Browse the repos in the Gruntwork Infrastructure as Code Library.
License
Written in
No Results Found
We couldn't find a service that matches your search. Looking for something not already in the Infrastructure as Code Library? Contact us to have Gruntwork build it!
{"title":"Repo Browser","description":"Browse the repos in the Gruntwork Infrastructure as Code Library.","serviceCatalogData":[{"categoryName":"Docker orchestration","services":[{"serviceName":"EC2 Kubernetes Service (EKS) Cluster","serviceRepoName":"terraform-aws-eks","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy a Kubernetes cluster on top of Amazon EC2 Kubernetes Service (EKS).","imageUrl":"eks.png","licenseType":"subscriber","technologies":["Terraform","Python","Bash"],"compliance":[],"tags":[""]},{"serviceName":"EC2 Container Service (ECS) Cluster","serviceRepoName":"module-ecs","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy a cluster of servers for use with EC2 Container Service (ECS), Amazon's container orchestration system","imageUrl":"ecs.png","licenseType":"subscriber","technologies":["Terraform","Python","Bash"],"compliance":[],"tags":[""]},{"serviceName":"HashiCorp Nomad","serviceRepoName":"terraform-aws-nomad","serviceRepoOrg":"hashicorp","cloudProviders":["aws"],"description":"Deploy a Nomad cluster. Supports automatic bootstrapping, discovery of Consul servers, automatic recovery of failed servers.","imageUrl":"nomad.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Google Kubernetes Engine (GKE) Cluster","serviceRepoName":"terraform-google-gke","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Deploy a Kubernetes cluster on top of Google Kubernetes Engine (GKE).","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"HashiCorp Nomad","serviceRepoName":"terraform-google-nomad","serviceRepoOrg":"hashicorp","cloudProviders":["gcp"],"description":"Deploy a Nomad cluster. Supports automatic bootstrapping, discovery of Consul servers, automatic recovery of failed servers.","imageUrl":"nomad.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Server orchestration","services":[{"serviceName":"Auto Scaling Group (stateless)","serviceRepoName":"module-asg","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/asg-rolling-deploy","cloudProviders":["aws"],"description":"Run an Auto Scaling Group for stateless apps. Supports zero-downtime, rolling deployment, auto healing, auto scaling, and IAM Roles.","imageUrl":"auto-scaling2.png","licenseType":"subscriber","technologies":["Terraform","Python","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Auto Scaling Group (stateful)","serviceRepoName":"module-asg","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/server-group","cloudProviders":["aws"],"description":"Run an Auto Scaling Group for stateful apps. Supports zero-downtime, rolling deployment, auto healing, IAM Roles, EBS Volumes, and ENIs.","imageUrl":"auto-scaling2.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Single EC2 Instance","serviceRepoName":"module-server","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Run a single EC2 instance for stateless or stateful apps. Supports IAM roles, EBS volumes, ENIs, and EIPs.","imageUrl":"single-service.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Database","services":[{"serviceName":"MySQL","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/rds/README-MySQL.adoc","cloudProviders":["aws"],"description":"Run MySQL on Amazon’s Relational Database Service (RDS). Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"mysql.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"PostgreSQL","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/rds/README-PostgreSQL.adoc","cloudProviders":["aws"],"description":"Run PostgreSQL on Amazon’s Relational Database Service (RDS). Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"postgres.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"MariaDB","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/rds/README-MariaDb.adoc","cloudProviders":["aws"],"description":"Run MariaDB on Amazon’s Relational Database Service (RDS). Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"mariadb_db.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"SQL Server","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/rds/README-SqlServer.adoc","cloudProviders":["aws"],"description":"Run SQL Server on Amazon’s Relational Database Service (RDS). Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"sql-server.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Oracle","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/rds/README-Oracle.adoc","cloudProviders":["aws"],"description":"Run Oracle on Amazon’s Relational Database Service (RDS). Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"oracle.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Aurora","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/aurora/README-Aurora.adoc","cloudProviders":["aws"],"description":"Run Aurora, Amazon’s MySQL and PostgreSQL compatible cloud DB. Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"aurora.