Once a month, we send out a newsletter to all Gruntwork customers that describes all the updates we’ve made in the last month, news in the DevOps industry, and important security updates. Note that many of the links below go to private repos in the Gruntwork Infrastructure as Code Library and Reference Architecture that are only accessible to customers.

Hello Grunts,

In the last month, we launched the beta of Gruntwork Houston, which we believe offers a fundamentally better DevOps experience, added support for NVMe volumes, fixed some important bugs in package-openvpn, and made lots of improvements to Terragrunt and Terratest. In other news, Terraform 0.12 preview is available, and Consul 1.2 adds service mesh support.

As always, if you have any questions or need help, email us at support@gruntwork.io!

Gruntwork Updates

Gruntwork Houston, a fundamentally better DevOps experience, is in beta!

Motivation: Modern DevOps is the story of death by a thousand cuts. You have countless tools to manage — including AWS and all of its separate services (EC2, ECS, RDS, CloudWatch, etc), GitHub, Jenkins, OpenVPN, Terraform, Docker, Packer, DataDog, Loggly, PagerDuty, and so on — and there’s no coherent user experience that ties them all together. Before, your choices were to either use a Platform as a Service (PaaS) that gave you a nice UI, but no ability to control or customize anything, or to use Infrastructure as Code (IaC), which gave you full control and power over everything, but no nice UI.

Solution: Introducing, Gruntwork Houston!

Gruntwork Houston gives you DevOps super powers. On the surface, it’s a simple web interface that your Dev team can use to deploy and manage infrastructure. Under the hood, the web interface and how it manages infrastructure are completely defined and controlled by your Ops team using infrastructure as code.

It’s the best of both worlds: your Dev team gets an easy-to-use, self-service experience, while your Ops team still has all the power and control they need to ensure reliability, security, and compliance. Best of all, Houston runs in your own AWS account (so it can securely access your infrastructure) and is included in the Gruntwork Subscription for no extra fee!

We’re currently testing out Gruntwork Houston with a few customers in a private beta. Some of the first features we’ve released include single sign-on (SSO) that allows you to login to any of your AWS accounts using any SAML provider, including Google, ADFS, and Okta. SSO with Houston works for the AWS web console, AWS CLI tools, VPN access, and SSH access. Here’s a screen capture that shows you just how much easier it is to authenticate to AWS from the CLI using Houston:

What to do about it: Check out the Gruntwork Houston announcement blog post for more details, including more screenshots and videos. If you’re interested in joining the waiting list, email us at info@gruntwork.io.

ssh-iam has been refactored into ssh-grunt

Motivation: Our customers wanted to use external Identity Providers (IdP’s), such as Google and ADFS, to access their AWS accounts, including accessing their servers over SSH. However, ssh-iam only supported IAM as an IdP.

Solution: We have refactored ssh-iam and renamed it to ssh-grunt so that we can use it with all the IdP’s supported by Gruntwork Houston! That means you can manage SSH access to your EC2 Instances using roles in your SAML IdP, such as Google, ADFS, or Okta. Team members with the appropriate SSH Roles will be able to upload their publish SSH keys to Houston and then use their own username and that SSH key to SSH to EC2 Instances.

What to do: Check out the release notes in module-security, v0.13.0 for how to upgrade to ssh-grunt and see module-security, v0.14.0 for the latest version. If you’d like to start using Gruntwork Houston, email us at info@gruntwork.io.

You can now mount NVMe volumes

Motivation: AWS has launched a number of new instance types (C5, C5d, i3.metal, M5, and M5d) that use NVMe block devices, which require extra logic to mount properly in Linux.

Solution: We’ve updated the mount-ebs-volume script with support for NVMe block devices!

What to do: Update to module-server, v0.5.0 and use the mount-ebs-volume with all your NVMe block devices.

package-openvpn fixes

Motivation: We added several new features and fixed several important bugs in package-openvpn.

Solution: Here are the new releases from the last month:

What to do about it: The init-openvpn fixes are important, so we strongly recommend updating to package-openvpn, v0.7.1.

Terragrunt updates

Motivation: Terragrunt usage is growing quickly (it has over 1,400 stars on GitHub!), so we are beginning to invest in improving its user experience.

Solution: We’ve added a number of new features and fixed a bunch of bugs in the last month:

What to do about it: Upgrade to the latest release of Terragrunt and keep your eyes open for many more improvements in the next few months.

Terratest improvements

Terratest is also growing in popularity on GitHub (over 1,100 stars!), and the community has contributed some great new features this month:

Give the latest release of Terratest a shot and let us know what else we can do to make it easier to test your infrastructure!

Other updates

DevOps News

Terraform 0.12 is coming

What happened: HashiCorp has announced a preview release of Terraform 0.12.

Why it matters: Terraform 0.12 brings a number of major changes to HCL, the language used in Terraform. Here are just a few of the highlights:

What to do about it: For now, do nothing. Over the next few months, we will start updating all of our modules, as well as Terratest and Terragrunt, to work with Terraform 0.12. This should greatly simplify a lot of our code, but will also require a large number of backwards incompatible changes, so be prepared for code changes.

Consul 1.2 is out, adding Service Mesh functionality

What happened: HashiCorp has released Consul 1.2, which adds a major new feature called Consul Connect, which turns your Consul cluster into a service mesh.

Why it matters: A service mesh is useful in any microservices and cloud architecture where you need:

Up until now, Consul has offered the first two features; Consul Connect adds the third feature, giving you an easy way to enable secure service-to-service communication with automatic TLS encryption and identity-based authorization.

What to do about it: Check out the announcement blog post for all the details.

Amazon Linux 2 is now generally available

What happened: After several release candidates, Amazon Linux 2 is now generally available and comes with 5 years of Long Term Support (LTS).

Why it matters: Amazon Linux 2 is the new generation of AWS-supported Linux distribution. It includes an updated Linux Kernel (4.14), systemd support, a newer compiler (GCC 7.3), an updated C runtime (Glibc 2.26), modern tooling (Binutils 2.29.1), and more.

What to do about it: The Amazon Linux 2 AMI and Docker images are available for your use now. We have already updated a few of our modules with support for Amazon Linux 2, but we have many more to update, which we’ll be doing over the next couple months. If there is a specific module you’d like updated urgently, let us know!

Security Updates

Below is a list of critical security updates that may impact your services. We notify Gruntwork customers of these vulnerabilities as soon as we know of them via the Gruntwork Security Alerts mailing list. It is up to you to scan this list and decide which of these apply and what to do about them, but most of these are severe vulnerabilities, and we recommend patching them ASAP.

NTP