setup-terraform
atlantis
setup-terraform | atlantis | |
---|---|---|
12 | 121 | |
1,279 | 7,349 | |
3.0% | 1.6% | |
8.0 | 9.7 | |
5 days ago | about 20 hours ago | |
JavaScript | Go | |
Mozilla Public License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
setup-terraform
-
Accelerating the Implementation of DevOps Culture in Your Organization with Amazon CodeCatalyst
# Adaptation of the https://developer.hashicorp.com/terraform/tutorials/automation/github-actions workflow Name: TerraformMainBranch SchemaVersion: "1.0" # Here we are including the trigger for this workflow: Push / Pull Request. If not included then this workflow will be executed only manually Triggers: - Type: Push Branches: - main # Here we are defining the actions that will be executed for this workflow Actions: Terraform-Main-Branch-Apply: Identifier: aws/build@v1 Inputs: Sources: - WorkflowSource Environment: Connections: - Role: Main-Branch-Infrastructure Name: "XXXXXXXXXXXX" Name: TerraformBootstrap Configuration: Steps: - Run: export TF_VERSION=1.5.2 && wget -O terraform.zip "https://releases.hashicorp.com/terraform/${TF_VERSION}/terraform_${TF_VERSION}_linux_amd64.zip" - Run: unzip terraform.zip && rm terraform.zip && mv terraform /usr/bin/terraform && chmod +x /usr/bin/terraform - Run: terraform init -no-color - Run: terraform validate -no-color - Run: terraform plan -no-color -input=false - Run: terraform apply -auto-approve -no-color -input=false Compute: Type: EC2
-
Terraform modules and ADO
Now, there is a GitHub issue for setup-terraform that essentially demonstrates a problem that might occur if you try to reference your Git repo from Azure Pipelines (using HTTP) without appropriate permissions or workarounds. In this issue, there are two solutions:
- Terraform apply is skipped for some reason when this GitHub action is run
-
Where can I find source code that I can practice devops with?
Have you tried the official tutorial here: https://learn.hashicorp.com/tutorials/terraform/github-actions ?
-
Looking for ideas for a large (9 month) project
Think of a simple web application you could build and deploy into a cloud environment like aws or GCP. Build your cloud infrastructure with Terraform for this application. Deploy that infrastructure and the application itself using GitOps. For example this: https://learn.hashicorp.com/tutorials/terraform/github-actions
- Pipeline IaC com Terraform e GitHub Actions
-
Terraform integrated in the deploy pipeline?
Here's an example using Github Actions: https://learn.hashicorp.com/tutorials/terraform/github-actions. You can set all kinds of conditions in the pipeline config to only trigger on certain dirs or files, like (Github Action example:
-
My First Experience Learning Terraform and Amazon ECS + AWS Fargate
You may need to use the Terraform Cloud. When you use the Terraform Cloud, please use this guide. However, it's not required for now.
-
Im at a loss for how to setup a CI/CD pipeline. REALLY need some help
Since it sounds like you're using GitHub, using GitHub Actions for any CI pipelines would be easiest. You could run terraform plan in your PRs, there's a great writeup on how to do it here. Or any unit tests, docker builds, etc. Lots of great ideas at Awesome Actions.
-
Cloud Resume Challenge - Trials & Tribulations
#11-15 The Finish Line So for the last portion of the challenge, I had to implement a test against my python code to make sure that it works as it should every time I update it. I then realized I wish I had started here first since I'd need to use IaC to deploy and configure all my resources. Reading I found that I could use SAM but instead I used Terraform/Terraform Cloud since I remember that's what many people use. I tore down almost everything that I did in the AWS console and redid everything using Terraform. I had to setup the API tokens, make a variable set using my AWS credentials and followed the tutorial on how to setup github actions and then I applied it to this challenge. I also used this resource to make a simple test. After that it was just setting up repositories for both my back end and front end.
