Shell Terraform

Open-source Shell projects categorized as Terraform

Top 23 Shell Terraform Projects

  • 90DaysOfDevOps

    This repository started out as a learning in public project for myself and has now become a structured learning map for many in the community. We have 3 years under our belt covering all things DevOps, including Principles, Processes, Tooling and Use Cases surrounding this vast topic.

  • Project mention: What is DevOps? | dev.to | 2024-01-07

    90DaysOfDevOps 2022

  • tfenv

    Terraform version manager

  • Project mention: How to destroy an infra deployed with Terraform by .tfstate | dev.to | 2024-02-26

    You'll need the correct version of Terraform (the version of Terraform used for apply can be found in terraform_version at the beginning of the .tfstate file), to switch between versions I recommend tfenv.

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • pre-commit-terraform

    pre-commit git hooks to take care of Terraform configurations πŸ‡ΊπŸ‡¦

  • home-ops

    Wife approved HomeOps driven by Kubernetes and GitOps using Flux

  • Project mention: Rebuilding my homelab: Suffering as a service | news.ycombinator.com | 2024-05-18

    This is incredibly popular a take, and this anti-k8s is rapidly upvoted almost every time.

    The systemd hate has cooled a bit, but it too functions as a sizable attractor for disdain & accusation hurling. Let's look at one of my favorite excerpts from the article, on systemd:

    > Fleet was glorious. It was what made me decide to actually learn how to use systemd in earnest. Before I had just been a "bloat bad so systemd bad" pleb, but once I really dug into the inner workings I ended up really liking it. Everything being composable units that let you build up to what you want instead of having to be an expert in all the ways shell script messes with you is just such a better place to operate from. Not to mention being able to restart multiple units with the same command, define ulimits, and easily create "oneshot" jobs. If you're a "systemd hater", please actually give it a chance before you decry it as "complicated bad lol". Shit's complicated because life is complicated.

    Shits complicated because life is complicated. In both cases, having encompassing ways to compose connectivity has created a stable base - starting point to expert/advanced capable - that allowed huge communities to bloom. Rather than every person being out there by ourselves, the same tools work well for all users, the same tools are practiced with the same conventions.

    Overarching is key to commanlity being possible. You could walk up to my computer and run 'systemd cat' on any service on it, and quickly see how stuff was setup (especially on my computers which make heavy use of environment variables where possible); before every distro and to a sizable degree every single program was launched & configured differently, requires plucking through init scripts to see how or if the init script was modified. But everything has a well defined shape and form in systemd, a huge variety of capabilities for controlling launch characteristics, process isolation, ulimits, user/group privileges, special tmp directories is all provided out of the box in a way that means there's one man page to go to, and that's instantly visible, so we don't have to go spelunking.

    The Cloud Native paradigm that Kubernetes practices is a similar work of revelation, offering similar batteries included capabilities. Is it confusing having pods, replicasets, and services? Yes perhaps at first. But it's unparalleled that one just POSTs resources one wants to an API-server and let's the system start & keep that running; this autonomic behavior is incredibly freeing, leaving control loops doing what humans have had to shepherd & maintain themselves for decades; a paradigm break turning human intent directly into consistent running managed systems.

    The many abstractions/resource types are warranted, they are separate composable pieces that allow so much. Need to serve on a second port? Easy. Why are there so many different types? Because computers are complex, because this is a model of what really is. Maybe we can reshuffle to get different views, but most of that complexity will need to stay around, but perhaps in refactores shapes.

    And like systemd, Kubernetes with it's Desired State Management and operators, it creates a highly visible highly explorable system; any practitioner can walk up to any cluster and start gleening tons of information from it, can easily see it run.

    It's a wrong hearted view to think that simpler is better. We should start with essential complexity & figure out simultaneously a) how to leverage and b) how to cut direct paths through our complex capable systems. We gain more by permitting and enabling than by pruning. We gain my by being capable of working at both big and small scales than we gain by winnowing down/down scoping our use cases. The proof is in the pudding. Today there's hundreds of guides one can go through in an hour to setup & get started running some services on k3s. Today there's a colossal communities of homelab operators sharing helm charts & resources (ex: https://github.com/onedr0p/home-ops), the likes of which has vastly outclassed where we have stood before. Being afraid of & shying away from complexity is a natural response, but i want people to show that they see so many of the underlying simplicities & conceptions that we have gotten from kube that do make things vastly simpler than the wild West untamed world we came from, where there weren't unified patterns of API servers & operators, handling different resources but all alike & consistent. To conquer complexity you must understand it, and I think very few of those with a true view of Kubernetes complexity have the sense that there are massive opportunities for better, for simpler. To me, the mission, the goal, the plan should be to better manage & better package Kubernetes to better onboard & help humans through it, to try to walk people into what these abstractions are for & shine lights on how they all mirror real things computers need to be doing.