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Aurora Serverless","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/aurora/README-Aurora-Serverless.adoc","cloudProviders":["aws"],"description":"Run Aurora Serverless, the on-demand, auto-scaling version of Amazon Aurora.","imageUrl":"aurora.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"EFS","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"modules/efs/README.adoc","cloudProviders":["aws"],"description":"Create an Amazon Elastic File System (EFS) file system that provides NFSv4-compatible storage that can be used with other AWS services, such as EC2 instances.","imageUrl":"efs.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"MySQL","serviceRepoName":"terraform-google-sql","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Run MySQL on Google's Cloud SQL Service. Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"mysql.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"PostgreSQL","serviceRepoName":"terraform-google-sql","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Run PostgreSQL on Google's Cloud SQL Service. Supports read replicas, multi-zone automatic failover, and automatic backup.","imageUrl":"postgres.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"NoSQL","services":[{"serviceName":"Redis","serviceRepoName":"module-cache","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/redis","cloudProviders":["aws"],"description":"Run a Redis cluster using Amazon’s ElastiCache Service. Supports replication, multi-zone automatic failover, and automatic backup.","imageUrl":"redis.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Memcached","serviceRepoName":"module-cache","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/memcached","cloudProviders":["aws"],"description":"Run a Memcached cluster using Amazon’s ElastiCache Service. Supports replication, multi-zone automatic failover, and automatic backup.","imageUrl":"memcached.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"MongoDB","serviceRepoName":"package-mongodb","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy a MongoDB cluster. Supports replica sets, sharding, automated bootstrapping, backup, recovery, and OS optimizations.","imageUrl":"mongodb.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Couchbase","serviceRepoName":"terraform-aws-couchbase","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy a Couchbase cluster. Supports automatic bootstrapping, Sync Gateway, Web Console UI, cross-region replication, and auto healing.","imageUrl":"couchbase.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"InfluxDB","serviceRepoName":"terraform-aws-influx","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy an InfluxDB cluster. Supports automatic bootstrapping and auto healing.","imageUrl":"tick.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Apache ZooKeeper","serviceRepoName":"package-zookeeper","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy an Apache ZooKeeper cluster. Supports automatic bootstrap, Exhibitor, zero-downtime rolling deployment, and auto healing.","imageUrl":"zookeeper.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Amazon Elasticsearch","serviceRepoName":"infrastructure-modules-acme","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/data-stores/elasticsearch","cloudProviders":["aws"],"description":"Deploy an AWS-managed Elasticsearch cluster. Supports automatic bootstrap, auto healing, backup, and recovery.","imageUrl":"elk.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Elasticsearch (self-hosted)","serviceRepoName":"package-elk","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy a self-hosted Elasticsearch cluster. Supports automatic bootstrap, zero-downtime rolling deployment, auto healing, backup, and recovery.","imageUrl":"elk.png","licenseType":"subscriber","technologies":["Terraform","Bash","JavaScript"],"compliance":[],"tags":[""]},{"serviceName":"InfluxDB","serviceRepoName":"terraform-google-influx","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Deploy InfluxDB. Supports automatic bootstrapping and auto healing.","imageUrl":"tick.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Messaging & streaming","services":[{"serviceName":"Apache Kafka and Confluent Tools","serviceRepoName":"package-kafka","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy a cluster of Kafka brokers. Optionally deploy Confluent tools such as Schema Registry, REST Proxy, and Kafka Connect.","imageUrl":"kafka.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Kinesis","serviceRepoName":"package-messaging","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/kinesis","cloudProviders":["aws"],"description":"Create Kinesis streams with configurable or auto-calculated shard and retention settings.","imageUrl":"kinesis.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"SQS","serviceRepoName":"package-messaging","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/sqs","cloudProviders":["aws"],"description":"Create SQS queues with support for FIFO, message retention, message delays, content-based deduplication, dead-letter queues, and access controls.","imageUrl":"sqs.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"SNS","serviceRepoName":"package-messaging","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/sns","cloudProviders":["aws"],"description":"Create SNS topics with configurable IAM and delivery policies.","imageUrl":"sns.