terragrunt-atlantis-config VS terraform-aws-eks

Compare terragrunt-atlantis-config vs terraform-aws-eks and see what are their differences.

terragrunt-atlantis-config

Generate Atlantis config for Terragrunt projects. (by transcend-io)

terraform-aws-eks

Terraform module to create AWS Elastic Kubernetes (EKS) resources 🇺🇦 (by terraform-aws-modules)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
terragrunt-atlantis-config terraform-aws-eks
8 69
565 4,168
2.8% 1.2%
7.8 8.7
3 days ago 15 days ago
HCL HCL
MIT License Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

terragrunt-atlantis-config

Posts with mentions or reviews of terragrunt-atlantis-config. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-04-13.
  • Pulumi Insights – AI generated IaC programs
    6 projects | news.ycombinator.com | 13 Apr 2023
    I've also made the switch from managing a few thousand Terraform modules to handling most app-code things in Pulumi and have run into some of these limitations.

    With Terraform + Terragrunt + Atlantis, we created https://github.com/transcend-io/terragrunt-atlantis-config and had an extremely robust and easy to use flow for updating all infra code.

    We've since moved to an approach where more of our infra/security things are managed in Terraform (like Guardduty, SSO, Github repo settings, etc.) maintained by more devops folks, and our app code is mostly in Pulumi (lambdas, Fargate, CloudFront/CloudFlare CDNs, etc.). To accomplish this without something like Atlantis, we moved the app code infra deployments from being deployed continuously pre-merge via Atlantis to being deployed via `pulumi up` calls in our normal CI flows, so like right next to where we build the docker images and restart ECS services, as an example.

    Overall I actually really love this flow. It is so, so much easier to create multi-regional infra in Pulumi with a quick for loop, and it's also much easier to do things like run esbuild over our code in typescript, and then bundle the output of that call and send it up to a Lambda function all from pulumi/typescript without needing separate build steps or to do things like using terragrunt pre-hooks or Docker build steps inside terraform provisioners, which I always found slow and clunky.

    I would agree that Pulumi's plans are a disappointment though, exactly as you said.

    Overall I've been happy with the change, and we've seen some improvements I think in the velocity that developers can launch services that meet our requirements.

  • Any examples of Terragrunt used in Github Actions?
    7 projects | /r/Terraform | 1 Oct 2022
    I recommend atlantis with terragrunt-atlantis-config.
  • Atlantis with Terragrunt
    2 projects | /r/Terraform | 31 Aug 2022
  • Error on terragrunt-atlantis-config on project generation
    1 project | /r/Terraform | 7 Mar 2022
    I know this is a bit too specific, it is about the ` terragrunt-atlantis-config tool, but in case anyone has come across this issue any help would be highly appreciated.
  • Do you use Atlantis for Terraform dev collaboration?
    3 projects | /r/devops | 25 Jan 2022
    I've managed to make it work but it was really hard for me to set it up correctly. My biggest issue was that I didn't want every Terragrunt module to be run when I've opened a PR. Have a look at this project which helped me to run only the modules witch changes in every PR. Note that, I last used Atlantis a year ago so I don't know if they recently made changes for better Terragrunt support.
  • Automating AWS Organizations & Best practices around using CI/CD for IaaC deployments
    2 projects | /r/devops | 4 Dec 2021
  • Enhancing the Terraform Experience: Why we use Terragrunt
    1 project | /r/savedForMS | 7 Oct 2021
  • Terragrunt — Becoming one with its internal behaviors
    1 project | /r/Terraform | 21 Dec 2020
    The most recent release of Atlantis includes a new feature that allows you to register a hook before atlantis reads its atlantis.yaml config. You can now dynamically build your atlantis.yaml file in the atlantis itself. I think using something like terragrunt-atlantis-config can make working with terragrunt easier.

