration, using the sample code listed above, it would cost an estimated $76.65/month - so if you don't want rack up a bill, only deploy when you want to test, and use Terraform to destroy the services when you are done.
  • 5 tools to supercharge your Terraform Development
    3 projects | dev.to | 12 Jan 2023
    Infracost : Infracost is an open-source tool that allows users to see the cost of running their infrastructure, such as AWS resources, in near real-time. It uses the AWS Price List API to determine the costs of resources, and can be integrated into CI/CD pipelines to provide cost feedback during the development process. This allows developers to make informed decisions about their infrastructure and optimize costs. Additionally, Infracost can be used to create alerts based on cost thresholds, so you can be notified when your infrastructure costs exceed a certain amount. This can be especially useful for teams that operate on a tight budget or need to manage costs closely.
  • Taming Cloud Costs with Infracost
    3 projects | dev.to | 9 Jan 2023
    An Infracost API key. You can get one by signing up for free at Infracost.io.
  • Infracost – Estimate infrastructure cost based on Terraform
    1 project | news.ycombinator.com | 3 Jan 2023
  • Wing: A cloud-oriented programming language
    6 projects | news.ycombinator.com | 19 Dec 2022
    Since Wing compiles to Terraform, you should be able to manually run Infracost (https://www.infracost.io) to get an idea of costs.

    Having that capability baked into the language/compiler would be a great addition.

What are some alternatives?

When comparing aws-nuke and vscode-infracost you can also consider the following projects:

cloud-nuke - A tool for cleaning up your cloud accounts by nuking (deleting) all resources within it

infracost - Cloud cost estimates for Terraform in pull requests💰📉 Shift FinOps Left!

former2 - Generate CloudFormation / Terraform / Troposphere templates from your existing AWS resources.

GPU-Puzzles - Solve puzzles. Learn CUDA.

savepagenow - A simple Python wrapper and command-line interface for archive.org’s "Save Page Now" capturing service

cloud-pricing-api - GraphQL API for cloud pricing. Contains over 3M public prices from AWS, Azure and GCP. Self-updates prices via an automated weekly job.

infracost-azure-devops - Azure DevOps integration for Infracost. Shows cloud cost estimates for Terraform in pull requests for Azure DevOps repos and GitHub repos.

LocalStack - đź’» A fully functional local AWS cloud stack. Develop and test your cloud & Serverless apps offline

infracost - Cloud cost estimates for Terraform in your CLI and pull requests 💰📉 [Moved to: https://github.com/infracost/infracost]

aws-budget-alarms - AWS Budget alarms with AWS Chatbot sending alarms to slack

google-cloud-pricing-cost-calculator - đź’¸ Calculate estimated monthly costs of Google Cloud Platform products and resources via YAML files and CLI program (Linux, macOS, Windows)