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"MSK","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Deploy Amazon Managed Streaming (MSK) for Apache Kafka.","imageUrl":"kafka.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Service Mesh","services":[{"serviceName":"HashiCorp Consul","serviceRepoName":"terraform-aws-consul","serviceRepoOrg":"hashicorp","cloudProviders":["aws"],"description":"Deploy a Consul cluster. Supports automatic bootstrapping, DNS, Consul UI, and auto healing.","imageUrl":"consul.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Consul Connect","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws","gcp"],"description":"Run a service mesh on top of HashiCorp Consul. Supports service-to-service authorization and mutual TLS.","imageUrl":"consul.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"AWS AppMesh","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Use the Envoy proxy to run a managed service mesh on AWS to support application-level networking.","imageUrl":"aws-app-mesh.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Istio","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws","gcp"],"description":"Deploy Istio, an open source service mesh that provides traffic management, policy enforcement, and telemetry collection.","imageUrl":"istio.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"HashiCorp Consul","serviceRepoName":"terraform-google-consul","serviceRepoOrg":"hashicorp","cloudProviders":["gcp"],"description":"Deploy a Consul cluster. Supports automatic bootstrapping, DNS, Consul UI, and auto healing.","imageUrl":"consul.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Static content","services":[{"serviceName":"S3","serviceRepoName":"package-static-assets","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/s3-static-website","cloudProviders":["aws"],"description":"Deploy your static content and static websites on S3. Supports bucket versioning, redirects, and access logging.","imageUrl":"amazon-s3.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"CloudFront","serviceRepoName":"package-static-assets","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/s3-cloudfront","cloudProviders":["aws"],"description":"Deploy CloudFront as a CDN in front of your S3 bucket. Supports cache settings, Route 53 DNS entries, and TLS certs.","imageUrl":"cloudfront.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"CloudFlare","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Deploy CloudFlare as a CDN in front of your S3 bucket.","imageUrl":"cloudflare.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"GCS","serviceRepoName":"terraform-google-static-assets","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Deploy your static content and static websites on GCS.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform"],"compliance":[],"tags":[""]}]},{"categoryName":"Monitoring & alerting","services":[{"serviceName":"CloudWatch","serviceRepoName":"terraform-aws-monitoring","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Send all metrics to CloudWatch, including those not visible to the EC2 hypervisor. Create dashboards and alerts as code.","imageUrl":"cloudwatch.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"TICK Stack","serviceRepoName":"terraform-aws-influx","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy the TICK stack (Telegraf, InfluxDB, Chronograf, Kapacitor) to gather and process time series data.","imageUrl":"tick.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"DataDog","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Send all metrics to DataDog. Define alerts and dashboards as code.","imageUrl":"datadog.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Prometheus","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Deploy Prometheus as a time series database. Send all metrics to Prometheus. Configure alerts and dashboards as code.","imageUrl":"prometheus.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"StackDriver","serviceRepoName":"terraform-google-gke","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/gke-cluster/README.md#how-do-i-configure-logging-and-monitoring-with-stackdriver-for-my-cluster","cloudProviders":["gcp"],"description":"Aggregate all metrics from your GCP services.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"TICK Stack","serviceRepoName":"terraform-google-influx","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Deploy the TICK stack (Telegraf, InfluxDB, Chronograf, Kapacitor) to gather and process time series data.","imageUrl":"tick.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Log aggregation","services":[{"serviceName":"CloudWatch Logs","serviceRepoName":"terraform-aws-monitoring","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Send all logs to CloudWatch Logs, so you can search, filter, and analyze log data in a single place.","imageUrl":"cloudwatch.