    (Technical note, Kubernetes typically runs 0 vm's, it runs containers. With notable exceptions being snap-in OCI runtimes like Firecracker and Kata which indeed host pods as vms. Kine relies on containers are far more optimizable; works like Puzzlefs and Composefs CSIs can snap-in to allow vastly more memory-and-storage-efficient filesystems to boot. So many wonderful pluggable/snappable layers; CNI for networking too.)

  • geodesic

    πŸš€ Geodesic is a DevOps Linux Toolbox in Docker

  • data.gov

    Main repository for the data.gov service

  • Project mention: Where does everyone get shapefiles/basemaps? | /r/QGIS | 2023-12-11

    data.gov may have additional material regarding Federal parcels / properties.

  • terraform-docs-as-pdf

    Complete Terraform documentation (core + all official providers) as PDF files. Updating nightly.

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
  • tofuenv

    OpenTofu version manager

  • Project mention: tenv VS tofuenv - a user suggested alternative | libhunt.com/r/tenv | 2024-01-24
  • terraform-multienv

    A template for maintaining a multiple environments infrastructure with Terraform. This template includes a CI/CD process, that applies the infrastructure in an AWS account.

  • aws-terraform-dev-container

    A VSCode Dev Container with tools to help you build and manage AWS infrastructure with Terraform

  • Project mention: AWS Terraform Dev Container | news.ycombinator.com | 2023-09-29
  • terraform-security-scan

    Run a security scan on your terraform with the very nice https://github.com/aquasecurity/tfsec

  • terraform-repl

    A terraform console wrapper for a better REPL experience

  • kapitan-reference

    Reference structure for Kapitan - alpha version

  • cloud-native-platform

    Repo for "How to build your own cloud-native platform on IaaS clouds in 2021"

  • infra

    Random tools used by Moov (by moov-io)

  • kubeflow-bootstrap

    πŸͺ 1-click Kubeflow using ArgoCD

  • Project mention: Show HN: Kubeflow's Missing Helm Chart | news.ycombinator.com | 2024-03-19

    Kubeflow is an ML platform like Sagemaker or Databricks that you can self-host in a Kubernetes cluster.

    Installing/deploying it is as complicated as it sounds, but we've put together an infrastructure project that lets you '1-click' install it even in tiny environments.

    The GH repo (also linked in blog) allows you to start Kubeflow in a codespace or small device using a docker container -- this is both good for trying it out and developing it into your own internal ML platform.

    https://github.com/treebeardtech/kubeflow-helm

  • miniDevOps

    A DevOps Toolkit

  • terraform-aws-module-template

    Terraform module which creates <TODO> resources on AWS

  • terraform-terraform-template

    Terraform module template. Good for any cloud and any provider

  • docker-management-container

    The Docker Management Container includes a set of plugins and services that make it easier to build, test, deploy and manage infrastructure.

  • tfcoding

    Render Terraform's Expressions and Functions locally without any hassle.

  • terraform-target

    Shell-based wrapper for Terraform to simplify resource targeting

  • provbee

    Provisioning All the platforms for Cloud-native(includes terraform, virsh, kubectl, helm with all configurations)

  • SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The open source projects on this list are ordered by number of github stars. The number of mentions indicates repo mentiontions in the last 12 Months or since we started tracking (Dec 2020).

Shell Terraform related posts

  • How to destroy an infra deployed with Terraform by .tfstate

    1 project | dev.to | 26 Feb 2024
  • tfenvy

    1 project | dev.to | 29 Jan 2024
  • tfenv VS tenv - a user suggested alternative

    2 projects | 24 Jan 2024
  • What is DevOps?

    1 project | dev.to | 7 Jan 2024
  • Where does everyone get shapefiles/basemaps?

    1 project | /r/QGIS | 11 Dec 2023
  • How do i keep my "devops tool" always up to date in a smart way ?

    2 projects | /r/devops | 6 Dec 2023
  • Legislative records House of Representatives?

    1 project | /r/datavisualization | 22 Oct 2023
  • A note from our sponsor - InfluxDB
    www.influxdata.com | 21 May 2024
    Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more β†’

Index

What are some of the best open-source Terraform projects in Shell? This list will help you:

Project Stars
1 90DaysOfDevOps 25,919
2 tfenv 4,343
3 pre-commit-terraform 3,023
4 home-ops 1,764
5 geodesic 920
6 data.gov 524
7 terraform-docs-as-pdf 198
8 tofuenv 142
9 terraform-multienv 140
10 aws-terraform-dev-container 120
11 terraform-security-scan 110
12 terraform-repl 99
13 kapitan-reference 41
14 cloud-native-platform 28
15 infra 23
16 kubeflow-bootstrap 20
17 miniDevOps 18
18 terraform-aws-module-template 16
19 terraform-terraform-template 13
20 docker-management-container 13
21 tfcoding 10
22 terraform-target 8
23 provbee 6

Sponsored
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com