magic-modules
kubernetes-cluster-setup-using-terraform-and-k3s-on-digitalocean
Our great sponsors
magic-modules | kubernetes-cluster-setup-using-terraform-and-k3s-on-digitalocean | |
---|---|---|
5 | 2 | |
743 | 40 | |
2.2% | - | |
9.9 | 0.0 | |
1 day ago | about 3 years ago | |
HTML | HTML | |
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
magic-modules
-
I think GCP is better than AWS – by Fernando Villalba
Given: https://registry.terraform.io/providers/hashicorp/google/5.3...
how would any reasonable person know what https://registry.terraform.io/providers/hashicorp/google/5.3... to enable without (a) trying it and squinting at the error message (b) clicking on the <> then realizing it, also, does not mention run.googleapis.com, click on "supported service endpoints" <https://cloud.google.com/run/docs/reference/rest#rest_endpoi...> and only then learning about https://cloud.google.com/run/docs/reference/rest#service:-ru...
Repeat for https://registry.terraform.io/providers/hashicorp/google/5.3... although in both cases I guess the astute reader may have spotted the run.googleapis.com in the forbidden service labels and cloudidentity.googleapis.com in the example
Since, to the best of my knowledge those bindings are auto generated <https://github.com/GoogleCloudPlatform/magic-modules#magic-m...>, I would hypothesize it is not insurmountable drop in the seemingly existing declaration of APIs required: https://github.com/GoogleCloudPlatform/magic-modules/blob/7d... https://github.com/GoogleCloudPlatform/magic-modules/blob/7d...
-
Terraform Plugin Framework Development: How to implement nested attributes?
In the case of the Google Cloud Platform provider, folks at Google built magic modules with the explicit goal of being able to generate schemas and behaviors for a Terraform provider and for other systems with similar needs. Since the vendor was explicitly aiming to support Terraform, this was the most ideal case where the schema could be designed to contain all of the information needed to generate a functional, usable provider.
-
Terraform 1.0 Release
For GCP, both ansible modules and terraform modules are actually generated from https://github.com/GoogleCloudPlatform/magic-modules, so their "production readiness" are the same.
I understand that mitchellh himself personally created a bunch of cloud modules for terraform at the beginning, and those were likely of higher quality than whatever created by some internal developers assigned by Google/Microsoft, and might be slightly better than the AWS modules maintained by community.
Anyway, when it comes to ansible versus terraform, we shall move the discourse to states management instead. With ansible, you don't have to deal with states, but will need to clean up the cloud resources separately. With terraform, you can use the tool to clean up the cloud resources easily, but then you also have the headache of managing states. Plus, whenever you change something, there is always the nagging feeling that it will do a destroy/recreate instead of an in-place update.
-
Pulumi 3.0
The Terraform provider for Google Cloud uses partial autogeneration, here is the repo that does the autogeneration for multiple automation tools:
kubernetes-cluster-setup-using-terraform-and-k3s-on-digitalocean
We haven't tracked posts mentioning kubernetes-cluster-setup-using-terraform-and-k3s-on-digitalocean yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
ansible-role-zsh - Setup antigen with oh-my-zsh, powerlevel10k theme, fzf, autosuggestions, syntax-highlighting
desktop-ansible - Ansible Playbooks to install Arch on my PC from scratch
DetectionLab - Automate the creation of a lab environment complete with security tooling and logging best practices
freqtrade-do - Setting up freqtrade (Crypto trading bot) on DigitalOcean
ansible-role-k3s - Ansible role for installing k3s as either a standalone server or HA cluster.
terraform-ls - Terraform Language Server
tf2pulumi - A tool to convert Terraform projects to Pulumi
terraform-cdk - Define infrastructure resources using programming constructs and provision them using HashiCorp Terraform
pulumi-provider-boilerplate - Boilerplate showing how to create a native Pulumi provider
pulumi-terraform-bridge - A library allowing providers built with the Terraform Plugin SDK to be bridged into Pulumi.
terraform-website - Build configuration and partial content for terraform.io