Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
This is intended to be used by an organization for all of their own accounts. This does not protect access to DynamoDB locking of other accounts, it only restricts access S3 paths for each account. This restriction is put in place by creating a unique role for each account, then creating an assumerole policy that trusts the corresponding account to assume it. | Terraform Module that provisioning resources for automatic deployment to ECS. (from github repo). |
Statistics | |
GitHub Stars 5 | GitHub Stars 10 |
GitHub Forks 4 | GitHub Forks 3 |
Stacks 246 | Stacks 531 |
Followers 0 | Followers 1 |
Votes 0 | Votes 0 |

The GitHub repository description is used to populate the short description of the module. This should be a simple one sentence description of the module.

Docker based Wordpress deployment backed by a serverless MySQL database.

Establish a solid Foundation on AWS with these modules for Terraform.

Terraform modules for deploying highly configurable Windows workloads on AWS.

Modules to provision a fargate cluster, and service in AWS.


Hashicorp Vault HA cluster on AWS based on Raft Consensus Algorithm.


Terraform module for the deployment of the GrayMeta Platform into AWS. Contact GrayMeta for an enterprise license to gain access to the required AMIs.

Terraform Module which creates a private Terraform Registry using https://github.com/erikvanbrakel/Anthology.