#refarch (2023-09)
Cloud Posse Reference Architecture
2023-09-14
Hey everyone - apologies if this is the wrong channel for this - happy to move if this is the case. I’m at a new org and I’m on the verge of migrating everything away from the current deployed setup (all AWS console) into IaC. I’ve got good experience with Terraform (mainly vanilla and some Terragrunt) but I want to get my head around a proper structure and some strong conventions. I’ve looked into the CloudPosse offerings, but think it’s likely too much for my organisation to go for. The things I’m looking for are: • Ability to instrument and deploy multiple AWS accounts and integrate them with SSO • The ability to eventually manage the entire deployment of IaC from a pipeline - exclusively • Implement my own modules (non-CloudPosse provided) ones with relative ease. Has anyone gone fully “in” on the Atmos toolchain and associated structure? Would you be happy to briefly explain your setup? And if you are using Atmos / SweetOps how are you finding it - assuming you are just using the open-source parts of the setup.
For some context - I am the sole engineer to manage infrastructure (amongst other responsibilities) - so I’d like to make the right choice at the start, as I don’t want to spend a long time implementing things that already have had time and energy put into them. The alternatives for me are things like Terragrunt - so if you choose Atmos over TG - would be keen to hear your thoughts!
@James Worville I actually am in your same boat just farther along the path. We had the same thing, but a mix of console, terraform, serverless.io, and CloudFormation code to manage a decent amount of infra.
We reworked all of it on the CP approach with vendored components, custom, and vendored w/ changes (using the override pattern) all deployed through Spacelift coupled with GitHub Actions.
I’ve heard from others internally and they’re pleased with the cleanliness and direct process for managing our infra; especially compared to the current (almost former) approach.
0 regrets.
Hey everyone - apologies if this is the wrong channel for this - happy to move if this is the case. I’m at a new org and I’m on the verge of migrating everything away from the current deployed setup (all AWS console) into IaC. I’ve got good experience with Terraform (mainly vanilla and some Terragrunt) but I want to get my head around a proper structure and some strong conventions. I’ve looked into the CloudPosse offerings, but think it’s likely too much for my organisation to go for. The things I’m looking for are: • Ability to instrument and deploy multiple AWS accounts and integrate them with SSO • The ability to eventually manage the entire deployment of IaC from a pipeline - exclusively • Implement my own modules (non-CloudPosse provided) ones with relative ease. Has anyone gone fully “in” on the Atmos toolchain and associated structure? Would you be happy to briefly explain your setup? And if you are using Atmos / SweetOps how are you finding it - assuming you are just using the open-source parts of the setup.
For some context - I am the sole engineer to manage infrastructure (amongst other responsibilities) - so I’d like to make the right choice at the start, as I don’t want to spend a long time implementing things that already have had time and energy put into them. The alternatives for me are things like Terragrunt - so if you choose Atmos over TG - would be keen to hear your thoughts!
We also utilized CP professional services to help jump start our process too. That was invaluable to ensure things were done right; which it wasn’t all done right initially so they helped fix it.
2023-09-19
Any plans for aws-inspector v2 integration?
@Matt Gowie @Veronika Gnilitska contributed this in https://github.com/cloudposse/terraform-aws-components/pull/781
what
• Adds module to support basic configuration for AWS Inspector V2. • Similar to terraform-aws-components/modules/guardduty, this supports complex deployment within two steps: setup Delegated Administration account + configure organization-wide findings collecting.
why
• This hasn’t been introduced yet.
references
• N/A.
We’re holding off on merging until we tackle how to handle community contributions
The plan is to create a separate subpath of terraform-aws-components
for community/
contributions.
ah, dope. i should’ve just searched for the resource
(btw, sorry @Veronika Gnilitska for not merging that yet)
great resource to help me square away things. it follows what i thought was needed (similar approach to compliance components)
@Erik Osterman (Cloud Posse) hey, np! Should I add this subpath as a part of my PR?
There are still some things we need to shore up. We will reach out when we are ready. We are meeting in a couple of weeks and will address then
some naming tweaks were needed to follow CP convention + the README examples, but it runs perfectly fine
Thanks! Looking forward to this.