terraform-azurerm-caf-enterprise-scale
typhoon
terraform-azurerm-caf-enterprise-scale | typhoon | |
---|---|---|
6 | 12 | |
749 | 1,895 | |
1.3% | 0.6% | |
7.8 | 8.4 | |
2 days ago | 9 days ago | |
HCL | HCL | |
MIT License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-azurerm-caf-enterprise-scale
-
Terraforming Azure, where to start?
I'm planning to use the official landing zone module developped by MSFT, but it's a big bite. https://github.com/Azure/terraform-azurerm-caf-enterprise-scale/wiki
-
Build greenfield Azure landing zones with Terraform in less than 1 hour
u/Ok-Inspection3886 Great question! Under the hood we use the Azure landing zones terraform module which is recommended by Azure when using Terraform if you're interested in "Platform Landing Zones". The module itself deploys custom policies and also allows users to add additional custom policies relatively easy.
-
What problems do you have when building landing zones?
Honestly, https://github.com/Azure/terraform-azurerm-caf-enterprise-scale does a pretty good job at deploying a landing zone-architecture, is active and maintained. I wouldnt try to re-invent the work Microsoft are doing themself but rather contribute to that project and build tools around the existing module. An issue I often hear from people is that they have a hard time visualizing which policies are added on parent management groups and how to exclude/adjust them.
-
Engineers Who Redesigned and Successfully Rebuilt an Already Established, Painfully Disorganized and Manually Built Cloud Infrastructure - How did you do it?
To add to the links, azure released their own version of terraformer (I've never used it myself but if your deployments are on azure it may fill the gaps where terraformer fails) https://techcommunity.microsoft.com/t5/azure-tools-blog/announcing-azure-terrafy-and-azapi-terraform-provider-previews/ba-p/3270937 also https://github.com/Azure/terraform-azurerm-caf-enterprise-scale/tree/main covers creating terraform to create stuff like policies not managed by the standard azurerm terraform module. Best of luck!
-
Cosmos DB secure Network Configuration
The azure environment I'm working on has the Terraform Module for Cloud Adoption Framework Enterprise-scale implemented, so how is the right pattern to connect the cosmos DB with the Hub VNet and also be able to receive data from external sources?
-
Large scale deployment best practices
Microsoft provides a an excellent enterprise scale terraform setup here: https://github.com/Azure/terraform-azurerm-caf-enterprise-scale
typhoon
-
You Can't Control Your Data in the Cloud
Don't forget the lies of cost savings that the Cloud providers have shoved down our industry's throats. We are paying out the nose for cloud services and we are giving up all the rights to our data. It's a bad deal in the end.
I have a bunch of friends that work at SaaS companies and their cloud spend for pretty basic deployments is in the many thousands of dollars a month. Most of their deployments could be handled by a half rack with beefy servers in a couple of datacenters for a fraction of the cost. I pay for a full rack myself and it costs me ~$1200 a month for space, power and bandwidth (10Gb pipe with a current 1Gb commit), and my hardware costs for everything in that rack were a one time cost of around $3000. I have 160 GHz of CPU and 141 GiB of memory for my workloads with a few servers that are not yet provisioned into my Nomad cluster.
And before you say well there are costs involved with finding people that have the skills to do that kind of thing and time needed to set all of that up, yes that is true, but our industry has moved from one bucket to another one that is more expensive in the end with a bunch of downsides. I think there is a middle ground where you can use some cloud services and run the important stuff on hardware you own. The tooling to self-host your own stack in a rack of servers you own is light years better than it was 10 years ago and it keeps getting better. Tools like https://nebula.defined.net/docs/ and https://github.com/poseidon/typhoon for example enable you to use whatever providers you want and build a deployment can cost less, gives you more control over your data, while being agile enough to make changes when the team needs something new or different.
I am excited for the next 10 years of progress and I'd expect we are going to see more companies self-hosting their deployments on bare metal.
-
Kubernetes Exposed: One YAML Away from Disaster
This is also why managed Kubernetes is a useful thing (EKS, GKE, et al)... but if you still want to do it yourself, maybe look into some Kubernetes distros (like Typhoon (https://typhoon.psdn.io) which I run on my clusters)
- Provision a K8s with Terraform in 3 local VMs
-
Kubernetes and Terraform
Sounds like this may work for you: https://typhoon.psdn.io/
- Kubernetes on Bare Metal
-
Kubernetes The IaC Way - Or how to install Kubernetes The Hard Way in one command using Infrastructure as Code
These days I deploy using Typhoon. Production ready k8s in less than 20 minutes. It leverages Terraform and Flatcar Linux. Lovely combo. No need to do any of it "the hard way" unless you want to know about the internals.
- Minimal and free Kubernetes distribution with Terraform!
-
Kubernetes, Jenkins, Docker/Packer, and dynamic kickstart server.
I actually use terraform + matchbox to bare metal provision k8s (flatcar linux) using Typhoon.
- Recommendations for a container OS?
-
Typhoon
Wondering what others think? Typhoon
What are some alternatives?
Enterprise-Scale - The Azure Landing Zones (Enterprise-Scale) architecture provides prescriptive guidance coupled with Azure best practices, and it follows design principles across the critical design areas for organizations to define their Azure architecture
harvester - Open source hyperconverged infrastructure (HCI) software
terraformer - CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code
kubespray - Deploy a Production Ready Kubernetes Cluster
caf-terraform-landingzones - Azure Terraform SRE framework
terraform-k3s-private-cloud - Private cluster with k3s. Why have 1 huge complicated cluster (pet) when you can have many simple, cheap clusters (cattle)?
terraform-kubestack - Kubestack is a framework for Kubernetes platform engineering teams to define the entire cloud native stack in one Terraform code base and continuously evolve the platform safely through GitOps.
k8s-hetzner - A Kubernetes cluster provisioned with Terraform, running in Hetzner Cloud
cloud-guardrails - Rapidly apply hundreds of security controls in Azure
Flatcar - Flatcar project repository for issue tracking, project documentation, etc.
terraform-azurerm-caf - Terraform supermodule for the Terraform platform engineering for Azure
azure-aks-kubernetes-masterclass - Azure AKS Kubernetes Masterclass