Terraform module to create an Elastic Kubernetes (EKS) cluster and associated worker instances on AWS
-
Updated
Jun 19, 2022 - HCL
{{ message }}
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Terraform module to create an Elastic Kubernetes (EKS) cluster and associated worker instances on AWS
Saves up to 90% of AWS EC2 costs by automating the use of spot instances on existing AutoScaling groups. Installs in minutes using CloudFormation or Terraform. Convenient to deploy at scale using StackSets. Uses tagging to avoid launch configuration changes. Automated spot termination handling. Reliable fallback to on-demand instances.
Terraform module to set up your AWS account with the secure baseline configuration based on CIS Amazon Web Services Foundations and AWS Foundational Security Best Practices.
Terraform module for building and deploying Next.js apps to AWS. Supports SSR (Lambda), Static (S3) and API (Lambda) pages.
Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.
Terraform module which creates RDS resources on AWS
This boilerplate contains terraform configurations for the rapid deployment of a Kubernetes cluster, supporting services, and the underlying infrastructure in AWS.
Terraform module which creates EC2 instance(s) on AWS
Terraform module which creates IAM resources on AWS
Terraform module, which takes care of a lot of AWS Lambda/serverless tasks (build dependencies, packages, updates, deployments) in countless combinations
Terraform module which creates EC2-VPC security groups on AWS
A Private Terraform Module/Provider Registry
Terraform module for provisioning an EKS cluster
If using an existing VPC rather than let this module create it, it now generates this error:
│ Error: "" is not a valid CIDR block: invalid CIDR address:
│
│ with module.atlantis.module.efs_sg[0].module.sg.aws_security_group_rule.ingress_rules[0],
│ on .terraform/modules/atlantis.efs_sg/main.tf line 70, in resource "aws_security_group_rule" "ingress_rules":
│ 70
Terraform module which creates SNS topic and Lambda function which sends notifications to Slack
Opinionated, self-contained Terraform root modules that each solve one, specific problem
Terraform module which creates S3 bucket resources on AWS
Terraform module that provision an S3 bucket to store the `terraform.tfstate` file and a DynamoDB table to lock the state file to prevent concurrent modifications and state corruption.
Terraform module to create an AWS Application/Network Load Balancer (ALB/NLB) and associated resources
Terraform module which creates AWS ECS resources
Terraform module to generate well-formed JSON documents (container definitions) that are passed to the aws_ecs_task_definition Terraform resource
Is this functionality available in the AWS provider for Terraform? See CHANGELOG.md, too.
Terraform module to easily provision CloudFront CDN backed by an S3 origin
Terraform scripts to setup an S3 based static website, with a CloudFront distribution and the required Route53 entries.
Terraform module which creates Auto Scaling resources on AWS
Demo files for various Terraform Tuesday Examples
KubeHelper - simplifies many daily Kubernetes cluster tasks through a web interface. Search, analysis, run commands, cron jobs, reports, filters, git synchronization and many more.
Whatever is in security_groups seems to be ignored
Security groups specified in security_groups should be applied
security_groups = [aws_security_group.my_group1.id, aws_security_group.my_group2.id]
Output of terraform plan:
~ vpc_options {
availability_zones = [
Terraform module that implements a web app on ECS and supports autoscaling, CI/CD, monitoring, ALB integration, and much more.
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 7 days ago
Description
The
customer_gatewaysvariable is taking a map object. However, in the map object the sequence of items is not always fixed.On the other side, the output
cgw_idandcgw_arnsare returning a list. The problem here is the sequence of output in the list completely depends on the sequence of items in the input map where sequence varies based on the name of the keys in the