provider "hungran" {
profile = "YOLO"
}
resource "about_me" "whoami" {
name = "VŨ MẠNH HÙNG"
location = "Hanoi"
email = "[email protected]"
}
resource "my_pleasure" "description" {
description = var.description
}
variable "description" {
default = "Blog này mình viết nhằm mục đích
chia sẻ về những gì mình đã và đang trải nghiệm
trong công việc 🌩️ 🧑💻 cũng như cuộc sống hàng ngày 🛫.
Hi vọng sẽ giúp được cho các bạn điều gì đó...💡💡💡"
}
Nếu các bạn đã đọc đến đây thì một lần nữa xin cảm ơn đã quan tâm đến mình
😆 Dành cho nhà tuyển dụng - CV Của mình nằm ở dưới đây 😆
👉 View: https://blog.hungran.cloud/HungVu-Platform-Engineer.pdf
⬇️ Download: Click here to download
Applying Gitops Network Firewall P3
Architecture Reference : https://aws.amazon.com/vi/blogs/networking-and-content-delivery/deployment-models-for-aws-network-firewall/ Deploy Multi-VPC Reference : https://github.com/tnx-journey-to-cloud/terraform-aws-vpc
We create a VPC module with Terraform to reuse and call it whenever we deploy a VPC in Multi-VPC environment such as Spoke, Ingress, Egress, …
The source code available here: https://github.com/tnx-journey-to-cloud/terraform-aws-networkfirewall
Our Cloud Journey’s members:
https://github.com/hungran https://github.com/hiimtung https://github.com/kerashanog https://github.com/haicasgox https://github.com/lacoski https://github.com/HieuChayA4
Applying Gitops Network Firewall P2
Open source tools integrated with Terraform and GitHub Atlantis Atlantis is an application for automating Terraform via pull requests. It is deployed as a standalone application into your infrastructure.
Atlantis listens for GitHub, GitLab or Bitbucket webhooks about Terraform pull requests. It then runs terraform plan and comments with the output back on the pull request. When you want to apply, comment atlantis apply on the pull request and Atlantis will run terraform apply and comment back with the output.