terrascan
DISCONTINUED
terramate
Our great sponsors
terrascan | terramate | |
---|---|---|
1 | 12 | |
2,568 | 2,593 | |
- | 2.4% | |
9.5 | 0.0 | |
almost 2 years ago | 2 days ago | |
Go | Go | |
Apache License 2.0 | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terrascan
-
Testing Terraform The Right Way
terrascan — https://github.com/cesar-rodriguez/terrascan (no TF 0.13 support at this time)
terramate
-
Show HN: Layerform (YC S23) – Open-source development environments
Nice, this looks close to https://terramate.io/ stacks
-
Tools that actaully ease the burden of Terraform?
You might want to take a look at Terramate. Compared to other tooling such as Terragrunt we're not a wrapper that will lock you in yet another syntax. Terramate is a code generator and orchestrator that helps you to generate native Terraform that can be executed in whatever environment of your choice.
-
Backend question
Another option for Terragrunt could be Terramate. It comes with Code Generation that helps you to automatically generate files such as Terraform, Provider and Backend configurations in various stacks (directories). The upside is that it always generates native Terraform code.
-
How to manage terraform code for large projects?
This can be done with a tool such as Terramate or Terragrunt (afaik Terragrunt doesn't come with change detection).
-
Reminder: there are alternatives to Terraform Cloud out there
I'd love to add Terramate to the list of alternatives to Terraform Cloud!
-
How you structure your terraform state?
That sounds like something Terramate helps with. I've been using it exactly for that purpose (code generation) and it made everything so much easier!
-
Show HN: GitHub as Code – Manage GitHub with Terraform
Could you share some of the issues that you're experiencing with the provider? We've also ran into some issues with the providers but worked around most of the issues in our open-source modules (eg https://github.com/mineiros-io/terraform-github-repository) and by using Terramate (eg renaming repositories causes re-creation in the provider, with Terramate we're dynamically creating move statements to prevent this. Check out Terramate if you haven't done it yet: https://github.com/mineiros-io/terramate)
I know you can do it - but not as dynamically as I want, too. Maybe I'm not getting something, but I don't see the `for_each` or `count` equivalent in `generate_hcl` [0].
Also, stacks are predefined, not dynamic. With CDKTF, I can generate any number of stacks with one piece of code. In addition, I can define stack dependencies - let's say, my dev database stack depends on dev IAM stack - something that Terraform does not do and developers need to remember the order of `terraform apply` across stacks.
[0]: https://github.com/mineiros-io/terramate/blob/main/docs/code...
On the dynamic side of things we are working right now on adding support for dynamic block generation on generate_hcl, which should help.
Regarding dependencies, did you took a look on the orchestration features on Terramate ?
https://github.com/mineiros-io/terramate/blob/main/docs/orch...
They should be enough to let you easily define ordering and not depend on developers doing the ordering manually.
What are some alternatives?
tfsec - Security scanner for your Terraform code
terratest - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
yor - Extensible auto-tagger for your IaC files. The ultimate way to link entities in the cloud back to the codified resource which created it.
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
monday - ⚡️ A dev tool for microservice developers to run local applications and/or forward others from/to Kubernetes SSH or TCP
ThreatMapper - Open source cloud native security observability platform. Linux, K8s, AWS Fargate and more.
atlantis - Terraform Pull Request Automation
guide - Kubernetes clusters for the hobbyist.
kics - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
aztfy - A tool to bring existing Azure resources under Terraform's management [Moved to: https://github.com/Azure/aztfexport]