terragrunt-infrastructure-live-example
terrateam
terragrunt-infrastructure-live-example | terrateam | |
---|---|---|
23 | 12 | |
731 | 95 | |
2.5% | - | |
2.8 | 4.5 | |
about 2 months ago | about 1 month ago | |
HCL | ||
Apache License 2.0 | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terragrunt-infrastructure-live-example
-
Terragrunt for Multi-Region/Multi-Account Deployments
In the official Terragrunt documentation there is a good article about how to set up a Terragrunt project and where to place modules. In fact, there is also a repository on GitHub providing an example project on how the creators recommend setting up Terragrunt. I certainly recommend going through that repository, because it is a good reference for a starting point. Having that said, I like to structure mine a little bit differently. My recommendation is to have different AWS accounts for each environment. Getting a new account usually is relatively easy to accomplish even if we are working in a corporate environment (your workplace most likely is using AWS Organizations to manage accounts). The existence of multiple accounts does not require additional costs, we only pay for what we use.
-
Seamless Cloud Infrastructure: Integrating Terragrunt and Terraform with AWS
NOTE: More information about the terragrunt.hcl file can be found in this example repository.
-
Manage multiple terraform environments in a single terraform workspace state file
Here's a pointer to an example repository with a Terragrunt monorepo (good, easy to manage), and each module called gets its unique statefile (good, smaller blast radius) where the tradeoff is learning a new tool and paradigm: https://github.com/gruntwork-io/terragrunt-infrastructure-live-example.
-
Migrate from terragrunt to terraform
I also highly recommend to check out how terragrunt recommends structuring your repo and even further details on this documentation page.
-
Conditionally set resource provider
https://github.com/gruntwork-io/terragrunt-infrastructure-live-example/blob/master/_envcommon/mysql.hcl https://terragrunt.gruntwork.io/docs/features/keep-your-terraform-code-dry/
-
Deploying globally (to all regions) on AWS with terragrunt
did you have a look at this example? https://github.com/gruntwork-io/terragrunt-infrastructure-live-example/blob/master/terragrunt.hcl
- How to structure Terraform with multi-env + multi-regions for TBD in monorepo
-
How to you segregate your dev and prod environments in the repository
Terragrunt! Using a scaffolding approach like this for inspiration https://github.com/gruntwork-io/terragrunt-infrastructure-live-example
-
Terraform / Terragrunt multi-environment - Pass in environment name
I would recommend taking a look at the example repo here: https://github.com/gruntwork-io/terragrunt-infrastructure-live-example. The layout you have doesn't look like a structure that would work well with terragrunt.
-
How you structure your terraform state?
A good example is in gruntwork-io / terragrunt-infrastructure-live-example repository and further documentation on Terragrunt's own documentation page.
terrateam
-
Seamless Cloud Infrastructure: Integrating Terragrunt and Terraform with AWS
Terrateam: After getting into some really big issues when running Terragrunt with Github Actions, I decided to look for a better CI solution. Terrateam is my CI/CD tool of choice here. Unfortunately as of December 2023, they increased their price from USD $175 to USD $496 monthly. Me being an existing customer I still pay the old amount (thank God!) Alternatively, you can look at solutions like Atlantis or spacelift.
-
Digger – an open-source IaC automation and collaboration software
Disclaimer: I am a co-founder of Terrateam (https://terrateam.io/) a competitor to Digger.
For anyone using Digger, are all of the enterprise features in the open source codebase? If you pay for digger, or you just paying for support and hosting? Or do they separate OSS from Community, Pro, and Enterprise plans?
-
Terraform best practices for reliability at any scale
Disclaimer: Co-founder of Terrateam.
For Terrateam[0], we have probably 70% of the enterprise offering but at around 1/10th the price. If there are any features that are deal breaker, feel free to reach out to me and we'll see what we can do. That being said, Spacelift is a much more luxurious piece of software than us. We are very utilitarian, but we have to rationalize that low price-point somehow.
[0] https://terrateam.io
-
Terraform Tower
Terrateam is an enterprise Atlantis alternative that lets you plan and apply all within pull requests and very minimal setup. We have a pretty active slack if you have any questions.
-
Show HN: Digger – an Open Source Terraform automation and collaboration tool
> It sure looks like AWS admin credentials are shared with Github, and also available to anything else in the diggerhq/digger action
I am a co-founder of Terrateam[0] which is a Terraform CI/CD as well. At the end of the day, you need to execute something to do these operations and having this component open source is important for auditing purposes. For Terrateam, we lean heavily into GitHub Actions so GitHub is at least managing any secrets and runs. One challenge is users could pin the Action that we publish to a specific version, but we also update it regularly and communicating to customers to update it is a challenge.
[0] https://terrateam.io
-
Multi-cloud/ Multi-region Terraform deployment in Github
There are lots of options for this. I am co-founder of a product called Terrateam which makes it easy to slice up a mono repo for these usecases. We specialize in GitHub installations. But Spacelift, env0, and Scalr exist as options as well.
-
Do you run terraform apply before or after a merging?
Many of the CI/CD tools take care of this. Terrateam tracks which plans are still valid after an apply and will force a re-plan. It also ensures that only one apply happens at a time.
-
Terrateam: Atlantis-style Terraform pull request automation
We just released our self-hosted version available here: https://github.com/terrateamio/terrateam
-
How do you handle race condition while sharing state remotely with your team, eg - concurrent apply, or plan during apply?
I use Terrateam (disclaimer, I'm also a co-founder of it) does PR-level locks (but only on apply, or merge), and does apply serialization, and invalidates outdated plans on apply. You can plan as much as you want in parallel, though, because that does not impact the output. I don't think there are many other options for how to handle this.
- Terrateam Self-Hosted
What are some alternatives?
terragrunt-infrastructure-modules-example - A repo used to show examples file/folder structures you can use with Terragrunt and Terraform
digger - Digger is an open source IaC orchestration tool. Digger allows you to run IaC in your existing CI pipeline ⚡️
terragrunt-atlantis-config - Generate Atlantis config for Terragrunt projects.
multi-cloud-terragrunt-filesystem
atlantis - Terraform Pull Request Automation
branch-deploy - Enabling Branch Deployments through IssueOps with GitHub Actions - If you find this project useful, give it a star! ⭐️
terraform-yaml-stack-config - Terraform module that loads an opinionated 'stack' configuration from local or remote YAML sources. It supports deep-merged variables, settings, ENV variables, backend config, and remote state outputs for Terraform and helmfile components.
otf - An open source alternative to terraform enterprise.
terraform-aws-eks - Terraform module to create AWS Elastic Kubernetes (EKS) resources 🇺🇦
terrakube - Open source IaC Automation and Collaboration Software.
modules.tf-demo - Real modules.tf demo (updated May 2021)
dagger - Application Delivery as Code that Runs Anywhere