#refarch (2023-09)

Cloud Posse Reference Architecture

2023-09-14

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

Hey everyone - apologies if this is the wrong channel for this - happy to move if this is the case. I’m at a new org and I’m on the verge of migrating everything away from the current deployed setup (all AWS console) into IaC. I’ve got good experience with Terraform (mainly vanilla and some Terragrunt) but I want to get my head around a proper structure and some strong conventions. I’ve looked into the CloudPosse offerings, but think it’s likely too much for my organisation to go for. The things I’m looking for are: • Ability to instrument and deploy multiple AWS accounts and integrate them with SSO • The ability to eventually manage the entire deployment of IaC from a pipeline - exclusively • Implement my own modules (non-CloudPosse provided) ones with relative ease. Has anyone gone fully “in” on the Atmos toolchain and associated structure? Would you be happy to briefly explain your setup? And if you are using Atmos / SweetOps how are you finding it - assuming you are just using the open-source parts of the setup.

For some context - I am the sole engineer to manage infrastructure (amongst other responsibilities) - so I’d like to make the right choice at the start, as I don’t want to spend a long time implementing things that already have had time and energy put into them. The alternatives for me are things like Terragrunt - so if you choose Atmos over TG - would be keen to hear your thoughts!

johncblandii avatar
johncblandii

@James Worville I actually am in your same boat just farther along the path. We had the same thing, but a mix of console, terraform, serverless.io, and CloudFormation code to manage a decent amount of infra.

We reworked all of it on the CP approach with vendored components, custom, and vendored w/ changes (using the override pattern) all deployed through Spacelift coupled with GitHub Actions.

I’ve heard from others internally and they’re pleased with the cleanliness and direct process for managing our infra; especially compared to the current (almost former) approach.

0 regrets.

Hey everyone - apologies if this is the wrong channel for this - happy to move if this is the case. I’m at a new org and I’m on the verge of migrating everything away from the current deployed setup (all AWS console) into IaC. I’ve got good experience with Terraform (mainly vanilla and some Terragrunt) but I want to get my head around a proper structure and some strong conventions. I’ve looked into the CloudPosse offerings, but think it’s likely too much for my organisation to go for. The things I’m looking for are: • Ability to instrument and deploy multiple AWS accounts and integrate them with SSO • The ability to eventually manage the entire deployment of IaC from a pipeline - exclusively • Implement my own modules (non-CloudPosse provided) ones with relative ease. Has anyone gone fully “in” on the Atmos toolchain and associated structure? Would you be happy to briefly explain your setup? And if you are using Atmos / SweetOps how are you finding it - assuming you are just using the open-source parts of the setup.

For some context - I am the sole engineer to manage infrastructure (amongst other responsibilities) - so I’d like to make the right choice at the start, as I don’t want to spend a long time implementing things that already have had time and energy put into them. The alternatives for me are things like Terragrunt - so if you choose Atmos over TG - would be keen to hear your thoughts!

1
johncblandii avatar
johncblandii

We also utilized CP professional services to help jump start our process too. That was invaluable to ensure things were done right; which it wasn’t all done right initially so they helped fix it.

2023-09-19

johncblandii avatar
johncblandii

Any plans for aws-inspector v2 integration?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

@Matt Gowie @Veronika Gnilitska contributed this in https://github.com/cloudposse/terraform-aws-components/pull/781

#781 feat: add module for AWS Inspector V2

what

• Adds module to support basic configuration for AWS Inspector V2. • Similar to terraform-aws-components/modules/guardduty, this supports complex deployment within two steps: setup Delegated Administration account + configure organization-wide findings collecting.

why

• This hasn’t been introduced yet.

references

• N/A.

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

We’re holding off on merging until we tackle how to handle community contributions

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

The plan is to create a separate subpath of terraform-aws-components for community/ contributions.

johncblandii avatar
johncblandii

ah, dope. i should’ve just searched for the resource

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

(btw, sorry @Veronika Gnilitska for not merging that yet)

johncblandii avatar
johncblandii

great resource to help me square away things. it follows what i thought was needed (similar approach to compliance components)

1
Veronika Gnilitska avatar
Veronika Gnilitska

@Erik Osterman (Cloud Posse) hey, np! Should I add this subpath as a part of my PR?

Erik Osterman (Cloud Posse) avatar
Erik Osterman (Cloud Posse)

There are still some things we need to shore up. We will reach out when we are ready. We are meeting in a couple of weeks and will address then

johncblandii avatar
johncblandii

some naming tweaks were needed to follow CP convention + the README examples, but it runs perfectly fine

Veronika Gnilitska avatar
Veronika Gnilitska

Thanks! Looking forward to this.

2023-09-20

2023-09-21

2023-09-25

2023-09-27

    keyboard_arrow_up