terraform-aws-security-group
terraform-aws-s3-bucket
terraform-aws-security-group | terraform-aws-s3-bucket | |
---|---|---|
6 | 4 | |
549 | 487 | |
0.5% | 1.2% | |
4.8 | 7.0 | |
3 days ago | 10 days ago | |
HCL | HCL | |
GNU General Public License v3.0 or later | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-aws-security-group
-
Security groups / rules are working but becoming unmanageable - how can I streamline this?
I've got a terraform workspace that has grown very organically. I'm setting my security group rules in a locals definition then calling each type of rule from each of the local values. I've looked into the security group module by Anton but because we have a mixture of CIDRs and Secgroups (as destinations and sources) I do not believe we can leverage it the way it is intended to be.
-
AWS Terraform: How do YOU manage your security groups?
First of all, I don't much go for stuff like https://github.com/terraform-aws-modules/terraform-aws-security-group, I find it obscures what's actually going on. Where before I just had to learn how AWS works, now I have to learn how AWS and all of these external modules work. Remember, infra-as-code isn't the same as other code-code, the same approaches that work for code-code don't always work for infra-as-code.
-
terraform-aws-modules/security-group - best approach for adding rules?
Looks good, but there is no such rule named "splunk" but there are 4 of them - https://github.com/terraform-aws-modules/terraform-aws-security-group/blob/master/rules.tf#L139-L142 .
terraform-aws-s3-bucket
- Terraform S3 module input `putin_khuylo` specifies whether you agree with Putin
-
HashiCorp Terraform AWS Provider Introduces Significant Changes to Amazon S3 Bucket Resource
no, we pinned it pretty quickly once v4 of the provider was released https://github.com/terraform-aws-modules/terraform-aws-s3-bucket/pull/136
-
Terragrunt 'terraform {}' code block - having trouble understanding git URL
Sorry, grunt isn't my normal thing, but I get what you're asking now - that's the git version tag. You only need to specify that if you want to pin a tagged version of the repo instead of the master branch. The latest branch is 2.6.0 so you could pin that and specify that version if you wanted https://github.com/terraform-aws-modules/terraform-aws-s3-bucket/tree/v2.6.0
What are some alternatives?
terraform-aws-rds - Terraform module to create AWS RDS resources πΊπ¦
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources πΊπ¦
terraform-aws-vpc - Terraform module to create AWS VPC resources πΊπ¦
Terraform-EKS-Cluster-with-Node-Group - Creating an EKS cluster with node group
terraform-aws-iam - Terraform module to create AWS IAM resources πΊπ¦
terraform-aws-cloudwatch - Terraform module to create AWS Cloudwatch resources πΊπ¦
terraform-aws-eks-cluster - Terraform module for provisioning an EKS cluster
terraform-oci-tdf-network-security - (OCI) Oracle Cloud Infrastructure module to manage security policies
terraform-aws-security-group - This terraform module creates set of Security Group and Security Group Rules resources in various combinations.
terraform-aws-lambda - Terraform module, which takes care of a lot of AWS Lambda/serverless tasks (build dependencies, packages, updates, deployments) in countless combinations πΊπ¦