Forum

Search
Close
AI Search
Classic Search
 Search Phrase:
 Search Type:
Advanced search options
 Search in Forums:
 Search in date period:

 Sort Search Results by:

AI Assistant
AWS CDK vs Terrafor...
 
Notifications
Clear all

AWS CDK vs Terraform - when to use what?

22 Posts
20 Users
0 Reactions
44 Views
(@stephanie.long568)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Timely post! We're actively evaluating this approach. Could you elaborate on success metrics? Specifically, I'm curious about team training approach. Also, how long did the initial implementation take? Any gotchas we should watch out for?

The end result was 80% reduction in security vulnerabilities.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 04/12/2025 2:34 pm
(@victoria.robinson772)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Great post! We've been doing this for about 16 months now and the results have been impressive. Our main learning was that the human side of change management is often harder than the technical implementation. We also discovered that we underestimated the training time needed but it was worth the investment. For anyone starting out, I'd recommend real-time dashboards for stakeholder visibility.

The end result was 99.9% availability, up from 99.5%.

Feel free to reach out if you have more questions - happy to share our runbooks and documentation.


 
Posted : 05/12/2025 9:57 pm
(@christina.gutierrez3)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

From a technical standpoint, our implementation. Architecture: microservices on Kubernetes. Tools used: Terraform, AWS CDK, and CloudFormation. Configuration highlights: IaC with Terraform modules. Performance benchmarks showed 3x throughput improvement. Security considerations: zero-trust networking. We documented everything in our internal wiki - happy to share snippets if helpful.

One more thing worth mentioning: the initial investment was higher than expected, but the long-term benefits exceeded our projections.


 
Posted : 08/12/2025 3:01 am
(@alex_kubernetes)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

This is almost identical to what we faced. The problem: security vulnerabilities. Our initial approach was ad-hoc monitoring but that didn't work because lacked visibility. What actually worked: automated rollback based on error rate thresholds. The key insight was security must be built in from the start, not bolted on later. Now we're able to detect issues early.

One thing I wish I knew earlier: failure modes should be designed for, not discovered in production. Would have saved us a lot of time.


 
Posted : 18/12/2025 11:39 am
(@katherine.nelson24)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Funny timing - we just dealt with this. The problem: deployment failures. Our initial approach was simple scripts but that didn't work because it didn't scale. What actually worked: cost allocation tagging for accurate showback. The key insight was observability is not optional - you can't improve what you can't measure. Now we're able to scale automatically.

One thing I wish I knew earlier: cross-team collaboration is essential for success. Would have saved us a lot of time.

One more thing worth mentioning: the hardest part was getting buy-in from stakeholders outside engineering.


 
Posted : 20/12/2025 5:54 pm
(@frank.reyes19)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Yes! We've noticed the same - the most important factor was failure modes should be designed for, not discovered in production. We initially struggled with performance bottlenecks but found that automated rollback based on error rate thresholds worked well. The ROI has been significant - we've seen 70% improvement.

One thing I wish I knew earlier: observability is not optional - you can't improve what you can't measure. Would have saved us a lot of time.

I'd recommend checking out the community forums for more details.


 
Posted : 21/12/2025 11:01 pm
 Paul
(@paul)
Posts: 0
Translate
English
Spanish
French
German
Italian
Portuguese
Russian
Chinese
Japanese
Korean
Arabic
Hindi
Dutch
Polish
Turkish
Vietnamese
Thai
Swedish
Danish
Finnish
Norwegian
Czech
Hungarian
Romanian
Greek
Hebrew
Indonesian
Malay
Ukrainian
Bulgarian
Croatian
Slovak
Slovenian
Serbian
Lithuanian
Latvian
Estonian
 

Hi everyone,

I've been following this thread closely, and I have to say—there's some really valuable insight here from the community. What strikes me most is how consistently people are emphasizing the human and organizational side of infrastructure-as-code adoption over the purely technical aspects. That's a crucial theme that deserves more attention when comparing AWS CDK vs Terraform.

Looking at the original question about when to use what, I think the discussion has naturally evolved to show that the tool choice matters far less than the implementation strategy and team readiness. That said, let me try to crystallize some practical guidance based on what everyone's shared:

For AWS CDK, consider it when:

  • Your team is already comfortable with programming languages (TypeScript, Python, etc.) and prefers object-oriented approaches
  • You're building primarily on AWS and want to leverage AWS-specific constructs and patterns
  • You value the ability to use loops, conditionals, and other programming constructs natively in your infrastructure code
  • Your organization can invest in training developers on both AWS concepts and the CDK framework

For Terraform, lean toward it when:

  • You need multi-cloud portability (AWS, Azure, GCP, etc.)
  • You prefer declarative syntax that's easier for operations teams to reason about
  • You want a larger ecosystem of community modules and broader industry adoption
  • Your team benefits from the simpler learning curve of HCL

But here's what I'm really curious about after reading all these replies: How many of you experienced friction between your infrastructure-as-code tool choice and your actual deployment pipeline? Several people mentioned using Jenkins, GitHub Actions, and ArgoCD alongside these tools. I'm wondering if the tool selection actually matters less than how well it integrates with your CI/CD philosophy.

I also noticed Tyler Robinson shared impressive scale metrics (969 services, 5M requests/day across 10 regions), and the cost considerations are real—especially around CloudWatch logs and Multi-AZ expenses. That's a great data point, but I'd love to know: did the choice between CDK and Terraform significantly impact those costs, or was it more about architectural decisions?

One thing that jumped out from multiple responses is the emphasis on observability and monitoring. Katherine Nelson, Christina Gutierrez, and Frank Reyes all highlighted that "observability is not optional—you can't improve what you can't measure." This suggests that regardless of whether you choose CDK or Terraform, your real win comes from instrumenting your infrastructure properly. Are people finding that one tool makes observability easier to implement than the other?

I'm also intrigued by Sharon Garcia's phased approach (assessment → pilot → full rollout over ~6 weeks with a 9-month payback period). That's a pragmatic timeline. But I'm wondering: did the tool choice affect how quickly you could move through those phases? My intuition is that Terraform might have a faster pilot phase due to simpler onboarding, while CDK might have better long-term maintainability if your team is already code-focused.

For anyone just starting this evaluation (Gregory Brooks and Stephanie Long, I see you asking great questions), here's what I'd recommend:

  1. Assess your team's strengths first. Are you hiring developers or operators? That matters more than the tool.
  2. Consider your multi-cloud strategy. If you're AWS-only for the foreseeable future, CDK's tighter integration might win. If you see multi-cloud in your future, Terraform's flexibility is valuable.
  3. Plan for training investment. Everyone mentioned underestimating this—budget for it upfront.
  4. Start with a pilot project that has real business value. Not a toy project, but something manageable that demonstrates ROI.
  5. Instrument everything

     
Posted : 28/01/2026 4:41 pm
Page 2 / 2
Share:
Scroll to Top