k3s-oci-cluster
terraform-oci-tdf-network-security
Our great sponsors
k3s-oci-cluster | terraform-oci-tdf-network-security | |
---|---|---|
5 | 1 | |
121 | 1 | |
- | - | |
8.0 | 0.0 | |
5 days ago | almost 2 years ago | |
HCL | HCL | |
GNU General Public License v3.0 only | Universal Permissive License v1.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
k3s-oci-cluster
-
Deploy Kubernetes (K8s) on Amazon AWS using mixed on-demand and spot instances
We use the same stack used in this repository. This stack need longhorn and nginx ingress.
-
Deploy a Kubernetes cluster for free, using K3s and Oracle always free resources
Var Required Desc region yes set the correct OCI region based on your needs availability_domain yes Set the correct availability domain. See how to find the availability domain compartment_ocid yes Set the correct compartment ocid. See how to find the compartment ocid cluster_name yes the name of your K3s cluster. Default: k3s-cluster k3s_token yes The token of your K3s cluster. How to generate a random token my_public_ip_cidr yes your public ip in cidr format (Example: 195.102.xxx.xxx/32) environment yes Current work environment (Example: staging/dev/prod). This value is used for tag all the deployed resources compute_shape no Compute shape to use. Default VM.Standard.A1.Flex. NOTE Is mandatory to use this compute shape for provision 4 always free VMs os_image_id no Image id to use. Default image: Canonical-Ubuntu-20.04-aarch64-2022.01.18-0. See how to list all available OS images oci_core_vcn_cidr no VCN CIDR. Default: oci_core_vcn_cidr oci_core_subnet_cidr10 no First subnet CIDR. Default: 10.0.0.0/24 oci_core_subnet_cidr11 no Second subnet CIDR. Default: 10.0.1.0/24 oci_identity_dynamic_group_name no Dynamic group name. This dynamic group will contains all the instances of this specific compartment. Default: Compute_Dynamic_Group oci_identity_policy_name no Policy name. This policy will allow dynamic group 'oci_identity_dynamic_group_name' to read OCI api without auth. Default: Compute_To_Oci_Api_Policy kube_api_port no Kube api default port Default: 6443 public_lb_shape no LB shape for the public LB. Default: flexible. NOTE is mandatory to use this kind of shape to provision two always free LB (public and private) http_lb_port no http port used by the public LB. Default: 80 https_lb_port no http port used by the public LB. Default: 443 k3s_server_pool_size no Number of k3s servers deployed. Default 2 k3s_worker_pool_size no Number of k3s workers deployed. Default 2 install_longhorn no Boolean value, install longhorn "Cloud native distributed block storage for Kubernetes". Default: true longhorn_release no Longhorn release. Default: v1.2.3 unique_tag_key no Unique tag name used for tagging all the deployed resources. Default: k3s-provisioner unique_tag_value no Unique value used with unique_tag_key. Default: https://github.com/garutilorenzo/k3s-oci-cluster PATH_TO_PUBLIC_KEY no Path to your public ssh key (Default: "~/.ssh/id_rsa.pub) PATH_TO_PRIVATE_KEY no Path to your private ssh key (Default: "~/.ssh/id_rsa)
terraform-oci-tdf-network-security
We haven't tracked posts mentioning terraform-oci-tdf-network-security yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
oracle-cloud-terraform-examples - Oracle cloud terraform examples, provision oracle cloud resources using terraform
longhorn - Cloud-Native distributed storage built on and for Kubernetes
terraform-aws-security-group - Terraform module which creates EC2-VPC security groups on AWS πΊπ¦
k3s-aws-terraform-cluster - Deploy an high available K3s cluster on Amazon AWS
terraform-aws-iam - Terraform module which creates IAM resources on AWS πΊπ¦
terraform-hcloud-kube-hetzner - Optimized and Maintenance-free Kubernetes on Hetzner Cloud in one command!
ingress-nginx - Ingress-NGINX Controller for Kubernetes
eks-reference-architecture - Reference EKS architectures using https://github.com/terraform-aws-modules/terraform-aws-eks
flannel - flannel is a network fabric for containers, designed for Kubernetes
iac-intro-terraform-packer - Assets for the "Introduction to Infrastructure as Code with Terraform and Packer" article on Dev.to
k8s-aws-terraform-cluster - Deploy an high available Kubernetes (k8s) cluster on Amazon AWS