terraform-aws-eks

Posts with mentions or reviews of terraform-aws-eks. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-09.
  • Feat: Made it clear that we stand with Ukraine
    1 project | news.ycombinator.com | 27 Oct 2023
  • Need suggestions for managing eks terraform module
    2 projects | /r/Terraform | 9 Jul 2023
  • What's everyone's favorite EKS Terraform module these days?
    3 projects | /r/kubernetes | 3 Jul 2023
    cloudposse module was popular but most have moved to https://github.com/terraform-aws-modules/terraform-aws-eks also eks blueprints will be moving to this module. use eks blueprints v5
  • The Future of Terraform: ClickOps
    5 projects | /r/Terraform | 15 Jun 2023
    That's a very simplistic view. Let's do a small thought exercise. Is this module not infrastructure?
  • Failed to marshal state to json
    1 project | /r/Terraform | 10 Jun 2023
    I think there is an issue with the module eks : https://github.com/terraform-aws-modules/terraform-aws-eks
  • ☸️ How to deploy a cost-efficient AWS/EKS Kubernetes cluster using Terraform in 2023
    1 project | dev.to | 3 Jun 2023
    module "eks" { source = "terraform-aws-modules/eks/aws" cluster_name = var.cluster_name cluster_version = var.kubernetes_version cluster_endpoint_private_access = true cluster_endpoint_public_access = true cluster_addons = { coredns = { most_recent = true timeouts = { create = "2m" # default 20m. Times out on first launch while being effectively created } } kube-proxy = { most_recent = true } vpc-cni = { most_recent = true } aws-ebs-csi-driver = { most_recent = true } } vpc_id = module.vpc.vpc_id subnet_ids = module.vpc.private_subnets # Self managed node groups will not automatically create the aws-auth configmap so we need to create_aws_auth_configmap = true manage_aws_auth_configmap = true aws_auth_users = var.aws_auth_users enable_irsa = true node_security_group_additional_rules = { ingress_self_all = { description = "Node to node all ports/protocols" protocol = "-1" from_port = 0 to_port = 0 type = "ingress" self = true } egress_all = { # by default, only https urls can be reached from inside the cluster description = "Node all egress" protocol = "-1" from_port = 0 to_port = 0 type = "egress" cidr_blocks = ["0.0.0.0/0"] ipv6_cidr_blocks = ["::/0"] } } self_managed_node_group_defaults = { # enable discovery of autoscaling groups by cluster-autoscaler autoscaling_group_tags = { "k8s.io/cluster-autoscaler/enabled" : true, "k8s.io/cluster-autoscaler/${var.cluster_name}" : "owned", } # from https://github.com/terraform-aws-modules/terraform-aws-eks/issues/2207#issuecomment-1220679414 # to avoid "waiting for a volume to be created, either by external provisioner "ebs.csi.aws.com" or manually created by system administrator" iam_role_additional_policies = { AmazonEBSCSIDriverPolicy = "arn:aws:iam::aws:policy/service-role/AmazonEBSCSIDriverPolicy" } } # possible values : https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/node_groups.tf self_managed_node_groups = { default_node_group = { create = false } # fulltime-az-a = { # name = "fulltime-az-a" # subnets = [module.vpc.private_subnets[0]] # instance_type = "t3.medium" # desired_size = 1 # bootstrap_extra_args = "--kubelet-extra-args '--node-labels=node.kubernetes.io/lifecycle=normal'" # } spot-az-a = { name = "spot-az-a" subnet_ids = [module.vpc.private_subnets[0]] # only one subnet to simplify PV usage # availability_zones = ["${var.region}a"] # conflict with previous option. TODO try subnet_ids=null at creation (because at modification it fails) desired_size = 2 min_size = 1 max_size = 10 bootstrap_extra_args = "--kubelet-extra-args '--node-labels=node.kubernetes.io/lifecycle=spot'" use_mixed_instances_policy = true mixed_instances_policy = { instances_distribution = { on_demand_base_capacity = 0 on_demand_percentage_above_base_capacity = 0 spot_allocation_strategy = "lowest-price" # "capacity-optimized" described here : https://aws.amazon.com/blogs/compute/introducing-the-capacity-optimized-allocation-strategy-for-amazon-ec2-spot-instances/ } override = [ { instance_type = "t3.xlarge" weighted_capacity = "1" }, { instance_type = "t3a.xlarge" weighted_capacity = "1" }, ] } } } tags = local.tags }
  • How are most EKS clusters deployed?
    7 projects | /r/kubernetes | 22 May 2023
    If you want somewhat viable setup - I'd go for terraform-aws-modules (Anton did an awesome job), and aws-ia blueprints, especially those multi-tenant ones.
  • I am stuck on learning how to provision K8s in AWS. Security groups? ALB? ACM? R53?
    3 projects | /r/Terraform | 19 Mar 2023
    ‏https://github.com/terraform-aws-modules/terraform-aws-eks
  • Deal with external managed resources destruction
    1 project | /r/Terraform | 3 Mar 2023
    I tried using explicit depends_on between my modules but this practise is not recommended since it cause issues during planning.
  • How to Upgrade EKS Cluster and its Nodes via Terraform without disruption?
    1 project | /r/kubernetes | 24 Jan 2023
    If you use https://github.com/terraform-aws-modules/terraform-aws-eks it is designed to upgrade the components in the correct order when the cluster version is changed

What are some alternatives?

When comparing terragrunt-atlantis-config and terraform-aws-eks you can also consider the following projects:

terragrunt-infrastructure-live-example - A repo used to show examples file/folder structures you can use with Terragrunt and Terraform

terragrunt-infrastructure-modules-example - A repo used to show examples file/folder structures you can use with Terragrunt and Terraform

terraform-aws-ecs-atlantis - Terraform module for deploying Atlantis as an ECS Task

eksctl - The official CLI for Amazon EKS

terraform-aws-atlantis - Terraform module to deploy Atlantis on AWS Fargate 🇺🇦

terraform-aws-cloudwatch - Terraform module to create AWS Cloudwatch resources 🇺🇦

org-formation-cli - Better than landingzones!

terraform-aws-eks-blueprints - Configure and deploy complete EKS clusters.

modules.tf-demo - Real modules.tf demo (updated May 2021)

eks-alb-istio-with-tls - This repository demonstrate how to configure end-to-end encryption on EKS platform using TLS certificate from Amazon Certificate Manager, AWS Application LoadBalancer and Istio as service mesh.

terraform-starter - Starter repository to play with Spacelift

terraform-aws-security-group - This terraform module creates set of Security Group and Security Group Rules resources in various combinations.