terraform-aws-vpc
terraform-aws-security-group
Our great sponsors
terraform-aws-vpc | terraform-aws-security-group | |
---|---|---|
23 | 6 | |
2,872 | 546 | |
1.2% | 0.5% | |
7.6 | 5.2 | |
about 18 hours ago | 3 days ago | |
HCL | HCL | |
Apache License 2.0 | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-aws-vpc
- Despliega una Infraestructura de Red AWS Robusta con Terraform
-
Un cΓ³ctel perfecto πΉ ECS Fargate, Service Connect,Terraform y Github Actions.
ECR VPC ECS
- Private github monorepo to store official AWS terraform modules as github submodules
-
Deploy Secure Spring Boot Microservices on Amazon EKS Using Terraform and Kubernetes
Now let us move on to the important part of the tutorial. Creating an EKS cluster in AWS is not as straightforward as in other cloud platforms. You need to also create a lot more resources for everything to work correctly without surprises. You will be using a bunch of Terraform providers to help with this, and you will also use some prebuilt Terraform modules like AWS VPC Terraform module and Amazon EKS Blueprints for Terraform to reduce the amount of boilerplate you need to write.
-
Cost optimisation on AWS: Navigating NAT Charges with Private ECS Tasks on Fargate
The infrastructure is created using terraform, and can be found in this git repository. The project uses community maintained AWS Terraform modules, which simplify this process. The code examples that follow in the post are using the vpc-endpoints module to create the Gateway and interface endpoints.
- An issue with terraform module 3.2.0
-
Terraform Certification (Part 11): Modules
Let us use an example from AWS to see how we can use a publicly available module. When setting up a virtual network (or Virtual Private Cloud, VPC) in AWS there are a lot of resources you must create. One popular module is the AWS VPC module. The documentation for this module is available at registry.terraform.io/modules/terraform-aws-modules/vpc/aws. The simplest example of using this module looks like this:
-
Create a simple EKS cluster
locals { region = data.aws_region.current.name } module "vpc" { source = "git::https://github.com/terraform-aws-modules/terraform-aws-vpc.git?ref=v3.16.0" name = var.vpc_name cidr = var.vpc_cidr azs = ["${local.region}a", "${local.region}b"] public_subnets = cidrsubnets(var.vpc_cidr, 1, 1) enable_dns_hostnames = true enable_dns_support = true map_public_ip_on_launch = true tags = { Name = var.vpc_name } public_subnet_tags = { Name = "public subnet" "kubernetes.io/role/elb" = "1" "kubernetes.io/cluster/${var.cluster_name}" = "shared" } }
-
Trying to create a second Subnet using an official AWS module.
/u/akirakotkata all of the answers in this thread are correct, but nobody's empowered you to figure this out on your own in the future. In the registry link you provided, there's a link to Source Code. Follow that link and take a look at variables.tf in the repo, lines 13-17. That block is what is expected for the parameter, so you need to tweak what you're sending into what it expects.
- advance terraform practice
terraform-aws-security-group
-
Security groups / rules are working but becoming unmanageable - how can I streamline this?
I've got a terraform workspace that has grown very organically. I'm setting my security group rules in a locals definition then calling each type of rule from each of the local values. I've looked into the security group module by Anton but because we have a mixture of CIDRs and Secgroups (as destinations and sources) I do not believe we can leverage it the way it is intended to be.
-
AWS Terraform: How do YOU manage your security groups?
First of all, I don't much go for stuff like https://github.com/terraform-aws-modules/terraform-aws-security-group, I find it obscures what's actually going on. Where before I just had to learn how AWS works, now I have to learn how AWS and all of these external modules work. Remember, infra-as-code isn't the same as other code-code, the same approaches that work for code-code don't always work for infra-as-code.
-
terraform-aws-modules/security-group - best approach for adding rules?
Looks good, but there is no such rule named "splunk" but there are 4 of them - https://github.com/terraform-aws-modules/terraform-aws-security-group/blob/master/rules.tf#L139-L142 .
What are some alternatives?
winget-cli - WinGet is the Windows Package Manager. This project includes a CLI (Command Line Interface), PowerShell modules, and a COM (Component Object Model) API (Application Programming Interface).
terraform-aws-rds - Terraform module to create AWS RDS resources πΊπ¦
JavaScript - Algorithms and Data Structures implemented in JavaScript for beginners, following best practices.
Terraform-EKS-Cluster-with-Node-Group - Creating an EKS cluster with node group
Flutter-AI-Rubik-cube-Solver - Flutter-Python rubiks cube solver.
terraform-oci-tdf-network-security - (OCI) Oracle Cloud Infrastructure module to manage security policies
deploy-aws-lambda-to-vpc-with-terraform - Terraform module with all the cloud resources needed to run Lambda within a VPC
terraform-aws-cloudwatch - Terraform module to create AWS Cloudwatch resources πΊπ¦
elsa - βοΈ Elsa is a minimal, fast and secure runtime for JavaScript and TypeScript written in Go
terraform-aws-s3-bucket - Terraform module to create AWS S3 resources πΊπ¦
visx - π― visx | visualization components
terraform-aws-lambda - Terraform module, which takes care of a lot of AWS Lambda/serverless tasks (build dependencies, packages, updates, deployments) in countless combinations πΊπ¦