pulumi-aws
infisical
Our great sponsors
pulumi-aws | infisical | |
---|---|---|
3 | 104 | |
419 | 11,920 | |
3.4% | 5.9% | |
9.5 | 10.0 | |
about 16 hours ago | 7 days ago | |
Go | TypeScript | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
pulumi-aws
-
HashiCorp Adopts Business Source License
Sure, but the providers for some of the biggest platforms are maintained by HashiCorp[1] - like the AWS, Azure, GCP, and Kubernetes providers[2], and it appears the Pulumi AWS provider (for example) _does_ use the Terraform AWS provider, even to this day[3].
1. https://developer.hashicorp.com/terraform/registry/providers... - "official" providers are maintained by HashiCorp
2. https://registry.terraform.io/browse/providers?tier=official - The filtered list of "official" providers maintained by HashiCorp
3. https://github.com/pulumi/pulumi-aws/tree/008c4360bc9fc24303... - Just prove it to myself, I can see the `upstream` git submodule, which embeds pulumi/terraform-provider-aws, which is a fork of hashicorp/terraform-provider-aws, although the repo was not created as a fork in Github, so it is not marked as a "fork" and so I have to compare commit histories to tell that it is a fork.
-
Converting Full Terraform Programs to Pulumi
>Isn't pulumi aws just terraform under the hood still?
It depends.
The AWS "Classic" provider uses the terraform provider [1].
The AWS "Native" provider does not, and instead uses the AWS Cloud Control API [2].
[1]: https://github.com/pulumi/pulumi-aws
[2]: https://github.com/pulumi/pulumi-aws-native
-
For IaC: Pulumi or Terraform?
Pulumi uses terraform providers to schematize the CRUD options for some cloud providers. Part of the difficulty with any infrastructure as code offering is that your favourite cloud provider doesn't always provide a full API spec, so we need to somehow figure out what resources can be created, what parameters are available to those resources etc. We take the terraform provider, look at the available operations for that provider and then turned it into a Pulumi schema, which can then be read by the Pulumi engine. If you take a look here you can actually see that generated schema for AWS.
infisical
- Show HN: Open-source alternative to HashiCorp/IBM Vault
-
IBM to Acquire HashiCorp, Inc
You should look into Infisical: https://github.com/Infisical/infisical
Disclaimer: Iβm one of the founders.
-
IBM Planning to Acquire HashiCorp
Do you know that OpenBao is actually funded by IBM?
I'm biased (co-founder) but you should take a look at Infisical for secret management: https://infisical.com
-
Top Secrets Management Tools for 2024
Infisical
-
Ask HN: Where do you save your API keys?
Check out Infisical: https://infisical.com
We help developers manage API keys, DB access tokens, certificates, and other types of secrets across all of their infrastructure β providing smooth native integrations with k8s, terraform, github actions, any local development setup, and much more.
Disclaimer: I'm one of the founders.
-
π‘οΈ4 Top Database Security Tools in 2024 ππ₯
Infisical is an open-source, end-to-end encrypted secret management platform for storing, managing, and syncing application configuration and secrets like API keys, database credentials, and environment variables across applications and infrastructure. It is an alternative to HashiCorp Vault and AWS Secrets Manager.
-
OpenBao β FOSS Fork of HashiCorp Vault
Check out Infisical: https://github.com/Infisical/infisical
Disclaimer: I'm one of the founders
-
π₯π₯ Our awesome OSS friends π
Infisical- Open source, end-to-end encrypted platform that lets you securely manage secrets and configs across your team, devices, and infrastructure.
-
Secure Credential Management in Ansible on a Shared Server?
Check out Infisical: https://infisical.com
-
π₯π Top 10 Open-Source Must-Have Tools for Crafting Your Own Chatbot π€π¬
Start building with Infisical. Support Infisical on GitHub β
What are some alternatives?
terracognita - Reads from existing public and private cloud providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
dotenv-vault - sync .env filesβfrom the creator of `dotenv`.
doctl - The official command line interface for the DigitalOcean API.
sso-wall-of-shame - A list of vendors that treat single sign-on as a luxury feature, not a core security requirement.
humbug - Get usage metrics and crash reports for your API, library, or command line tool.
infisical-cli - βΎ Infisical is an open-source, E2EE tool to sync environment variables across your team and infrastructure. [Moved to: https://github.com/Infisical/infisical]
pulumi-kubernetes - A Pulumi resource provider for Kubernetes to manage API resources and workloads in running clusters
teller - Cloud native secrets management for developers - never leave your command line for secrets.
pulumi-eks - A Pulumi component for easily creating and managing an Amazon EKS Cluster
Vault - A tool for secrets management, encryption as a service, and privileged access management
NATS - High-Performance server for NATS.io, the cloud and edge native messaging system.
envless - OpenSource, frictionless and secure way to share and manage app secrets across teams.