Projects with this topic
-
-
A Terraform project to build a Rocky Linux droplet in Digital Ocean.
Updated -
a Terraform configuration for deploying a Ubuntu VM with Nginx in Yandex Cloud. It automates the setup of a VPC network, subnet, NAT gateway, security group, and a VM with a fixed IP.
Updated -
DevGuard simplifies vulnerability management for developers by integrating key security practices directly into the CI/CD workflow. With DevGuard, you can seamlessly perform tasks such as Software Composition Analysis (SCA) and Container Scanning, ensuring that vulnerabilities are detected and addressed early in your pipeline.
Updated -
Contains files used in our Nix-based infrastructure. Access the documentation here: https://docs.garudalinux.net
Updated -
-
Fedora Workstation Setup Scripts for Desktop
Updated -
My collection of terraform/opentofu modules
Updated -
Atlas Architect: Your AI Co-pilot for Secure Cloud Infrastructure
This project is an AI-powered DevSecOps agent that lives within GitLab. It proactively analyzes Infrastructure-as-Code (IaC) files, specifically Terraform, to automatically visualize, secure, and optimize a developer's Google Cloud architecture before it's ever deployed.
When a developer submits a Merge Request with Terraform changes, a CI/CD pipeline triggers the agent to post a detailed analysis back as a comment. This provides instant visibility and governance, helping teams build better, safer cloud infrastructure, faster.
Key Features:
AI-Powered Visualization: Generates architecture diagrams from Terraform code using Google's Vertex AI. Security & Cost Analysis: Identifies security vulnerabilities and cost inefficiencies based on best practices. Intelligent Remediation: Automatically suggests code changes to fix identified issues. Vector-Powered Knowledge Base: Uses a MongoDB Atlas Vector Search index of official Google Cloud documentation to provide highly relevant, context-aware explanations for its recommendations.Core Technologies:
Platform: GitLab CI/CD, Google Cloud Platform (GCP), MongoDB Atlas Services: Google Cloud Run, Google Cloud Build, Google Vertex AI, MongoDB Atlas Vector Search Frameworks & Languages: Python, Flask, GunicornUpdated -
My CloudFlare account configuration
Updated -
-
A local Infrastructure-as-Code (IaC) development environment for security and compliance validation. The current iteration uses Terraform and AWS emulation via LocalStack, focusing on IAM roles, secrets management, S3 access control and regulatory policies (e.g., GDPR/HIPAA). Implemented constrained DevSecOps practices within a local development context.
Updated -
Fedora Workstation 42 configuration using Ansible
Updated -
This is a simple AWS Terraform project to setup a virtual machine in the AWS Cloud known as an instance.
Updated -
JarylC's Personal GitLab Infrastructure-as-Code
Updated -
OwnLab Modules - A collection of open-source projects with IaC-based solutions for seamless deployment in your own private lab.
Mirrors list:
https://github.com/HJHPio/OwnLab-Modules
https://gitlab.com/HJHPio/OwnLab-Modules
Parent project: OwnLab
Updated -
Bootstrap a GitLab Package Hunter with Terraform on Hetzner Cloud
Updated -
A repo for practicing gitops principles. All Infrastructure as Code and automatic deployments with ArgoCD
Updated -
GitLab group and project configuration as code.
Updated -
Veracode Container/IaC/Secrets Scanning Component This Veracode Container/IaC/Secrets Scanning Component runs the Veracode-CLI on any GitLab pipeline
About The Container/IaC/Secrets Scanning Component is designed to be used in a CI/CD pipeline to scan a local folder, remote repository, image or archive for 3rd party library vulnerabilities, infrastructure as code misconfigurations and stored secrets.
For more information on Pipeline Scan visit Veracode Help Center Page: https://docs.veracode.com/r/Veracode_Container_Security
Updated