aws
terraform-aws-eks-blueprints
aws | terraform-aws-eks-blueprints | |
---|---|---|
5 | 39 | |
20 | 2,496 | |
- | 2.4% | |
9.1 | 9.1 | |
almost 2 years ago | 6 days ago | |
HCL | HCL | |
Mozilla Public License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws
-
Running AWS Foundational Security Best Practices with CloudQuery Policies
Do you have a policy that you want to codify, or that you’ve been running with python or bash scripts? You are welcome to try codifying it with CloudQuery Policies (See our github and docs for how to develop one). Feel free to visit our discord or GitHub to get help - we’ll also be happy to share your policy on CloudQuery Hub.
-
What are policies and how do you use them with CloudQuery?
CloudQuery is an open-source cloud asset inventory powered by SQL, so a policy to the tool is simply an HCL configuration file that references SQL queries. How this works is by CloudQuery ingesting the data from your cloud provider, such as AWS or Azure, and then the policy executes the SQL statements against that data as if it were a test suite. Our co-founder Yevgeny recently wrote an amazing piece on running the PCI DSS policy against AWS. If you are curious about the multitude of policies currently available you can check them out at https://hub.cloudquery.io/ which is our centrally available and searchable source for publicly available policies.
- Open Source Customizable AWS PCI DSS Scan with SQL
terraform-aws-eks-blueprints
-
I am afraid to spin up an EKS instance using AWS provider
Have you checked out this repo https://github.com/aws-ia/terraform-aws-eks-blueprints
-
Deploy Secure Spring Boot Microservices on Amazon EKS Using Terraform and Kubernetes
Now that you have the networking part done, you can build configurations for the EKS cluster and its add-ons. You will use the terraform-aws-modules to create the EKS cluster and eks_blueprints module from terraform-aws-eks-blueprintsto configure EKS add-ons.
-
Enabling GPU Nodes for PyTorch Workloads on EKS with Autoscaling
## (https://github.com/aws-ia/terraform-aws-eks-blueprints) ## ... [other Terraform code] ## Cluster Configuration module "eks" { # ... [other configuration] self_managed_node_groups = { gpu_node_group = { node_group_name = "gpu-node-group" ami_type = "AL2_x86_64_GPU" capacity_type = "ON_DEMAND" instance_types = [ "g4dn.xlarge", "g4dn.2xlarge", ] # ... [other configuration] taints = { dedicated = { key = "nvidia.com/gpu" value = "true" effect = "NO_SCHEDULE" } } # ... [other configuration] } } }
- Why is there no consistency in the EKS examples.
-
Is there any advantage to running Karpenter and CordDNS in Fargate?
Here is the link: https://github.com/aws-ia/terraform-aws-eks-blueprints/blob/main/examples/karpenter/main.tf
- Need suggestions for managing eks terraform module
-
What's everyone's favorite EKS Terraform module these days?
Anyone using eks blueprints or cloudposse's module?
- How are most EKS clusters deployed?
-
Ideal setup for EKS deployment?
Take a look at the EKS Blueprints for Terraform as a place to start. I know the team is working on their v5 release which should be a solid improvement. https://github.com/aws-ia/terraform-aws-eks-blueprints/milestone/1
-
How do you initially upload your docker image to an ECR
Take a look at the EKS Blueprints for Terraform v5 rewrite for more details. However, EKS Blueprints for Terraform (v4 as it is today) is pretty darn good _if_ you just want to manage basic charst like load balancer controller and Karpenter. It provisions IAM Roles and Policies along with Helm charts all in one easy set-up. It's just not something I'd want to touch with more complex use cases and we'll see how the EKS Blueprints team does with the v5 rewrite - their direction looks reasonable, but Terraform just isn't really designed for the problem it's trying to solve there, so it's going to be somewhat clunky one way or another.
What are some alternatives?
cloudquery - The open source high performance ELT framework powered by Apache Arrow
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources 🇺🇦
terraform-aws-secure-baseline - Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
cdk-eks-blueprints - AWS Quick Start Team
eksctl - The official CLI for Amazon EKS
terraform-aws-ecs-container-definition - Terraform module to generate well-formed JSON documents (container definitions) that are passed to the aws_ecs_task_definition Terraform resource
terraform-aws-eks-cloudwatch-logs - Terraform module for deploying AWS Fluent Bit as a daemonSet to send logs to CloudWatch Logs aws-for-fluent-bit inside a pre-existing EKS cluster.
terraform-aws-eks-cluster - Terraform module for provisioning an EKS cluster
terraform-cdk - Define infrastructure resources using programming constructs and provision them using HashiCorp Terraform
kubeone - Kubermatic KubeOne automate cluster operations on all your cloud, on-prem, edge, and IoT environments.
cdk8s - Define Kubernetes native apps and abstractions using object-oriented programming