terraform-vault - Terraform modules to setup Vault on AWS

  •        19

This terraform module sets up a HA vault with a DynamoDB backend. The module sets up TLS using Letsencrypt with dns-01 challenge. Both vault servers are optionally configured with Teleport for SSH management.

https://github.com/skyscrapers/terraform-vault

Tags
Implementation
License
Platform

   




Related Projects

vault-on-gke - Run @HashiCorp Vault on Google Kubernetes Engine (GKE) with Terraform

  •    HCL

This tutorial walks through provisioning a highly-available HashiCorp Vault cluster on Google Kubernetes Engine using HashiCorp Terraform as the provisioning tool. This tutorial is based on Kelsey Hightower's Vault on Google Kubernetes Engine, but focuses on codifying the steps in Terraform instead of teaching you them individually. If you would like to know how to provision HashiCorp Vault on Kuberenetes step-by-step (aka "the hard way"), please follow Kelsey's repository instead.

awesome-terraform - Curated list of resources on HashiCorp's Terraform

  •    

Terraform enables you to safely and predictably create, change, and improve production infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned. For more Community Modules not listed here please see the Terraform Module Registry.

terraform-ecs - AWS ECS terraform module

  •    HCL

This repository contains the Terraform modules for creating a production ready ECS in AWS. To understand ECS it is good to state the obvious differences against the competitors like Kubernetes or DC/OS Mesos. The mayor differences are that ECS can not be run on-prem and that it lacks advanced features. These two differences can either been seen as weakness or as strengths.

terragrunt - Terragrunt is a thin wrapper for Terraform that provides extra tools for working with multiple Terraform modules

  •    Go

Terragrunt is a thin wrapper for Terraform that provides extra tools for keeping your Terraform configurations DRY, working with multiple Terraform modules, and managing remote state. Install Terraform.

tack - Terraform module for creating Kubernetes cluster running on Container Linux by CoreOS in an AWS VPC

  •    HCL

Opinionated Terraform module for creating a Highly Available Kubernetes cluster running on Container Linux by CoreOS (any channel) in an AWS Virtual Private Cloud VPC. With prerequisites installed make all will simply spin up a default cluster; and, since it is based on Terraform, customization is much easier than CloudFormation.The default configuration includes Kubernetes add-ons: DNS, Dashboard and UI.


terraform-provider-aws - Terraform AWS provider

  •    Go

If you're building the provider, follow the instructions to install it as a plugin. After placing it into your plugins directory, run terraform init to initialize it. Documentation about the provider specific configuration options can be found on the provider's website. If you wish to work on the provider, you'll first need Go installed on your machine (version 1.11+ is required). You'll also need to correctly setup a GOPATH, as well as adding $GOPATH/bin to your $PATH.

terraform-aws-vpc - Terraform module which creates VPC resources on AWS

  •    HCL

Terraform module which creates VPC resources on AWS. By default this module will provision new Elastic IPs for the VPC's NAT Gateways. This means that when creating a new VPC, new IPs are allocated, and when that VPC is destroyed those IPs are released. Sometimes it is handy to keep the same IPs even after the VPC is destroyed and re-created. To that end, it is possible to assign existing IPs to the NAT Gateways. This prevents the destruction of the VPC from releasing those IPs, while making it possible that a re-created VPC uses the same IPs.

terraformer - CLI tool to generate terraform files from existing infrastructure (reverse Terraform)

  •    Go

CLI tool to generate tf and tfstate files from existing infrastructure (reverse Terraform). Terraformer use terraform providers and built for easy to add new supported resources. For upgrade resources with new fields you need upgrade only terraform providers.

stack - A set of Terraform modules for configuring production infrastructure with AWS

  •    HCL

The Segment Stack is a set of Terraform modules for configuring production infrastructure with AWS, Docker, and ECS. It's a more 'curated' set of defaults for configuring your AWS environment, while still allowing you to fully customize it. To get more background on the Segment Stack you can read this blog post about its history.

tflint - TFLint is a Terraform linter for detecting errors that can not be detected by `terraform plan`

  •    Go

If you run terraform apply for this template, it will obviously produce an error. However, terraform plan can get an execution plan without causing an error. This is often not a desirable result. In order to solve this problem, TFLint validates values used in template. Download binary built for your architecture from latest releases. After downloading, place the binary on the directory on the PATH. The following example is the installation in macOS.

terraform-docs - Generate docs from terraform modules

  •    Go

terraform-docs(1) ⋅ a quick utility to generate docs from terraform modules.

kitchen-terraform - Test Kitchen plugins for testing Terraform configurations

  •    Ruby

Kitchen-Terraform enables verification of Terraform state. Kitchen-Terraform provides a set of Test Kitchen plugins which enable a system to use Test Kitchen to converge a Terraform configuration and verify the resulting Terraform state with InSpec controls.

terraform-up-and-running-code - Code samples for the book "Terraform: Up & Running" by Yevgeniy Brikman

  •    HCL

This repo contains the code samples for the book Terraform: Up and Running by Yevgeniy Brikman. All the code is in the code folder. It is organized by language (terraform, bash, ruby, etc) and within each language, by chapter. Since this code comes from a book about Terraform, the vast majority of the code consists of Terraform examples in the code/terraform folder.

terraform-provider-helm - Terraform Helm provider

  •    Go

This is a Helm provider for Terraform. The provider manages the installed Charts in your Kubernetes cluster, in the same way of Helm does, through Terraform. It will also install Tiller automatically if it is not already present.

terraform-provider-oci - Terraform Oracle Cloud Infrastructure provider

  •    Go

The OCI Terraform Provider is now available for automatic download through the Terraform Provider Registry. For more information on how to get started view the documentation and setup guide. Note: You may use any version 1.8 or above to build the provider. However, the goimports, go vet, and gofmt code checks will only pass when using version 1.11.

vim-terraform - basic vim/terraform integration

  •    Vim

This plugin, along with others like it, is now maintained by the HashiVim organization, which is looking for additional maintainers and contributors. See the HashiVim home page for further information. This plugin adds a :Terraform command that runs terraform, with tab completion of subcommands. It also sets up *.tf, *.tfvars, and *.tfstate files to be highlighted as HCL, HCL, and JSON respectively.

terraboard - :earth_africa: :clipboard: A web dashboard to inspect Terraform States

  •    Go

It currently only supports S3 as a remote state backend, and dynamoDB for retrieving lock informations. The overview presents all the state files in the S3 bucket, by most recent modification date.

terraforming - Export existing AWS resources to Terraform style (tf, tfstate)

  •    Ruby

You need to set AWS credentials. You can also specify credential profile in ~/.aws/credentials by --profile option.

Red-Baron - Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

  •    HCL

Red Baron is a set of modules and custom/third-party providers for Terraform which tries to automate creating resilient, disposable, secure and agile infrastructure for Red Teams. Both of these resources were referenced heavily while building this.