terraform-aws-eks VS checkov

Compare terraform-aws-eks vs checkov and see what are their differences.

terraform-aws-eks

Terraform module to create AWS Elastic Kubernetes (EKS) resources 🇺🇦 (by terraform-aws-modules)

checkov

Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew. (by bridgecrewio)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
terraform-aws-eks checkov
69 55
4,168 6,540
1.2% 1.3%
8.7 9.9
15 days ago 5 days ago
HCL Python
Apache License 2.0 Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

terraform-aws-eks

Posts with mentions or reviews of terraform-aws-eks. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-09.
  • Feat: Made it clear that we stand with Ukraine
    1 project | news.ycombinator.com | 27 Oct 2023
  • Need suggestions for managing eks terraform module
    2 projects | /r/Terraform | 9 Jul 2023
  • What's everyone's favorite EKS Terraform module these days?
    3 projects | /r/kubernetes | 3 Jul 2023
    cloudposse module was popular but most have moved to https://github.com/terraform-aws-modules/terraform-aws-eks also eks blueprints will be moving to this module. use eks blueprints v5
  • The Future of Terraform: ClickOps
    5 projects | /r/Terraform | 15 Jun 2023
    That's a very simplistic view. Let's do a small thought exercise. Is this module not infrastructure?
  • Failed to marshal state to json
    1 project | /r/Terraform | 10 Jun 2023
    I think there is an issue with the module eks : https://github.com/terraform-aws-modules/terraform-aws-eks
  • ☸️ How to deploy a cost-efficient AWS/EKS Kubernetes cluster using Terraform in 2023
    1 project | dev.to | 3 Jun 2023
    module "eks" { source = "terraform-aws-modules/eks/aws" cluster_name = var.cluster_name cluster_version = var.kubernetes_version cluster_endpoint_private_access = true cluster_endpoint_public_access = true cluster_addons = { coredns = { most_recent = true timeouts = { create = "2m" # default 20m. Times out on first launch while being effectively created } } kube-proxy = { most_recent = true } vpc-cni = { most_recent = true } aws-ebs-csi-driver = { most_recent = true } } vpc_id = module.vpc.vpc_id subnet_ids = module.vpc.private_subnets # Self managed node groups will not automatically create the aws-auth configmap so we need to create_aws_auth_configmap = true manage_aws_auth_configmap = true aws_auth_users = var.aws_auth_users enable_irsa = true node_security_group_additional_rules = { ingress_self_all = { description = "Node to node all ports/protocols" protocol = "-1" from_port = 0 to_port = 0 type = "ingress" self = true } egress_all = { # by default, only https urls can be reached from inside the cluster description = "Node all egress" protocol = "-1" from_port = 0 to_port = 0 type = "egress" cidr_blocks = ["0.0.0.0/0"] ipv6_cidr_blocks = ["::/0"] } } self_managed_node_group_defaults = { # enable discovery of autoscaling groups by cluster-autoscaler autoscaling_group_tags = { "k8s.io/cluster-autoscaler/enabled" : true, "k8s.io/cluster-autoscaler/${var.cluster_name}" : "owned", } # from https://github.com/terraform-aws-modules/terraform-aws-eks/issues/2207#issuecomment-1220679414 # to avoid "waiting for a volume to be created, either by external provisioner "ebs.csi.aws.com" or manually created by system administrator" iam_role_additional_policies = { AmazonEBSCSIDriverPolicy = "arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy" } } # possible values : https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/node_groups.tf self_managed_node_groups = { default_node_group = { create = false } # fulltime-az-a = { # name = "fulltime-az-a" # subnets = [module.vpc.private_subnets[0]] # instance_type = "t3.medium" # desired_size = 1 # bootstrap_extra_args = "--kubelet-extra-args '--node-labels=node.kubernetes.io/lifecycle=normal'" # } spot-az-a = { name = "spot-az-a" subnet_ids = [module.vpc.private_subnets[0]] # only one subnet to simplify PV usage # availability_zones = ["${var.region}a"] # conflict with previous option. TODO try subnet_ids=null at creation (because at modification it fails) desired_size = 2 min_size = 1 max_size = 10 bootstrap_extra_args = "--kubelet-extra-args '--node-labels=node.kubernetes.io/lifecycle=spot'" use_mixed_instances_policy = true mixed_instances_policy = { instances_distribution = { on_demand_base_capacity = 0 on_demand_percentage_above_base_capacity = 0 spot_allocation_strategy = "lowest-price" # "capacity-optimized" described here : https://aws.amazon.com/blogs/compute/introducing-the-capacity-optimized-allocation-strategy-for-amazon-ec2-spot-instances/ } override = [ { instance_type = "t3.xlarge" weighted_capacity = "1" }, { instance_type = "t3a.xlarge" weighted_capacity = "1" }, ] } } } tags = local.tags }
  • How are most EKS clusters deployed?
    7 projects | /r/kubernetes | 22 May 2023
    If you want somewhat viable setup - I'd go for terraform-aws-modules (Anton did an awesome job), and aws-ia blueprints, especially those multi-tenant ones.
  • I am stuck on learning how to provision K8s in AWS. Security groups? ALB? ACM? R53?
    3 projects | /r/Terraform | 19 Mar 2023
    ‏https://github.com/terraform-aws-modules/terraform-aws-eks
  • Deal with external managed resources destruction
    1 project | /r/Terraform | 3 Mar 2023
    I tried using explicit depends_on between my modules but this practise is not recommended since it cause issues during planning.
  • How to Upgrade EKS Cluster and its Nodes via Terraform without disruption?
    1 project | /r/kubernetes | 24 Jan 2023
    If you use https://github.com/terraform-aws-modules/terraform-aws-eks it is designed to upgrade the components in the correct order when the cluster version is changed