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"ELK Stack","serviceRepoName":"package-elk","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy an ELK cluster (Elasticsearch, Logstash and Kibana) for storing log data. Send logs and metrics to ELK using Filebeat and Collectd.","imageUrl":"elk.png","licenseType":"subscriber","technologies":["Terraform","Bash","JavaScript"],"compliance":[],"tags":[""]},{"serviceName":"Sumo Logic","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Send all logs to Sumo Logic, so you can search, filter, and analyze log data in a single place.","imageUrl":"sumo.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"StackDriver","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["gcp"],"description":"","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform"],"compliance":[],"tags":[""]}]},{"categoryName":"Networking","services":[{"serviceName":"Virtual Private Cloud (VPC)","serviceRepoName":"terraform-aws-vpc","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Create a Virtual Private Cloud (VPC). Includes multiple subnet tiers, NACLs, NAT gateways, Internet Gateways, and VPC peering.","imageUrl":"vpc.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"Elastic Load Balancer (ELB)","serviceRepoName":"module-load-balancer","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy the Application Load Balancer (ALB) for load balancing HTTP and HTTPS, with support for routing rules and WebSockets.","imageUrl":"elastic.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"Transit Gateway","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Connect all of your VPCs, VPNs, and on-premise networks to a single gateway.","imageUrl":"transit.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Shared VPCs","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Share subnets from a VPC with other AWS accounts in your AWS Organization.","imageUrl":"vpc.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Virtual Private Cloud (VPC)","serviceRepoName":"terraform-google-network","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Create a Virtual Private Cloud (VPC). Includes multiple subnet tiers, firewall rules, NAT gateways, and VPC peering.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"Cloud Load Balancer","serviceRepoName":"terraform-google-load-balancer","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Deploy Google's Cloud Load Balancer, with support for HTTP, HTTPs, and global forwarding rules.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform"],"compliance":[],"tags":[""]}]},{"categoryName":"SSH access","services":[{"serviceName":"ssh-grunt","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/ssh-grunt","cloudProviders":["aws"],"description":"Manage SSH access to EC2 Instances using groups in AWS IAM or your Identity Provider (e.g., ADFS, Google, Okta, etc).","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","Go"],"compliance":[],"tags":[""]},{"serviceName":"EC2 Instance Connect","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Manage SSH access to EC2 Instances using AWS IAM.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Gravitational Teleport","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Manage SSH access to EC2 Instances and Kubernetes with support for key management and MFA in a 3rd party service.","imageUrl":"gravitational-teleport.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"gcloud SSH access","serviceRepoName":"terraform-google-network","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/bastion-host#how-do-i-ssh-to-the-host","cloudProviders":["gcp"],"description":"SSH into virtual cloud instances using the gcloud CLI tool.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Client VPN access","services":[{"serviceName":"OpenVPN","serviceRepoName":"package-openvpn","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy an OpenVPN server. Supports auto healing, public key infrastructure (PKI), cert backup, and managing user accounts using IAM groups.","imageUrl":"openvpn.png","licenseType":"subscriber","technologies":["Terraform","Bash","Go"],"compliance":[],"tags":[""]},{"serviceName":"AWS Client VPN","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Deploy Amazon's managed VPN service, which is compatible with OpenVPN clients.","imageUrl":"awsvpn.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Cloud Identity-Aware Proxy (IAP)","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["gcp"],"description":"Controls access to GCP without relying on VPN by verifying user identity and the context of each request. ","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Site-to-site VPN access","services":[{"serviceName":"AWS Site-to-Site VPN","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Connect your on-premises networking to your AWS VPCs using site-to-site VPN.","imageUrl":"awsvpn.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Direct Connect","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Establish a dedicated connection between your on-premises network and AWS.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"CI / CD","services":[{"serviceName":"Jenkins","serviceRepoName":"module-ci","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy Jenkins and configure CI / CD pipelines for your apps as code using Jenkinsfiles and Gruntwork build and deploy scripts.","imageUrl":"jenkins.