Когда нужно быстро сориентироваться в вариантах решений/технологий/утилит:
https://landscape.cncf.io
Например, вот решения по части #CloudFormation - раздел Automation & Configuration, где живут #Terraform, #Pulumi, #Chef и далее по списку.
#info
https://landscape.cncf.io
Например, вот решения по части #CloudFormation - раздел Automation & Configuration, где живут #Terraform, #Pulumi, #Chef и далее по списку.
#info
CNCF Landscape
The CNCF Cloud Native Landscape is intended as a map through the previously uncharted terrain of Cloud Native technologies. It attempts to categorize projects and products in the Cloud Native space.
Pulumi AWS Native Provider:
https://www.pulumi.com/blog/announcing-aws-native/
#Pulumi
https://www.pulumi.com/blog/announcing-aws-native/
The AWS Native provider offers same-day support for all new AWS features and releases covered by the newly released AWS Cloud Control API, which typically supports new AWS features on the day of launch. By building on the AWS Cloud Control API, the AWS Native provider offers a robust, reliable and well-defined resource model for AWS that’s available to Pulumi users in all Pulumi languages, including TypeScript, Python, Go and C#. By leveraging the AWS Cloud Control API, the AWS Native provider builds on the work done by service teams at AWS to define the resource model for their services. This ensures a rock solid provisioning lifecycle for resources deployed with the AWS Native provider.#Pulumi
pulumi
Announcing the Pulumi AWS Native Provider, Powered by the AWS Cloud Control API
New Pulumi AWS Native Provider offers same-day support for all new AWS features, building on the AWS Cloud Control API
AWS Organizations Tag Policies 🎉
https://aws.amazon.com/blogs/mt/enforce-consistent-tagging-across-iac-deployments-with-aws-organizations-tag-policies/
Теперь, наконец-то, можно реально заставить прописывать нужные теги — иначе
https://github.com/hashicorp/terraform-provider-aws/blob/main/website/docs/guides/tag-policy-compliance.html.markdown
#CloudFormation #Terraform #Pulumi
https://aws.amazon.com/blogs/mt/enforce-consistent-tagging-across-iac-deployments-with-aws-organizations-tag-policies/
Теперь, наконец-то, можно реально заставить прописывать нужные теги — иначе
terraform plan не пройдёт.https://github.com/hashicorp/terraform-provider-aws/blob/main/website/docs/guides/tag-policy-compliance.html.markdown
provider "aws" {
tag_policy_compliance = "error"
}When set to error, tag policy violations will trigger an error diagnostic.
When set to warning, tag policy violations will trigger a warning diagnostic. Planned changes will be able to proceed, but the diagnostic will not be silenced until the tag policy violation is resolved.
When set to disabled, the tag policy will not be enforced. This is equivalent to leaving the value unset.
#CloudFormation #Terraform #Pulumi
Amazon
Enforce consistent tagging across IaC deployments with AWS Organizations Tag Policies | Amazon Web Services
Organizations manage thousands of AWS resources across multiple accounts and Regions to support their business operations. They want consistent tagging to support essential workflows such as attribute-based-access-controls (ABAC), cost allocation, organizing…
🔥16