checkov

Posts with mentions or reviews of checkov. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-05-01.
  • Cloud Security and Resilience: DevSecOps Tools and Practices
    10 projects | dev.to | 1 May 2024
    1. Checkov: https://github.com/bridgecrewio/checkov Checkov is a static code analysis tool that helps developers prevent cloud misconfigurations during the development phase by scanning Terraform, CloudFormation, Kubernetes, and more.
  • A Deep Dive Into Terraform Static Code Analysis Tools: Features and Comparisons
    6 projects | dev.to | 16 Apr 2024
    Checkov Owner/Maintainer: Prisma Cloud by Palo Alto Networks (acquired in 2021) Age: First released on GitHub on March 31st, 2021 License: Apache License 2.0
  • Top Terraform Tools to Know in 2024
    19 projects | dev.to | 26 Mar 2024
    ‍Checkov is another great tool that examines your Terraform files (.tf), parsing the configurations and evaluating them against a comprehensive set of predefined policies. It scans Terraform-managed infrastructure and detects misconfigurations that could lead to security issues or non-compliance with best practices and regulations.
  • A list of SaaS, PaaS and IaaS offerings that have free tiers of interest to devops and infradev
    47 projects | dev.to | 5 Feb 2024
    Bridgecrew — Infrastructure as code (IaC) security powered by the open source tool - Checkov. The core Bridgecrew platform is free for up to 50 IaC resources.
  • 10 Ways for Kubernetes Declarative Configuration Management
    23 projects | dev.to | 1 Jan 2024
    Kustomize: It provides a solution to customize the Kubernetes resource base configuration and differential configuration without template and DSL. It does not solve the constraint problem itself, but needs to cooperate with a large number of additional tools to check constraints, such as Kube-linter, Checkov and kubescape.
  • Top 10 terraform tools you should know about.
    10 projects | dev.to | 11 Dec 2023
    Checkov is a versatile static code analysis tool designed for infrastructure as code (IaC) and software composition analysis (SCA). It supports a wide range of technologies, including Terraform, CloudFormation, Kubernetes, Docker, and others, to detect security and compliance issues through graph-based scanning. Checkov also performs SCA scans, identifying vulnerabilities in open source packages and images by checking for Common Vulnerabilities and Exposures (CVEs). Additionally, it is integrated into Prisma Cloud Application Security, a platform that helps developers secure cloud resources and infrastructure-as-code files, enabling the identification, rectification, and prevention of misconfigurations throughout the development lifecycle.
  • Understanding Container Security
    3 projects | dev.to | 21 Jul 2023
    For your Dockerfiles, you can also scan them. There are lots of tools that can check your Dockerfiles. They will validate if Dockerfile is compliant with Docker best practices such as not using root user, making sure a health check exists, and not exposing the SSH port. You can use Snyk and Checkov.
  • Apim + function app & event grid
    1 project | /r/AZURE | 14 Apr 2023
    You could try https://www.checkov.io/
  • Terraform Security Best Practices
    2 projects | /r/devops | 21 Mar 2023
    We use https://www.checkov.io/ for this, it's very simple to get started with and works really well as PR quality gate
  • How long have you guys actually had the title “platform engineer”? What other titles did you have before that, if any?
    3 projects | /r/platform_engineering | 14 Feb 2023
    Once there is a CI pipeline for delivering infra changes you can add static code analysis tools (checkov) and even start testing changes (terratest)

What are some alternatives?

When comparing terraform-aws-eks and checkov you can also consider the following projects:

terragrunt-infrastructure-modules-example - A repo used to show examples file/folder structures you can use with Terragrunt and Terraform

tfsec - Security scanner for your Terraform code [Moved to: https://github.com/aquasecurity/tfsec]

eksctl - The official CLI for Amazon EKS

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

terraform-aws-cloudwatch - Terraform module to create AWS Cloudwatch resources 🇺🇦

tflint - A Pluggable Terraform Linter

terraform-aws-eks-blueprints - Configure and deploy complete EKS clusters.

OPA (Open Policy Agent) - Open Policy Agent (OPA) is an open source, general-purpose policy engine.

eks-alb-istio-with-tls - This repository demonstrate how to configure end-to-end encryption on EKS platform using TLS certificate from Amazon Certificate Manager, AWS Application LoadBalancer and Istio as service mesh.

terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.

terraform-aws-security-group - This terraform module creates set of Security Group and Security Group Rules resources in various combinations.

kics - Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.