atlantis
-
OpenTofu 1.7.0 is out with State Encryption, Dynamic Provider-defined Functions
None of these are a replacement of Terraform Cloud (recently rebranded to HCP Terraform). For example, when you create a PR, it could affect multiple workspaces. The new experimental version of TFC/TFE (I refuse to call it HCP!) implements Stacks, which is something like a workflow, and links one workspace output to other workspace inputs. None of the open-source solutions, including the paid Digger [0], support this - only the paid one, such as Spacelift [1] (which is the closest to TFC if you ask me). Having a monorepo of Terraform is a common design pattern, so, if I change an embedded module, it could trigger changes it many workspaces. As far as I know, Atlantis [2] can't really help in this case.
By the way, the reason I singled-out Spacelift is due to its quality, and the great Terraform provider it has. Scalr [3], for example, has a really low-quality Terraform provider. I extensively use the hashicorp/tfe provider to manage TFC itself.
[0]: https://digger.dev/
[1]: https://spacelift.io/
[2]: https://www.runatlantis.io/
[3]: https://www.scalr.com/
-
Terramate meets Atlantis 🚀
Atlantis is a pull request automation tool that works well with plain Terraform right away. But what if we're already using Terramate to generate Terraform code?
-
Top Terraform Tools to Know in 2024
Atlantis automates reviewing and deploying Terraform via pull requests, streamlining collaboration and ensuring consistency across Terraform deployments.
-
Stop Squinting at IaC Templates: Preview Diffs for Argo CD, Terraform, and more!
For example, Atlantisgo for Terraform, Zapier’s Kubechecks for Argo CD, Quizlet’s GitHub action all do something similar to this. But a generic, extensible tool for IaC providers doesn’t seem to exist. Additionally, many of them require exposing your Kubernetes cluster or other infrastructure to third-party access, webhooks, etc.
-
Self-service infrastructure as code
Our first attempt was to introduce other engineering teams to Terraform - the Platform team was already using it extensively with Terragrunt, and using Atlantis to automate plan and apply operations in a Git flow to ensure infrastructure was consistent. We'd written modules, with documentation, and an engineer would simply need to raise a PR to use the module and provide the right values, and Atlantis (once the PR was approved by Platform) would go ahead and set it up for them.
-
Seamless Cloud Infrastructure: Integrating Terragrunt and Terraform with AWS
Alternatively, you can look at solutions like Atlantis or spacelift.
-
What is the equivalent of docker-compose for terraform?
Atlantis: https://www.runatlantis.io/
-
Version of terraform binary cli does it include in the container
Looking at the commits at https://github.com/runatlantis/atlantis, it looks like 1.6.5. Am I right?
-
Terraform Cloud Pricing Changes Sticker Shock
We use Atlantis [0] for CI/CD automation of Terraform pull requests to a centralized repository. It's pretty good too, especially for a self-hosted solution. I can't see how Terraform Cloud's costs would be justifiable for us without a custom contract.
[0] https://www.runatlantis.io/
- Atlantis claims exemption from new HashiCorp license
What are some alternatives?
setup-tflint - A GitHub action that installs Terraform linter TFLint
terraform-github-actions - Terraform GitHub Actions
DataAnalyticsEnvironments - Automated real time streaming ingestion using Kafka and Databricks
argo-cd - Declarative Continuous Deployment for Kubernetes
github-script - Write workflows scripting the GitHub API in JavaScript
backstage - Backstage is an open platform for building developer portals
Workflows - Reusable workflows
terragrunt - Terragrunt is a thin wrapper for Terraform that provides extra tools for working with multiple Terraform modules.
my-aws - My AWS IAC
Pulumi - Pulumi - Infrastructure as Code in any programming language. Build infrastructure intuitively on any cloud using familiar languages 🚀
terraform-up-and-running-code - Code samples for the book "Terraform: Up & Running" by Yevgeniy Brikman
tfsec - Security scanner for your Terraform code [Moved to: https://github.com/aquasecurity/tfsec]