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"CircleCi","serviceRepoName":"module-ci","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Configure CI / CD pipelines for your apps as code in CircleCi using CircleCi config files and Gruntwork build and deploy scripts.","imageUrl":"circleci.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"TravisCi","serviceRepoName":"module-ci","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Configure CI / CD pipelines for your apps as code in TravisCi using TravisCi config files and Gruntwork build and deploy scripts.","imageUrl":"travisci.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"Pre-commit hooks","serviceRepoName":"pre-commit","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws","gcp"],"description":"A collection of pre-commit hooks for Terraform, bash, Go, and more.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Bash"],"compliance":[],"tags":[""]},{"serviceName":"GitLab","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws","gcp"],"description":"Configure CI / CD pipelines for your apps as code in GitLab using GitLab config files and Gruntwork build and deploy scripts.","imageUrl":"gitlab.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"GitHub Actions","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws","gcp"],"description":"Configure CI / CD pipelines for your apps as code in GitHub Actions using GitHub Actions workflows and Gruntwork build and deploy scripts.","imageUrl":"github-actions.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Jenkins","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["gcp"],"description":"Deploy Jenkins and configure CI / CD pipelines for your apps as code using Jenkinsfiles and Gruntwork build and deploy scripts.","imageUrl":"jenkins.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"CircleCI","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["gcp"],"description":"Configure CI / CD pipelines for your apps as code in CircleCi using CircleCi config files and Gruntwork build and deploy scripts.","imageUrl":"circleci.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Serverless","services":[{"serviceName":"AWS Lambda","serviceRepoName":"package-lambda","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy Lambda functions with Terraform. Supports uploading deployment packages, configuring environment variables, and scheduled functions.","imageUrl":"lambda.png","licenseType":"subscriber","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Secrets management","services":[{"serviceName":"KMS","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/kms-master-key","cloudProviders":["aws"],"description":"Encrypt and decrypt secrets using Amazon's Key Management Service (KMS).","imageUrl":"kms.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"HashiCorp Vault","serviceRepoName":"terraform-aws-vault","serviceRepoOrg":"hashicorp","cloudProviders":["aws"],"description":"Deploy a Vault cluster. Supports automatic bootstrapping, Consul and S3 backends, self-signed TLS certificates, and auto healing.","imageUrl":"vault.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"AWS Secrets Manager","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Store and retrieve secrets from AWS Secrets Manager.","imageUrl":"secrets-manager.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"KMS","serviceRepoName":"terraform-google-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/cloud-kms","cloudProviders":["gcp"],"description":"Encrypt and decrypt secrets using Google's Key Management Service (KMS).","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]},{"serviceName":"HashiCorp Vault","serviceRepoName":"terraform-google-vault","serviceRepoOrg":"hashicorp","cloudProviders":["gcp"],"description":"Deploy a Vault cluster. Supports automatic bootstrapping, Consul and GCS backends, self-signed TLS certificates, and auto healing.","imageUrl":"vault.png","licenseType":"open-source","technologies":["Terraform","Bash"],"compliance":[],"tags":[""]}]},{"categoryName":"Docker services","services":[{"serviceName":"Kubernetes Service","serviceRepoName":"helm-kubernetes-services","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws","gcp"],"description":"Deploy a Kubernetes service with zero-downtime, rolling deployment, RBAC, auto scaling, secrets management, and more.","imageUrl":"kubernetes.png","licenseType":"open-source","technologies":["Terraform","Bash","Helm"],"compliance":[],"tags":[""]},{"serviceName":"ECS Service","serviceRepoName":"module-ecs","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/ecs-service-with-alb","cloudProviders":["aws"],"description":"Deploy an ECS service with zero-downtime, rolling deployment, IAM Role, auto scaling, and more.","imageUrl":"ecs.png","licenseType":"subscriber","technologies":["Terraform","Python"],"compliance":[],"tags":[""]},{"serviceName":"ECS Fargate Service","serviceRepoName":"module-ecs","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/ecs-fargate","cloudProviders":["aws"],"description":"Deploy an ECS Fargate service with zero-downtime, rolling deployment, IAM Role, auto scaling, and more.","imageUrl":"awsfargate.png","licenseType":"subscriber","technologies":["Terraform","Python"],"compliance":[],"tags":[""]},{"serviceName":"Tiller / Helm","serviceRepoName":"terraform-kubernetes-helm","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Deploy Tiller (Helm Server) to your Kubernetes cluster as a service/package manager. Supports namespaces, service accounts, RBAC roles, and TLS.","imageUrl":"kubernetes.png","licenseType":"subscriber","technologies":["Terraform","Bash","Helm"],"compliance":[],"tags":[""]},{"serviceName":"Skaffold","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"CLI tool to simplify local development, build, and deployment of Kubernetes services.","imageUrl":"kubernetes.