Displaying 1 to 20 from 57 results

gocd - Main repository for GoCD - Continuous Delivery server

  •    Java

This is the main repository for GoCD - a continuous delivery server. GoCD helps you automate and streamline the build-test-release cycle for worry-free, continuous delivery of your product. To quickly build your first pipeline while learning key GoCD concepts, visit our Intro to GoCD guide.

testinfra - Testinfra test your infrastructures

  •    Python

With Testinfra you can write unit tests in Python to test actual state of your servers configured by management tools like Salt, Ansible, Puppet, Chef and so on.

terraformer - CLI tool to generate terraform files from existing infrastructure (reverse Terraform)

  •    Go

CLI tool to generate tf and tfstate files from existing infrastructure (reverse Terraform). Terraformer use terraform providers and built for easy to add new supported resources. For upgrade resources with new fields you need upgrade only terraform providers.

pulumi - Pulumi is an SDK for cloud native infrastructure as code

  •    Go

The Pulumi Cloud Native Development Platform is the easiest way to create and deploy cloud programs that use containers, serverless functions, hosted services, and infrastructure, on any cloud. Simply write code in your favorite language and Pulumi automatically provisions and manages your AWS, Azure, Google Cloud Platform, and/or Kubernetes resources, using an infrastructure-as-code approach. Skip the YAML, and use standard language features like loops, functions, classes, and package management that you already know and love.




goss - Quick and Easy server testing/validation

  •    Go

Note: For some Docker/Kubernetes healthcheck, health endpoint, and container ordering examples, see my blog post here. Goss is a YAML based serverspec alternative tool for validating a server’s configuration. It eases the process of writing tests by allowing the user to generate tests from the current system state. Once the test suite is written they can be executed, waited-on, or served as a health endpoint.

aws-cdk - The AWS Cloud Development Kit is a framework for defining cloud infrastructure in code

  •    TypeScript

The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. It offers a high-level object-oriented abstraction to define AWS resources imperatively using the power of modern programming languages. Using the CDK’s library of infrastructure constructs, you can easily encapsulate AWS best practices in your infrastructure definition and share it without worrying about boilerplate logic.

itamae - Configuration management tool inspired by Chef, but simpler and lightweight

  •    Ruby

Simple and lightweight configuration management tool inspired by Chef. And then excute itamae command to apply a recipe to a local machine.

kube-aws - Kubernetes on AWS

  •    Go

Note: The master branch may be in an unstable or even broken state during development. Please use releases instead of the master branch in order to get stable binaries.kube-aws is a command-line tool to create/update/destroy Kubernetes clusters on AWS.


tack - Terraform module for creating Kubernetes cluster running on Container Linux by CoreOS in an AWS VPC

  •    HCL

Opinionated Terraform module for creating a Highly Available Kubernetes cluster running on Container Linux by CoreOS (any channel) in an AWS Virtual Private Cloud VPC. With prerequisites installed make all will simply spin up a default cluster; and, since it is based on Terraform, customization is much easier than CloudFormation.The default configuration includes Kubernetes add-ons: DNS, Dashboard and UI.

infrastructure-as-code-tutorial - Infrastructure As Code Tutorial

  •    

This tutorial is intended to show what the Infrastructure as Code (IaC) is, why we need it, and how it can help you manage your infrastructure more efficiently. It is practice-based, meaning I don't give much theory on what Infrastructure as Code is in the beginning of the tutorial, but instead let you feel it through the practice first. At the end of the tutorial, I summarize some of the key points about Infrastructure as Code based on what you learn through the labs.

awesome-terraform - Curated list of resources on HashiCorp's Terraform

  •    

Terraform enables you to safely and predictably create, change, and improve production infrastructure. It is an open source tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned. For more Community Modules not listed here please see the Terraform Module Registry.

terraboard - :earth_africa: :clipboard: A web dashboard to inspect Terraform States

  •    Go

It currently only supports S3 as a remote state backend, and dynamoDB for retrieving lock informations. The overview presents all the state files in the S3 bucket, by most recent modification date.

kubecfg - A tool for managing complex enterprise Kubernetes environments as code.

  •    Go

A tool for managing Kubernetes resources as code. kubecfg allows you to express the patterns across your infrastructure and reuse these powerful "templates" across many services, and then manage those templates as files in version control. The more complex your infrastructure is, the more you will gain from using kubecfg.

Red-Baron - Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

  •    HCL

Red Baron is a set of modules and custom/third-party providers for Terraform which tries to automate creating resilient, disposable, secure and agile infrastructure for Red Teams. Both of these resources were referenced heavily while building this.

kubecfg - A tool for managing complex enterprise Kubernetes environments as code.

  •    PureBasic

A tool for managing Kubernetes resources as code. kubecfg allows you to express the patterns across your infrastructure and reuse these powerful "templates" across many services, and then manage those templates as files in version control. The more complex your infrastructure is, the more you will gain from using kubecfg.

gitlab-setup - A Packer / Terraform / Ansible configuration to install Gitlab and Gitlab-CI

  •    HCL

This template is a POC to setup a Gitlab system with High Availability on Amazon Web Service Cloud. This template is heavily inspired by Gitlab university : HA on AWS.

lambda-pipeline - A continuous delivery pipeline for AWS Lambda, managed by AWS CloudFormation

  •    Shell

A continuous delivery pipeline for AWS Lambda, managed by AWS CloudFormation. I built it to automate a part of my process of developing Alexa skills, hence the AWS Lambda part. However it's easy to transform and extend. You can use it to create a CI/CD pipeline for any piece of your AWS infrastructure.

lighter - Marathon deployment automation tool

  •    Python

Lighter solves the problem of automating deployments to Marathon and handling of differences between multiple environments. Given a hierachy of yaml files and environments, Lighter can expand service config files and deploy them to Marathon. For even tighter integration into the development process, Lighter can resolve Marathon config files from Maven and merge these with environment specific overrides. This enables continuous deployment whenever new releases or snapshots appear in the Maven repository. Optional version range constraints allows patches/minor versions to be rolled out continuously, while requiring a config change to roll out major versions.