Displaying 1 to 20 from 85 results

AutoSpotting - Saves up to 90% of AWS EC2 costs by automating the use of spot instances on existing AutoScaling groups

  •    Go

AutoSpotting is the leading open source spot market automation tool, optimized towards quick/easy/frictionless adoption of the EC2 spot market at any scale. It is usually set up to monitor existing long-running AutoScaling groups with minimal configuration changes(often just tagging them, but even that can be avoided by using their existing tags), yielding the usual 70%-90% Spot cost savings but in a better integrated, more cost effective and easier to adopt way than the alternative tools and solutions.

autospotting - Automatically replace AWS EC2 instances in AutoScaling groups with identically configured but up to 90% cheaper spot instances

  •    Go

A simple and easy to use tool designed to significantly lower your Amazon AWS costs by automating the use of spot instances. When installed and enabled on an existing on-demand AutoScaling group, AutoSpotting clones one of your on-demand instances from the group with a spot instance that is cheaper, at least as large (automatically considering memory, CPU cores and disk volumes) and configured identically to it. Once the new spot instance is ready, it is attached to the group and an on-demand instance is detached and terminated to keep the group at constant capacity.

terraform-aws-vpc - Terraform module which creates VPC resources on AWS

  •    HCL

Terraform module which creates VPC resources on AWS. By default this module will provision new Elastic IPs for the VPC's NAT Gateways. This means that when creating a new VPC, new IPs are allocated, and when that VPC is destroyed those IPs are released. Sometimes it is handy to keep the same IPs even after the VPC is destroyed and re-created. To that end, it is possible to assign existing IPs to the NAT Gateways. This prevents the destruction of the VPC from releasing those IPs, while making it possible that a re-created VPC uses the same IPs.

aws-eks-base - This boilerplate contains the know-how of the Mad Devs team for the rapid deployment of a Kubernetes cluster, supporting services, and the underlying infrastructure in the Amazon cloud

  •    HCL

This repository contains the know-how of the Mad Devs team for the rapid deployment of a Kubernetes cluster, supporting services, and the underlying infrastructure in the Amazon cloud. The main development and delivery tool is terraform. In our company’s work, we have tried many infrastructure solutions and services and traveled the path from on-premise hardware to serverless. As of today, Kubernetes has become our standard platform for deploying applications, and AWS has become the main cloud.




Red-Baron - Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.

  •    HCL

Red Baron is a set of modules and custom/third-party providers for Terraform which tries to automate creating resilient, disposable, secure and agile infrastructure for Red Teams. Both of these resources were referenced heavily while building this.

terraform-aws-alb - A Terraform module to create an AWS Application Load Balancer (ALB) and associated resources

  •    HCL

A Terraform module containing common configurations for an AWS Application Load Balancer (ALB) running over HTTP/HTTPS. Available through the Terraform registry. It's recommended you use this module with terraform-aws-vpc, terraform-aws-security-group, and terraform-aws-autoscaling.

terraform-aws-autoscaling - Terraform module which creates Auto Scaling resources on AWS

  •    HCL

Terraform module which creates Auto Scaling resources on AWS. There are two ways to specify tags for auto-scaling group in this module - tags and tags_as_map. See examples/asg_ec2/main.tf for example.


terraform-aws-ec2-instance - Terraform module which creates EC2 instance(s) on AWS

  •    HCL

Terraform module which creates EC2 instance(s) on AWS. This example creates an encrypted image from the latest ubuntu 16.04 base image.

terraform-aws-eks - A Terraform module to create an Elastic Kubernetes (EKS) cluster and associated worker instances on AWS

  •    HCL

A terraform module to create a managed Kubernetes cluster on AWS EKS. Available through the Terraform registry. Inspired by and adapted from this doc and its source code. Read the AWS docs on EKS to get connected to the k8s dashboard. Generally the maintainers will try to release the module once every 2 weeks to keep up with PR additions. If particularly pressing changes are added or maintainers come up with the spare time (hah!), release may happen more often on occasion.

terraform-aws-elb - Terraform module which creates ELB resources on AWS

  •    HCL

Terraform module which creates ELB resources on AWS. Module managed by Anton Babenko.

terraform-aws-rds - Terraform module which creates RDS resources on AWS

  •    HCL

Terraform module which creates RDS resources on AWS. Currently maintained by these awesome contributors. Migrated from terraform-community-modules/tf_aws_rds, where it was maintained by these awesome contributors. Module managed by Anton Babenko.

terraform-aws-security-group - Terraform module which creates EC2-VPC security groups on AWS

  •    HCL

Terraform module which creates EC2 security group within VPC on AWS. Ingress and egress rules can be configured in a variety of ways. See inputs section for all supported arguments and complete example for the complete use-case.

terraform-aws-vpn-gateway - Terraform module which creates VPN gateway resources on AWS

  •    HCL

Terraform module which creates VPN gateway resources on AWS. This module does not create a VPN Gateway resource because it is meant to be used in combination with the VPC module that will create that resource (when enable_vpn_gateway = true). This module also does not create a Customer Gateway resource. This module will create static routes for the VPN Connection if configured to create a VPN Connection resource with static routes and destinations for the routes have been provided. The static routes will then be automatically propagated to the VPC subnet routing tables (provided in private_route_table_ids) once a VPN tunnel status is UP. When static routes are disabled, the appliance behind the Customer Gateway needs to support BGP routing protocol in order for routes to be automatically discovered, and subsequently propagated to the VPC subnet routing tables. This module supports optional parameters for tunnel inside cidr and preshared keys. They can be supplied individually, too.

terraform-digitalocean-docker-swarm-mode - Terraform module for provisioning a Docker Swarm mode cluster on DigitalOcean

  •    HCL

Terraform module to provision a Docker Swarm mode cluster in a single availability zone on DigitalOcean, using a private network. Terraform uses an SSH key to connect to the created droplets in order to issue docker swarm join commands. By default this uses ~/.ssh/id_rsa. If you wish to use a different key, you can modify this using the variable provision_ssh_key. You also need to ensure the public key is added to your DigitalOcean account and it's listed in both the manager_ssh_keys and worker_ssh_keys lists.

terraform-aws-alb - Terraform module to provision a standard ALB for HTTP/HTTP traffic

  •    HCL

Terraform module to create an ALB, default ALB listener(s), and a default ALB target and related security groups. This project is part of our comprehensive "SweetOps" approach towards DevOps.

terraform-aws-alb-target-group-cloudwatch-sns-alarms - Terraform module to create CloudWatch Alarms on ALB Target level metrics

  •    HCL

Terraform module for creating alarms for tracking important changes and occurrences from ALBs. This project is part of our comprehensive "SweetOps" approach towards DevOps.

terraform-aws-ecs-codepipeline - Terraform Module for CI/CD with AWS Code Pipeline and Code Build for ECS https://cloudposse

  •    HCL

Terraform Module for CI/CD with AWS Code Pipeline using GitHub webhook triggers and Code Build for ECS. This project is part of our comprehensive "SweetOps" approach towards DevOps.

terraform-aws-eks-workers - Terraform module to provision an AWS AutoScaling Group, IAM Role, and Security Group for EKS Workers

  •    HCL

Terraform module to provision AWS resources to run EC2 worker nodes for Elastic Container Service for Kubernetes. Instantiate it multiple times to create many EKS worker node pools with specific settings such as GPUs, EC2 instance types, or autoscale parameters.

terraform-aws-elasticsearch - Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash

  •    HCL

Terraform module to provision an Elasticsearch cluster with built-in integrations with Kibana and Logstash. This project is part of our comprehensive "SweetOps" approach towards DevOps.






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.