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Tiller / Helm","serviceRepoName":"helm-kubernetes-services","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"Deploy Tiller (Helm Server) to your Kubernetes cluster as a service/package manager. Supports namespaces, service accounts, RBAC roles, and TLS.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Terraform","Bash","Helm"],"compliance":[],"tags":[""]}]},{"categoryName":"Intrusion prevention","services":[{"serviceName":"fail2ban","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/fail2ban","cloudProviders":["aws","gcp"],"description":"Configure a Linux server to automatically ban malicious ip addresses from connecting to the server via SSH.","imageUrl":"fail2ban.png","licenseType":"subscriber","technologies":["Bash"],"compliance":[],"tags":[""]},{"serviceName":"ip-lockdown","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/ip-lockdown","cloudProviders":["aws","gcp"],"description":"Lock down specified outgoing ip addresses on a Linux server such that only specific OS users can access them. Used to protect metadata endpoints.","imageUrl":"ip-lockdown.png","licenseType":"subscriber","technologies":["Bash"],"compliance":[],"tags":[""]},{"serviceName":"auto-update","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/auto-update","cloudProviders":["aws","gcp"],"description":"Configure a Linux server to automatically install critical security updates.","imageUrl":"auto-update.png","licenseType":"subscriber","technologies":["Bash"],"compliance":[],"tags":[""]},{"serviceName":"Network IPS (e.g., Palo Alto Firewall)","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Examine network traffic and automatically detect and prevent malicious inputs, vulnerabilities, and exploits.","imageUrl":"palo-alto-ips.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Anti-virus (e.g., Sophos)","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Automatically detect, block, and remove computer viruses from a server.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"File integrity monitoring (e.g., TripWire)","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Automatically validate the integrity of OS and application files against a known-good baseline.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"AWS WAF","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Deploy Amazon's Web Application Firewall (WAF) to protect web applications from common web exploits, such as SQL injection or cross-site scripting.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Landing Zone","services":[{"serviceName":"AWS Account Baseline for App Accounts","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/account-baseline-app","cloudProviders":["aws"],"description":"Configure App accounts with a security baseline for AWS Landing Zone.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS Account Baseline for Root Account","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/account-baseline-root","cloudProviders":["aws"],"description":"Configure Root account for AWS Landing Zone.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS Account Baseline for Security Account","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/account-baseline-security","cloudProviders":["aws"],"description":"Configure Security account for AWS Landing Zone.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS CloudTrail","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/cloudtrail","cloudProviders":["aws"],"description":"Run AWS CloudTrail to maintain an audit log of all API calls in your AWS account and write the logs to an S3 bucket, encrypted with KMS.","imageUrl":"cloudtrail.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS Config","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/aws-config","cloudProviders":["aws"],"description":"Run AWS Config to assess, audit, and evaluate the configurations of your AWS resources, ensuring they meet your compliance requirements.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","Go"],"compliance":[],"tags":[""]},{"serviceName":"AWS Config Multi Region","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/aws-config-multi-region","cloudProviders":["aws"],"description":"Enable AWS Config in all regions, Configure config items to be automatically archive and delete after a certain time period.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS Organizations","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/aws-organizations","cloudProviders":["aws"],"description":"Provision new AWS accounts under your organization.