[INACTIVE] Terraform provider for Arachnys' Cabot. Create, manage, and manipulate status checks, and alerts for services.
-
Updated
Sep 15, 2017 - Go
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
[INACTIVE] Terraform provider for Arachnys' Cabot. Create, manage, and manipulate status checks, and alerts for services.
sample golang/gin, prometheus, terraform and ansible
Create, modify and destroy ZeroTier networks and members through Terraform.
A Terraform Module to Provision Gitlab Resources on Gitlab Instance
Module for naming harmonization for resources (by Terraformation)
Terraform module to get value in Kubernetes secrets store
Terraform module to send CloudWatch logs to a syslog server. Compatible with papertrail, logstash, and datadog.
Terraform Guide
This repository contains a set of AWS resources required for state storing and locking. Using this module, you can create all necessary resources to get started with remote state in AWS S3.
Cloud Functions based translate of prometheus monitoring metrics to Google Cloud Monitoring
Serverless Release Dashboard that integrates API Gateway, Lambda, and Cognito to interact with the Github and Gitlab APIs and create Releases
🚀 Terraform Provider Boilerplate Updated
Terraform module for deploying Resource Groups to Azure, with Terratest Unit/Integration testing via Go, and Regula (OPA) Policy as Code scanning in an Azure DevOps Pipeline
Terraform module for deploying Static Sites to Azure, with features enabled via submodules, Terratest Unit/Integration testing via Go, and Regula (OPA) Policy as Code scanning in an Azure DevOps Pipeline
Terraform module for deploying Storage Sync to Azure, with features enabled via submodules, Terratest Unit/Integration testing via Go, and Regula (OPA) Policy as Code scanning in an Azure DevOps Pipeline
Terraform module for deploying Traffic Manager to Azure, with Terratest Unit/Integration testing via Go, and Regula (OPA) Policy as Code scanning in an Azure DevOps Pipeline
Terraform module for deploying network peering (Local/Global) in Azure, with Terratest Unit/Integration testing via Go, and Regula (OPA) Policy as Code scanning in an Azure DevOps Pipeline
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 3 days ago