Production-ready infrastructure tools built with ISO 27001 compliance, monitoring, and operational excellence in mind.
Infrastructure as Code modules for AWS. All modules are available on the HashiCorp Terraform Registry and our private registry.
Featured
These modules have comprehensive documentation with getting started guides, architecture diagrams, and configuration references.
Self-hosted GitHub Actions runners on AWS with warm pool support, Puppet integration, and ISO 27001 compliant monitoring.
Production-ready ECS service deployment with ALB, autoscaling, and integrated monitoring.
ECS service that scales based on SQS queue depth for background job processing.
OpenVPN server with Google OAuth authentication for secure remote access to AWS resources.
AWS Secrets Manager secret with owner/writer/reader IAM roles for fine-grained access control.
Autoscaling group with ALB and SSL certificate for web applications.
All Modules
Self-hosted GitHub Actions runners on AWS with warm pool support, Puppet integration, and ISO 27001 compliant monitoring.
Production-ready ECS service deployment with ALB, autoscaling, and integrated monitoring.
ECS service that scales based on SQS queue depth for background job processing.
OpenVPN server with Google OAuth authentication for secure remote access to AWS resources.
AWS Secrets Manager secret with owner/writer/reader IAM roles for fine-grained access control.
Autoscaling group with ALB and SSL certificate for web applications.
Cloud-init userdata generation with Puppet support for EC2 instance bootstrapping.
IAM instance profile with configurable policies for EC2 instances.
Secure bastion host for SSH access to private resources.
Autoscaling group with NLB for TCP-based services.
VPC with public and private subnets, NAT gateway, and internet gateway.
S3 bucket with DynamoDB table for Terraform state storage and locking.
IAM role for secure Terraform state management with S3 and DynamoDB.
IAM roles for managing AWS infrastructure with GitHub Actions CI/CD.
AWS Lambda with built-in error alerting, throttle monitoring, and CloudWatch integration.
Self-managed Elasticsearch cluster on EC2 with master and data nodes.
Kibana deployment on ECS for Elasticsearch visualization.
Debian APT repository backed by S3 and fronted by CloudFront.
BookStack wiki deployment on ECS with RDS backend.
Postfix MX server deployment for email receiving.
Private PyPI server for Python package hosting.
ALB trust store with generated CA certificate for mTLS.
Dedicated EC2 instance for administrative Terraform operations.
Lambda that manages DNS A records for instances in an autoscaling group.
View all 48+ modules →
Python Automation
CLI tools and libraries for AWS infrastructure management. Install via pip install <package-name>.
CLI tools for AWS infrastructure management. Includes ih-plan, ih-ec2, ih-secrets, ih-certbot, and more.
Python library with AWS helper classes for EC2, S3, Route53, and other services.
Installation
# Install the toolkit (includes CLI commands)
pip install infrahouse-toolkit
# Install the core library
pip install infrahouse-core
The infrahouse-toolkit provides these commands:
| Command | Description |
|---|
ih-aws | General AWS utilities |
ih-certbot | SSL certificate management |
ih-ec2 | EC2 instance management |
ih-elastic | Elasticsearch management |
ih-github | GitHub API utilities |
ih-openvpn | OpenVPN server management |
ih-plan | Terraform plan with enhanced output |
ih-puppet | Puppet integration helpers |
ih-registry | Private Terraform registry operations |
ih-s3 | S3 bucket management |
ih-s3-reprepro | APT repository management in S3 |
ih-secrets | Secrets Manager operations |
ih-skeema | MySQL/MariaDB schema management |
Python Testing
Pytest plugins and fixtures for testing infrastructure code against real AWS.
Pytest fixtures for testing Terraform modules against real AWS infrastructure.
Usage
# conftest.py
pytest_plugins = ["pytest_infrahouse"]
# test_my_module.py
def test_my_terraform_module(ec2_client, terraform_apply):
"""Test that the module creates expected resources."""
terraform_apply("path/to/module")
instances = ec2_client.describe_instances()
assert len(instances["Reservations"]) > 0
Design Principles
All InfraHouse tools follow these principles:
Compliance Ready
Built for ISO 27001 and SOC 2. Monitoring, log retention, and encryption configured by default.
Observable
Integrated CloudWatch metrics, alarms, and SNS alerting. Know when something breaks before your customers do.
Composable
Tools work together seamlessly. Terraform modules use our Python libraries. Tests use our pytest fixtures.
Tested
Everything is tested against real AWS infrastructure. We don't ship code we haven't deployed.