Welcome to the November 2018 edition of the SweetOps newsletter.
We've got a lot to share with you this month as we've been exceptionally busy! Overall, our emphasis this month has been on growing the community around our open source adoption and investing heavily in Atlantis for terraform GitOps-style automation.
terraform-aws-iam-account-settings
You can find all of the cloudposse terraform modules in the official terraform module registry.
terraform-aws-cloudfront-s3-cdn
terraform-aws-elastic-beanstalk-environment
Many thanks to @johncblandii, @br0nhy, @bober2000, @pabardina, @rverma-nikiai, @aknysh, @jamisonhyatt and the many others who took the time to open issues, submit pull requests and review code.
We recently held a meetup during #connectweek in Pasadena (CA) where we gave a live demo using Atlantis with Terraform to provision AWS user accounts using only Pull Requests. Atlantis is the secret for enabling teams to collaborate on Terraform. We have our own fork of atlantis that we're maintaining until the essential security features we introduced get upstreamed.
Slides from the presentation are available on our blog.
Here are some interesting links that circulated this month in our slack team.
Very cool Open Source SIEM security and compliance dashboard for surfacing events.
Interesting workaround to achieve Tillerless Helm today by running tiller on localhost.
HashiCorp, the company behind Terraform, has raised an additional $100M
Two Objects not Namespaced by the Linux Kernel and therefore shared by linux containers.
Malicious Life Podcast - The True stories behind the world of cybercrime
For more links, subscribe to our @cloudposse twitter feed.
As part of Geodesic, our framework for provisioning and automating infrastructure, we needed a better way to distribute our toolchain (aws-vault, chamber, kops, gomplate, etc) that was fast and reliable that made it easy to version pin tools for individual customers. Previously, we shipped all tools with the geodesic docker base image pinned to a specific release, but this was bad because it forced a customer to upgrade their entire toolchain when they just wanted one upgraded package.
The fix was to distribute all of our tools as versioned alpine packages. Our alpine repository is available at apk.cloudposse.com. More instructions for configuring this repository can be found in the github repository where we define all packages.
https://github.com/cloudposse/packages
What does this mean if you use the make based package installer? Not much. We'll continue to support Makefile based package installations because we need a way to install these packages natively on OSX/Linux/Windows/etc that is not alpine specific. In the future, we might distribute the packages for Debian and RPM-based distros as well.
Terragrunt is a popular tool for automating terraform deployments. It makes it easy to reuse modules, initialize terraform state, and orchestrate complex multi-stage terraform build-outs.
For a demo we recently did on using Atlantis with Terraform, we put together an example of using Terragrunt on Geodesic. Long and short of it is that it's easy, and there's not much to it. For an example, refer to our reference architectures. Here's an example of adding a user using terraform and terragrunt in combination with our terraform-root-modules.
Over the past month, we've seen a sharp uptick in the number of daily conversations especially in the #terraform, #release-engineering, and #kubernetes channels. We're grateful for everyone helping out to answer questions and sharing interesting articles. If you haven't already, sign up for the SweetOps slack team today.
We've set up a place for our community members to leave us testimonials. If our modules or slack community have helped you, we would love to know. A few words from you would totally make our day and help us reach others.
Please leave us a testimonial, if you've found some of our open source repos helpful.
All the best,
Erik Osterman
CEO / Founder, Cloud Posse, LLC