terraform-provider-helm
terraform-provider-kubernetes
Our great sponsors
terraform-provider-helm | terraform-provider-kubernetes | |
---|---|---|
5 | 2 | |
976 | 1,395 | |
0.9% | - | |
7.7 | 10.0 | |
5 days ago | about 1 year ago | |
Go | Go | |
Mozilla Public License 2.0 | Mozilla Public License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-provider-helm
- Does anyone else have a workaround for terraform revealing sensitive data via destroy? It's a known bug and it defeats the purpose of having a sensitive function.
-
How to install Metrics server in eks?
seems like you can by passing in the path to a local folder https://github.com/hashicorp/terraform-provider-helm/issues/189
-
Error: cannot re-use a name that is still in use
for some reason wasnt for the life of me able to find anything of value in global network. the closest one might be this: https://github.com/hashicorp/terraform-provider-helm/issues/425
-
null_resources are very scary since there's no way pass in provider credentials
When the helm provider is literally broken when trying to install istio onto a cluster
- Passing annotations for helm resource isn't working as expected.
terraform-provider-kubernetes
-
Retrieve token data from Kubernetes Service Account in Terraform
I've also made a Github issue here.
-
How to bootstrap RBAC privileges when bringing up a GKE cluster with Terraform
The problem I'm having is permissions. I'd like a neat, tidy, declarative way to make a cluster and have a set of credentials in hand that I can use short-term to do "admin" operations on it, including bootstrapping other users. I know how to make the google user that's running TF an admin of the cluster (that question comes up a lot), but that doesn't seem very nice. Not least, the k8s TF provider doesn't support clusterolebinding (Issue, partial PR) so you have to "shell out" with a local-exec provisioner to first run gcloud container clusters get-credentials and then kubectl create clusterrolebinding ....
What are some alternatives?
terraform-provider-carvel - Carvel Terraform provider with resources for ytt and kapp to template and deploy to Kubernetes
terraform-provider-kubectl - Terraform provider to handle raw kubernetes manifest yaml files
terraform-helpers - A collection of generic validators that satisfy the tfsdk.AttributeValidator interface.
terrajet - Generate Crossplane Providers from any Terraform Provider
terraform-provider-azurerm - Terraform provider for Azure Resource Manager
terraform-provider-xenserver - XenServer provider for Terraform
terraform-provider-azuredevops - Terraform Azure DevOps provider
terraform-provider-hetznerdns - Terraform provider for Hetzner DNS
terraform-provider-fastly - Terraform Fastly provider
terraform-provider-okta - Terraform Okta provider