infrastructure-as-code
Here are 1,238 public repositories matching this topic...
Describe the solution you'd like
It would be nice to have a way to control whether a VM starts on boot or not. Maybe a new autostart option to salt.states.virt.running and/or salt.states.virt.defined? Or maybe a new function?
Describe alternatives you've considered
I'll probably use salt.modules.virt.set_autostart for now.
Pulumi - Modern Infrastructure as Code. Any cloud, any language
-
Updated
Oct 8, 2021 - Go
Currently trivy can find package-lock.json and process it, looking for vulnerabilities. It would be nice if it could process pnpm-lock.yaml files too
This is to bring feature parity between LinuxBuildImage (https://docs.aws.amazon.com/cdk/api/latest/docs/@aws-cdk_aws-codebuild.LinuxBuildImage.html#static-fromwbrecrwbrrepositoryrepository-tag) and LinuxGpuBuildImage (https://docs.aws.amazon.com/cdk/api/latest/docs/@aws-cdk_aws-codebuild.LinuxGpuBuildImage.html).
Specifically, add the fromEcrRepository method in this class.
Use Ca
Main repository for GoCD - Continuous Delivery server
-
Updated
Oct 8, 2021 - Java
CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code
-
Updated
Oct 6, 2021 - Go
Quick and Easy server testing/validation
-
Updated
Sep 25, 2021 - Go
Version Infracost v0.9.9. We should be able to lookup the filters used in the google_container_registry resource to see what's changed, the golden test files aren't picking this up so it might be related to the region being used.
Terraform resource:
resource "google_container_registry" "registry" {
project = var.project_id
}
Actual output, notice the first line is showing
Security scanner for your Terraform code
-
Updated
Oct 6, 2021 - Go
Describe the bug
Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
FAILED for resource: aws_network_acl.elasticache
File: /tfplan.json:2623-2683
Guide: https://docs.bridgecrew.io/docs/ensure-that-all-nacl-are-attached-to-subnets
2624 | "values": {
2625 | "arn": "arn:aws:ec2:us-east-1:907320361432:network-acl/acl-0ed5xxxx42a675e",
2626 |
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
Curated list of resources on HashiCorp's Terraform
-
Updated
Oct 5, 2021
Tools for managing DNS across multiple providers
-
Updated
Oct 1, 2021 - Python
Synchronize your DNS to multiple providers from a simple DSL
-
Updated
Oct 9, 2021 - Go
Testinfra test your infrastructures
-
Updated
Sep 29, 2021 - Python
Infrastructure As Code Tutorial. Covers Packer, Terraform, Ansible, Vagrant, Docker, Docker Compose, Kubernetes
-
Updated
May 16, 2021
The simplest, most powerful way to build serverless applications
-
Updated
Sep 30, 2021 - JavaScript
Copilot doesn't seem to have correct error behavior when I try to create a Scheduled Job with the same name as an existing service.
For example, in my app right now I have the following:
❯ copilot svc ls
Name Type
---- ----
fe Load Balanced Web Service
I can see this in SSM:
❯ aws ssm get-parameter --name /copilot/applicatio
Description
For the non-deep mode, which is the default driftctl scan command, we display every time all the information about "unmanaged", "deleted", "drifted", "managed" resources, and the coverage.
It's quite unhelpful here to display the "drifted" resources since it would be ALL THE TIME equal to 0.
Example
Found 14 resource(s)
- 21% coverage
- 3 resource(s) managed
-
Updated
Oct 8, 2021 - Go
StarHackIt: React/Native/Node fullstack starter kit with authentication and authorisation, data backed by SQL, the infrastructure deployed with GruCloud
-
Updated
Sep 21, 2021 - JavaScript
Terraform Best Practices for AWS users
-
Updated
Aug 29, 2021 - HCL
[EOL] A command-line tool to declaratively manage Kubernetes clusters on AWS
-
Updated
Sep 30, 2020 - Go
AWS Lambda using Terraform., an Introductory Cookbook
-
Updated
May 8, 2021 - Markdown
Configuration management tool inspired by Chef, but simpler and lightweight. Formerly known as Lightchef.
-
Updated
Mar 14, 2021 - Ruby
Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.
That means we should use a Kubernetes label, not an annotation.
I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).
Terraform module for creating Kubernetes cluster running on Container Linux by CoreOS in an AWS VPC
-
Updated
Feb 27, 2018 - HCL
Reads from existing Cloud Providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
-
Updated
Oct 5, 2021 - Go
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.
-
Updated
Apr 6, 2021 - HCL
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."

