terraform-github-repository
terramate
terraform-github-repository | terramate | |
---|---|---|
2 | 16 | |
153 | 3,074 | |
3.3% | 3.0% | |
0.0 | 9.8 | |
13 days ago | 2 days ago | |
HCL | Go | |
Apache License 2.0 | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-github-repository
- A Terraform module to manage GitHub Repositories
-
Show HN: GitHub as Code – Manage GitHub with Terraform
Could you share some of the issues that you're experiencing with the provider? We've also ran into some issues with the providers but worked around most of the issues in our open-source modules (eg https://github.com/mineiros-io/terraform-github-repository) and by using Terramate (eg renaming repositories causes re-creation in the provider, with Terramate we're dynamically creating move statements to prevent this. Check out Terramate if you haven't done it yet: https://github.com/mineiros-io/terramate)
terramate
-
Terragrunt for Multi-Region/Multi-Account Deployments
Terramate: It seems like a good alternative, and I think it could have been a better choice for certain issues we had. With Terramate the transition from Terraform might have been easier since Terraform projects can be imported seamlessly. Furthermore, we don't have to think right away about how to modularize everything. The reason it was not chosen, is that my team was mainly familiar with Terragrunt. We had no experience with Terramate, so we decided to play it safely.
-
Terramate meets Atlantis 🚀
initContainers: - args: - >- curl -L https://github.com/terramate-io/terramate/releases/download/v${TERRAMATE_VERSION}/terramate_${TERRAMATE_VERSION}_linux_x86_64.tar.gz | tar xz command: - sh - -c env: - name: TERRAMATE_VERSION value: 0.4.5 image: curlimages/curl name: get-terramate volumeMounts: - mountPath: /home/curl_user/ name: terramate workingDir: /home/curl_user/ extraVolumes: - name: terramate emptyDir: {} extraVolumeMounts: - name: terramate mountPath: /usr/local/bin/terramate subPath: terramate readOnly: true
-
Top Terraform Tools to Know in 2024
Terramate is an open-source IaC orchestration tool for Terraform, OpenTofu, Pulumi, Cloudformation, and others, that streamlines and scales your IaC workflows.
- Terramate
-
Show HN: Layerform (YC S23) – Open-source development environments
Nice, this looks close to https://terramate.io/ stacks
-
Tools that actaully ease the burden of Terraform?
You might want to take a look at Terramate. Compared to other tooling such as Terragrunt we're not a wrapper that will lock you in yet another syntax. Terramate is a code generator and orchestrator that helps you to generate native Terraform that can be executed in whatever environment of your choice.
-
Backend question
Another option for Terragrunt could be Terramate. It comes with Code Generation that helps you to automatically generate files such as Terraform, Provider and Backend configurations in various stacks (directories). The upside is that it always generates native Terraform code.
-
How to manage terraform code for large projects?
This can be done with a tool such as Terramate or Terragrunt (afaik Terragrunt doesn't come with change detection).
-
Reminder: there are alternatives to Terraform Cloud out there
I'd love to add Terramate to the list of alternatives to Terraform Cloud!
- Terramate is a tool for managing multiple Terraform stacks
What are some alternatives?
azure-data-labs-modules - A list of Terraform modules to build your Azure Data IaC templates.
Pulumi - Pulumi - Infrastructure as Code in any programming language 🚀
terraform-github-organization - A Terraform module to manage GitHub Organizations. https://github.com/
terrakube - Open source IaC Automation and Collaboration Software.
terraform-aws-secure-baseline - Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
yor - Extensible auto-tagger for your IaC files. The ultimate way to link entities in the cloud back to the codified resource which created it.
terraform-provider-github - Terraform GitHub provider
atmos - 👽 Terraform Orchestration Tool for DevOps. Keep environment configuration DRY with hierarchical imports of configurations, inheritance, and WAY more. Native support for Terraform and Helmfile.
mock-aws-infrastructure - Mock IaC of AWS Environment
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
digger - Digger is an open source IaC orchestration tool. Digger allows you to run IaC in your existing CI pipeline ⚡️
atlantis - Terraform Pull Request Automation