CloudTruth Documentation
Sign InAPIIntegrationsGitHubVisit our website
  • Overview
  • Getting Started
  • Architecture
    • 🔒Security Overview
  • Copilot
  • 🏢Org management
    • Account Setup
    • Access Control
      • 🔑API Tokens
      • 🌐Protecting Projects and Environments
      • 👥Users
    • Audit Log
  • 🛠️Config Management
    • Projects
    • Parameters
      • Sharing Config Data
      • Parameter Management
        • Internal Values
          • Dynamic Values
        • External Values
          • Terraform Remote State Files
        • Parameter Override
        • Environment Value Override
      • Parameter and Parameter Value Inheritance
      • Value Comparison
      • Value History
      • Value Validation
      • Value Expiration
    • Environments and Tags
    • Templates
      • 📒Sample Templates
    • Actions
      • Import Actions
      • Push Actions
    • CLI & API
      • CloudTruth CLI
      • Rest API
    • Integrations
      • Argo CD
      • Atlassian Compass
      • AWS
        • AWS Connection
        • AWS Role
          • CloudFormation
          • Terrraform
          • AWS Console
        • Parameter Store (SSM)
        • S3
        • Secrets Manager
      • Azure Key Vault
      • Bitbucket Pipelines
      • Docker
      • Docker Compose
      • GitHub
      • GitHub Actions
      • GitLab
      • Harness
      • Jenkins
      • Kubernetes
      • Pulumi
      • Terraform
      • Terragrunt
      • Explorer
      • Circle CI
    • Events, Notifications, Webhooks
    • Types
  • 🔎REPORTING
    • Compare
    • History
    • Expirations
  • 🚀PRODUCT
    • What is CloudTruth?
    • Interactive Demo
    • Kubernetes
    • Terraform
    • CI/CD Pipeline Configuration
    • Cloud CMDB
    • Secrets Management
    • GitOps
    • Our Manifesto
    • Open Source
    • FAQs
    • Our Mission
  • 📚Reference
    • 🎓Quick Start Videos
      • What is CloudTruth?
      • CloudTruth in Action
      • Environments and Projects
      • Secrets, Parameters, ENV variables
      • Audit Logs, RBAC, SSO
      • Containers - Kubernetes, Docker
      • Infrastructure as Code (IaC) - Terraform, Cloudformation, CDK, Azure Bicep, Pulumi
      • CICD Pipelines - GitHub Actions, ArgoCD, Jenkins, CircleCI, Harness, GitLab Pipelines
      • AWS Videos - Secret Manager, Parameter Store, S3, IAM
      • Azure Videos - Azure DevOps, Azure Bicep, PowerShell
    • Knowledge Base
      • Best Practices
        • Versioned Releases
      • CLI
        • History comparison of deleted parameters with null values
      • Integrations
        • Advanced AWS IAM policy permissions
        • K8s pull image from private Docker registry
        • S3 Region Selection
      • Templates
        • Templates render quotations in key values as quot
    • Roadmap and New Features
    • JMESPath Reference
    • REST API
Powered by GitBook

Copyright© 2023 CloudTruth

On this page
  • CloudTruth Open Source
  • Atmos enhances Terraform on AWS
  • AWS-Bastion

Was this helpful?

  1. PRODUCT

Open Source

CloudTruth could not exist without the open source community. One of our core commitments is to give back to the community to benefit others.

PreviousOur ManifestoNextFAQs

Last updated 1 year ago

Was this helpful?

CloudTruth Open Source

We provide open source projects such as:

Atmos enhances Terraform on AWS

Our CTO created Atmos and AWS-Bastion to make our life easier and we hope you find them as useful as we do.

Breathe easier with Atmos + Terraform. Cloud system architectures made easy.

Atmos provides a layer of organization on top of Terraform for creating cloud system architectures with Amazon Web Services. It handles the plumbing so you can focus on your application. The core Atmos runtime is free and open-source, with a business friendly license (Apache). It provides basic recipes to help get you going with a service-oriented architecture implemented with AWS Elastic Container Services.

View the for a detailed walkthrough (~1 hour) of the quickstart. Or try the if you just want to take a quick look (~7m).

AWS-Bastion

A docker container that provides SSH/VPN by using AWS IAM groups to control which IAM users can SSH using the SSH public key stored for those users in IAM (only they have the private key).

This lets a user control SSH/VPN access to a VPC without having to deal with credentials – just put users in the right IAM group to enable them to ssh in and remove them from the group to disable them. Users have full control over the ssh keypair for authentication.

🚀
Kubernetes operator
CLI
GitHub Actions plugin
Argo CD plugin
Terraform provider
Import Utility
Circle CI integration
Check out all our open repos on GitHub
Matt Conway
screencast
condensed screencast
View on GitHub
View on GitHub