kamus
terraform-k8s
kamus | terraform-k8s | |
---|---|---|
3 | 5 | |
913 | 450 | |
0.7% | 1.1% | |
0.0 | 4.9 | |
7 months ago | 5 months ago | |
C# | Go | |
Apache License 2.0 | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
kamus
-
helm upgrade error "Error: This command needs 2 arguments: release name, chart path"
I tried using the idea at https://stackoverflow.com/questions/54190837/helm-install-in-kuberneres-error-this-command-needs-2-arguments-release-name but it didn't help. Can you spot what I am doing wrong? Thank you.
- Open source, Git-ops, zero-trust secret encryption/decryption solution for K8s
-
Automation assistants: GitOps tools in comparison
Kamus may represent a compromise between Sealed Secrets and SOPS. It was created especially for the GitOps use case and includes an operator. It can either manage the key material itself or obtain it from the KMS of the cloud providers. Another special feature is that Kamus encrypts secrets directly for an application. They are then decrypted by the application itself or by an init container. This means that the unencrypted secret is never present on the API server and ideally also not in an environment variable with in the container.
terraform-k8s
-
Terraform Cloud Operator in Production - Secrets
Is anyone here using the Terraform Cloud Operator in production? If so, how are you managing workspace secrets?
-
Terraform Cloud Operator giving not found error
So I’m using the terraform cloud operator for kubernetes (https://github.com/hashicorp/terraform-k8s) to create workspaces from an EKS cluster. I’ve had to use a forked helm chart. However, the issue I have right now is that when I create a workspace via the CRD, it creates on Terraform cloud and then is just stuck. Doesn’t try to apply the module, plan, apply etc. The logs of the operator pod talks about not being able to find the workspace.
-
GitOps using the Terraform Cloud Operator for Kubernetes
Did anyone try https://github.com/hashicorp/terraform-k8s for applying GitOps principles to IaC?
-
Automation assistants: GitOps tools in comparison
In addition to creating Kubernetes clusters, there is also an increasing number of opportunities to use various Infrastructure-as-Code (IaC) tools, such as Terraform, with GitOps. As was already mentioned, PipeCD offers support for Terraform. Terraform's vendor, HashiCorp, now also offers an official Terraform Kubernetes operator. However, it needs access to HashiCorp's Terraform Cloud. Alternatively, there are also third-party operators that can function without Terraform Cloud, such as the one developed by Rancher. However, it is still in alpha stage.
-
Etok: execute terraform on kubernetes
Pretty neat. I really want to test it out, and see how it compares to https://github.com/hashicorp/terraform-k8s and https://github.com/rancher/terraform-controller
What are some alternatives?
sealed-secrets - A Kubernetes controller and tool for one-way encrypted Secrets
argocd-operator - A Kubernetes operator for managing Argo CD clusters.
kubernetes-external-secrets - Integrate external secret management systems with Kubernetes
cluster-api - Home for Cluster API, a subproject of sig-cluster-lifecycle
KMSpico - Microsoft Windows & Office activation tools (copy from internet)
argo-rollouts - Progressive Delivery for Kubernetes
helm-secrets - A helm plugin that help manage secrets with Git workflow and store them anywhere
Flux - Successor: https://github.com/fluxcd/flux2
sops - Simple and flexible tool for managing secrets
sops-secrets-operator - Kubernetes SOPS secrets operator
argo-cd - Declarative Continuous Deployment for Kubernetes
flagger - Progressive delivery Kubernetes operator (Canary, A/B Testing and Blue/Green deployments)