terraform
terragrunt


terraform | terragrunt | |
---|---|---|
555 | 66 | |
44,749 | 8,479 | |
1.6% | 1.2% | |
9.9 | 9.7 | |
1 day ago | 2 days ago | |
Go | Go | |
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform
-
How I Vibe-Coded an App to Explore GitHub Topics and Trending Repositories
Claude also created the IAC for deploying the app on Hetzner, using Terraform as the configuration tool. I only had to provide my Hetzner API key for VPS resource provisioning and my Cloudflare API key for domain name DNS entry management. 🌐
-
Getting Started with Terraform for Cloud Deployment
Terraform Installed: Download and install Terraform from the website: https://www.terraform.io/
-
Automating AWS EC2 Provisioning with Terraform: A Step-by-Step Guide
Download Terraform from the Terraform website.
-
How and When to Use Terraform with Kubernetes
Terraform is an infrastructure as code tool that replaces the ClickOps method of defining, deploying, and managing infrastructure locally, on-premises, or in the cloud. Its declarative method of defining infrastructure lets you focus on the target state of the infrastructure rather than the steps needed to achieve that state, which makes managing infrastructure easier.
- Lambda Power Tuning + Terraform
-
Python in DevOps: Automation, Efficiency, and Scalability
Terraform and Pulumi automate the provisioning of cloud resources. IaC ensures consistency and eliminates manual errors when setting up infrastructure.
-
How I suffered my first burnout as software developer
As part of the task, I also needed to build the necessary infrastructure in AWS. The client organization primarily relied on “click-ops,” manually configuring resources through the AWS Management Console, and had not yet embraced Infrastructure as Code (IaC). Since we wanted to introduce IaC to streamline processes, I asked my boss if they had a preferred tool, such as Terraform, AWS CDK, or Pulumi. Their response was vague: “Any tool will do.”
-
2025’s Must-Know Tech Stacks
Terraform
-
Top DevSecOps Tools for 2025
HashiCorp Terraform and Vault form a powerful combination in the DevSecOps landscape, embedding security into infrastructure provisioning and secrets management.
-
5 Best Practices for Multi-Cluster Kubernetes Add-on Management
Automate Add-on Management: Kubernetes Operators and Infrastructure-as-Code (IaC) tools like Terraform reduce manual effort by automating add-on lifecycles and updates.
terragrunt
- Simplifiez votre infra avec les Stacks Terragrunt
-
Top Terraform/OpenTofu tools to Use in 2025
Link: https://terragrunt.gruntwork.io
-
Provision EKS Cluster with Terraform, Terragrunt & GitHub Actions
name: Deploy on: push: branches: - main pull_request: branches: - main jobs: terraform: runs-on: ubuntu-latest steps: - name: Checkout repository uses: actions/checkout@v2 - name: Setup SSH uses: webfactory/[email protected] with: ssh-private-key: ${{ secrets.SSH_PRIVATE_KEY }} - name: Setup Terraform uses: hashicorp/setup-terraform@v2 with: terraform_version: 1.5.5 terraform_wrapper: false - name: Setup Terragrunt run: | curl -LO "https://github.com/gruntwork-io/terragrunt/releases/download/v0.48.1/terragrunt_linux_amd64" chmod +x terragrunt_linux_amd64 sudo mv terragrunt_linux_amd64 /usr/local/bin/terragrunt terragrunt -v - name: Apply Terraform changes run: | cd dev terragrunt run-all apply -auto-approve --terragrunt-non-interactive -var AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID -var AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY -var AWS_REGION=$AWS_DEFAULT_REGION cd bastion-ec2 ip=$(terragrunt output instance_public_ip) echo "$ip" echo "$ip" > public_ip.txt cat public_ip.txt pwd env: AWS_ACCESS_KEY_ID: ${{ secrets.AWS_ACCESS_KEY_ID }} AWS_SECRET_ACCESS_KEY: ${{ secrets.AWS_SECRET_ACCESS_KEY }} AWS_DEFAULT_REGION: ${{ secrets.AWS_DEFAULT_REGION }}
-
The main steps I follow when kicking off Node.js projects
Terraform. I use it to manage infrastructure. It simplifies many things if at least a few people work on a project. As the project grows, it becomes massive, and maybe for better state management, you will need tools like Terragrunt to keep infrastructure-related code simple. If you use AWS as a cloud provider, you can also use AWS CDK. It’s a nice tool with Typescript support, but it’s available only for AWS, and if you need something from a different cloud infrastructure, the code will be much more complex than Terraform. That’s why I prefer the Terraform even for AWS.
-
Building Auth0 Actions in TypeScript
You need to ensure your Action code is built before you attempt a terrform plan or apply. In our case we are using terragrunt which has a helpful before_hook, setup in the terragrunt.hcl file as follows:
-
Show HN: Burrow is a globally distributed, serverless HTTP proxy
https://github.com/hashicorp/terraform/issues/19932
My understanding is that people that have this as a first-class concern use something like Terragrunt to dynamically generate the HCL as needed.
https://terragrunt.gruntwork.io/
For Burrow here, I was was focused on shipping something and didn't want to spend time on generating that code just yet. But the project has gotten some attention so if this is a recurring request I'll probably do it.
Note that I intentionally chose the 17 AWS regions that are default enabled in every new AWS account, so it should only be if you want to customize it that this becomes important.
A Cloudformation Stacks based deployment to achieve multi-region would be another good (and perhaps better) option here. I could add that to the Makefile, with inspiration from your link there.
-
Tenv v2.0: The Importance of Explicit Behavior for Version Manager
Terragrunt started to use OpenTofu as the default IAC tool, however, this was not a major release; instead, it was provided as a patch and users didn't expect to have any differences in the behavior. The original problem may be found here.
-
Terragrunt Tutorial – Getting Started & Examples
Next, head over to the Terragrunt GitHub page to download it.
-
How to Manage Multiple Terraform Environments Efficiently
Terragrunt is a Terraform wrapper, designed to fill in the gaps when it comes to large scale Terraform configurations.
- Deploying a Containerized App to ECS Fargate Using a Private ECR Repo & Terragrunt
What are some alternatives?
boto3 - AWS SDK for Python
terraform-cdk - Define infrastructure resources using programming constructs and provision them using HashiCorp Terraform
Docker Compose - Define and run multi-container applications with Docker
atmos - 👽 Terraform Orchestration Tool for DevOps. Keep environment configuration DRY with hierarchical imports of configurations, inheritance, and WAY more. Native support for Terraform and Helmfile.
sceptre - Build better AWS infrastructure
terratest - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.

