AI based development is so cool. Two weeks ago I didn’t know what NextJS was. Today I made an app using Cursor – The AI Code Editor and Vercel in less than an hour that can list and map AWS resources in a particular account. All you have to do is provide the credentials.
A bunch of Crossplane/ArgoCD tutorials exist already – so why create another one? This one starts FROM SCRATCH, and takes you through all the way to creating resources on AWS.
Crossplane is not necessarily easy to get started with. But, once you get it going, it’s not much harder to use than Terraform, but with a whole lot more benefits.
If you’re new to Crossplane, these videos offer an excellent introduction. Now, are you ready to dive into the world of Crossplane?
Here is an easy couple of sets of commands to list all resources with a certain tag and delete all buckets with a certain tag. Certain beats manually deleting buckets with lots of contents. I got these little snippets from this AWS Workshop:https://workshops.aws/card/unauthorized
I was surprised that a blog post doesn’t already exist (or at least I didn’t find one), so, this post covers how to automatically add a tag to EC2 instances upon creation with OS of the instance. After the below components are deployed, EC2 instances should automatically have either a os:linux or os:windows tag.
First, create a Lambda function with the following code. I called my function autoTagEC2OS. Use Python 3.12:
I recently passed my AWS Advanced Networking Specialty Certification (ANS). Despite having two CCIEs and a number of other cloud and networking certifications, this was a VERY tough exam, and I JUST barely passed! I walked out of the exam thinking that I failed – as I felt that I was only able to confidently answer about 60% of the answers correctly.
This video shows how to deploy near-production grade HashiCorp Vault Cluster using Terraform, using Robert Debock’s Terraform repository listed below. In the next video, we’ll take it a step further, and setup three clusters, and set them up using Performance Replication and DR Replication!
Ansible and Terraform are both amazing tools with different use cases, however, some of their use cases can overlap. For example, both Ansible and Terraform can be used to deploy and configure AWS, Azure, GCP, Cisco ACI or hundreds of other platforms. In most environments, especially mutli-cloud or hybrid environments, you could, and may be should use both tools to get best of both worlds. For example, you’d setup the Infrastructure-as-code (IAC) using Terraform, and then also use a Terraform “provisioner” to invoke an Ansible Playbook to do the required configuration.
After recently completing the Terraform certification, I was guided by smart fellow Cloud geeks to learn Vault. One of the fun things I decided to do based on their suggestion was to deploy a Vault Dev server on AWS using Terraform.
My mentor challenged me to create the simplest possible way to deploy a Vault dev server on AWS. A couple of hours later, building on my Terraform and Vault knowledge, here is the working answer I came up with:
If you are also learning Vault, you may find this interesting 🙂
Obviously this is in no way meant to be used for production workloads – it’s dev instance, it’s not clustered, it’s not secured/hardened, etc. But for learning, this can be a great start – and an alternative to running the Vault dev server on your own machine.