An AWS Lambda-based mechanism to allow temporary IP whitelisting via security groups
-
Updated
Feb 13, 2018 - Python
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
An AWS Lambda-based mechanism to allow temporary IP whitelisting via security groups
A Terraform Kubernetes
Terraform module that creates an AWS application load balancer and supporting infrastructure
Experimental script to find the order of terraform apply in a bunch of modules
Deprecated: See https://github.com/equinix/terraform-metal-vsphere
Automatically restrict security groups with designated tags to CloudFlare's known public IPs
Fastly Frontend Terraform module - to put CDN in front of your application
Simple SSL check and expiring certificates reminder with additional DNS check and host availability check.
Terraform module to deploy an NLB in front of your ALB and automatically update the targetgroups.
Automatically create a README file for your Terraform Module.
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 3 days ago