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS Organizations Config Rules","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/aws-organizations-config-rules","cloudProviders":["aws"],"description":"Provision new AWS accounts under your organization.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"AWS GuardDuty","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Run Amazon GuardDuty, a threat detection service that continuously monitors for malicious activity and unauthorized behavior in your AWS accounts.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"AWS GuardDuty Multi Region Module","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Run Amazon GuardDuty, AWS GuardDuty Multi Region Module.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"IAM Users","serviceRepoName":"module-security","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/iam-users","cloudProviders":["aws"],"description":"Create and manage IAM users, IAM groups, IAM roles, and IAM policies as code.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform"],"compliance":[],"tags":[""]},{"serviceName":"Federated auth","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Authenticate to your AWS account via the web, CLI, VPN, and SSH using an existing identity provider, such as ADFS, Google, Okta, OneLogin, etc.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Backup & recovery","services":[{"serviceName":"Database backup","serviceRepoName":"module-data-storage","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/lambda-create-snapshot/README.adoc","cloudProviders":["aws"],"description":"Snapshot your RDS databases and copy the snapshots to other AWS accounts on a scheduled basis for disaster recovery.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","JavaScript","Lambda"],"compliance":[],"tags":[""]},{"serviceName":"EC2 backup","serviceRepoName":"module-ci","serviceRepoOrg":"gruntwork-io","serviceMainReadmePath":"/modules/ec2-backup","cloudProviders":["aws"],"description":"Snapshot your EC2 instances on a scheduled basis.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","JavaScript","Lambda"],"compliance":[],"tags":[""]},{"serviceName":"S3 replication","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Configure an S3 bucket to replicate its contents to another AWS account for disaster recovery.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Terraform CI/CD","services":[{"serviceName":"Terragrunt","serviceRepoName":"terragrunt","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws","gcp"],"description":"Terragrunt is a thin wrapper for Terraform that provides tools for keep your code DRY while working with multiple Terraform modules.","imageUrl":"grunt.png","licenseType":"open-source","technologies":["Go"],"compliance":[],"tags":[""]},{"serviceName":"Terraform Cloud integration","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Terraform Cloud provides a web-based user interface for managing your Terraform code.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]},{"serviceName":"Terraform Enterprise integration","serviceRepoName":"","serviceRepoOrg":"","cloudProviders":["aws"],"description":"Terraform Enterprise provides a web-based user interface for managing your Terraform code, plus advanced governance tools like Sentinel.","imageUrl":"grunt.png","licenseType":"unimplemented","technologies":[],"compliance":[],"tags":[""]}]},{"categoryName":"Reference Architecture","services":[{"serviceName":"Single-account Reference Architecture","serviceRepoName":"infrastructure-live-acme","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"End-to-end tech stack designed to deploy into a single AWS account. Includes VPCs, EKS, ALBs, CI / CD, monitoring, alerting, VPN, DNS, and more.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","Go","Bash","Python"],"compliance":[],"tags":[""]},{"serviceName":"Multi-account Reference Architecture","serviceRepoName":"infrastructure-live-multi-account-acme","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"End-to-end tech stack designed to deploy into multiple AWS accounts. Includes VPCs, EKS, ALBs, CI / CD, monitoring, alerting, VPN, DNS, and more.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","Go","Bash","Python"],"compliance":[],"tags":[""]},{"serviceName":"Multi-project Reference Architecture","serviceRepoName":"infrastructure-modules-google","serviceRepoOrg":"gruntwork-io","cloudProviders":["gcp"],"description":"End-to-end tech stack designed to deploy into multiple GCP Projects. Includes VPCs, GKE, CI / CD, monitoring, alerting, and more.","imageUrl":"grunt.png","licenseType":"subscriber","technologies":["Terraform","Go","Bash","Python"],"compliance":[],"tags":[""]}]},{"categoryName":"Compliance","services":[{"serviceName":"CIS Foundations Benchmark","serviceRepoName":"cis-compliance-aws","serviceRepoOrg":"gruntwork-io","cloudProviders":["aws"],"description":"Modules and utilities certified by Gruntwork and CIS to comply with the CIS AWS Foundations Benchmark","imageUrl":"cis-logo.png","licenseType":"subscriber","technologies":["Terraform","Go","Python"],"compliance":["CIS"],"tags":[""]}]}]}