terraform-aws-cloudwatch
terraform-aws-security-group
terraform-aws-cloudwatch | terraform-aws-security-group | |
---|---|---|
1 | 6 | |
153 | 549 | |
2.0% | 0.5% | |
6.6 | 4.8 | |
about 2 months ago | 5 days ago | |
HCL | HCL | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-aws-cloudwatch
-
How do you handle cloud watch metric alerts? { $.level = error }
I have a lot of these created through the console, i am going to import them all and i have a need to create a few more now. I can write my own module, though there may be a better solution than i have found. The best is https://github.com/terraform-aws-modules/terraform-aws-cloudwatch.
terraform-aws-security-group
-
Security groups / rules are working but becoming unmanageable - how can I streamline this?
I've got a terraform workspace that has grown very organically. I'm setting my security group rules in a locals definition then calling each type of rule from each of the local values. I've looked into the security group module by Anton but because we have a mixture of CIDRs and Secgroups (as destinations and sources) I do not believe we can leverage it the way it is intended to be.
-
AWS Terraform: How do YOU manage your security groups?
First of all, I don't much go for stuff like https://github.com/terraform-aws-modules/terraform-aws-security-group, I find it obscures what's actually going on. Where before I just had to learn how AWS works, now I have to learn how AWS and all of these external modules work. Remember, infra-as-code isn't the same as other code-code, the same approaches that work for code-code don't always work for infra-as-code.
-
terraform-aws-modules/security-group - best approach for adding rules?
Looks good, but there is no such rule named "splunk" but there are 4 of them - https://github.com/terraform-aws-modules/terraform-aws-security-group/blob/master/rules.tf#L139-L142 .
What are some alternatives?
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources πΊπ¦
terraform-aws-rds - Terraform module to create AWS RDS resources πΊπ¦
terraform-aws-vpc - Terraform module to create AWS VPC resources πΊπ¦
terraform-aws-iam - Terraform module to create AWS IAM resources πΊπ¦
Terraform-EKS-Cluster-with-Node-Group - Creating an EKS cluster with node group
terraform-oci-tdf-network-security - (OCI) Oracle Cloud Infrastructure module to manage security policies
terraform-aws-datadog-metric-stream - Boilerplate Terraform configuration for AWS infrastructure to support CloudWatch Metric Streams for delivery of metrics into Datadog.
terraform-aws-s3-bucket - Terraform module to create AWS S3 resources πΊπ¦