aws
terraform-aws-github-runner
aws | terraform-aws-github-runner | |
---|---|---|
5 | 17 | |
20 | 2,344 | |
- | 4.1% | |
9.1 | 9.5 | |
almost 2 years ago | 6 days ago | |
HCL | HCL | |
Mozilla Public License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
aws
-
Running AWS Foundational Security Best Practices with CloudQuery Policies
Do you have a policy that you want to codify, or that you’ve been running with python or bash scripts? You are welcome to try codifying it with CloudQuery Policies (See our github and docs for how to develop one). Feel free to visit our discord or GitHub to get help - we’ll also be happy to share your policy on CloudQuery Hub.
-
What are policies and how do you use them with CloudQuery?
CloudQuery is an open-source cloud asset inventory powered by SQL, so a policy to the tool is simply an HCL configuration file that references SQL queries. How this works is by CloudQuery ingesting the data from your cloud provider, such as AWS or Azure, and then the policy executes the SQL statements against that data as if it were a test suite. Our co-founder Yevgeny recently wrote an amazing piece on running the PCI DSS policy against AWS. If you are curious about the multitude of policies currently available you can check them out at https://hub.cloudquery.io/ which is our centrally available and searchable source for publicly available policies.
- Open Source Customizable AWS PCI DSS Scan with SQL
terraform-aws-github-runner
- Show HN: Managed GitHub Actions Runners for AWS
- Show HN: Open-source x64 and Arm GitHub runners. Reduces GitHub Actions bill 10x
- Terraform module for scalable GitHub action runners on AWS
- Show HN: WarpBuild – x86-64 and arm GitHub Action runners for 30% faster builds
- Any tips on how to run auto scaling self-hosted GitLab runners well?
- Auto scaling Self-Hosted solution for GitHub Actions?
-
DeepFlow uses Spot Instances to speed up GitHub Action exploration
Terraform: Autoscale AWS EC2 as GitHub Runner with Terraform and AWS Lambda
What are some alternatives?
cloudquery - The open source high performance ELT framework powered by Apache Arrow
workflow-dispatch - A GitHub Action for triggering workflows, using the `workflow_dispatch` event
terraform-aws-eks-blueprints - Configure and deploy complete EKS clusters.
terraform-aws-oidc-github - Terraform module to configure GitHub Actions as an IAM OIDC identity provider in AWS.
terraform-aws-secure-baseline - Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
sst - Build modern full-stack applications on AWS
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources 🇺🇦
aws-toolkit-vscode - Amazon Q, CodeWhisperer, CodeCatalyst, Local Lambda debug, SAM/CFN syntax, ECS Terminal, AWS resources
serverless-iam-roles-per-function - Serverless Plugin for easily defining IAM roles per function via the use of iamRoleStatements at the function level.
serverless-bonk-template - Serverless boilerplate based on serverless-webpack + typescript.
actions-runner-controller - Kubernetes controller for GitHub Actions self-hosted runners
deepflow - :rocket: eBPF-powered observability & zero-code distributed tracing :sparkles: