infrastructure-as-code
Here are 1,242 public repositories matching this topic...
Describe the solution you'd like
It would be nice to have a way to control whether a VM starts on boot or not. Maybe a new autostart option to salt.states.virt.running and/or salt.states.virt.defined? Or maybe a new function?
Describe alternatives you've considered
I'll probably use salt.modules.virt.set_autostart for now.
-
Updated
Oct 13, 2021 - Go
Currently trivy can find package-lock.json and process it, looking for vulnerabilities. It would be nice if it could process pnpm-lock.yaml files too
This is to bring feature parity between LinuxBuildImage (https://docs.aws.amazon.com/cdk/api/latest/docs/@aws-cdk_aws-codebuild.LinuxBuildImage.html#static-fromwbrecrwbrrepositoryrepository-tag) and LinuxGpuBuildImage (https://docs.aws.amazon.com/cdk/api/latest/docs/@aws-cdk_aws-codebuild.LinuxGpuBuildImage.html).
Specifically, add the fromEcrRepository method in this class.
Use Ca
-
Updated
Oct 13, 2021 - Java
-
Updated
Oct 11, 2021 - Go
-
Updated
Sep 25, 2021 - Go
The current CloudFront output is 50 lines, it's too complicated:
aws_cloudfront_distribution.my_cf
├─ Field level encryption requests Monthly cost depends on usage: $0.02 per 10k requests
├─ Real-time log requests Monthly cost depends on usage: $0.01 per 1M lines
├─ Dedicated IP custom
-
Updated
Oct 12, 2021 - Go
Describe the bug
Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
FAILED for resource: aws_network_acl.elasticache
File: /tfplan.json:2623-2683
Guide: https://docs.bridgecrew.io/docs/ensure-that-all-nacl-are-attached-to-subnets
2624 | "values": {
2625 | "arn": "arn:aws:ec2:us-east-1:907320361432:network-acl/acl-0ed5xxxx42a675e",
2626 |
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Oct 5, 2021
-
Updated
Oct 12, 2021 - Python
-
Updated
Oct 11, 2021 - Go
-
Updated
Oct 11, 2021 - Python
-
Updated
May 16, 2021
-
Updated
Oct 13, 2021 - JavaScript
Copilot doesn't seem to have correct error behavior when I try to create a Scheduled Job with the same name as an existing service.
For example, in my app right now I have the following:
❯ copilot svc ls
Name Type
---- ----
fe Load Balanced Web Service
I can see this in SSM:
❯ aws ssm get-parameter --name /copilot/applicatio
Description
For the non-deep mode, which is the default driftctl scan command, we display every time all the information about "unmanaged", "deleted", "drifted", "managed" resources, and the coverage.
It's quite unhelpful here to display the "drifted" resources since it would be ALL THE TIME equal to 0.
Example
Found 14 resource(s)
- 21% coverage
- 3 resource(s) managed
-
Updated
Oct 8, 2021 - Go
-
Updated
Sep 21, 2021 - JavaScript
-
Updated
Aug 29, 2021 - HCL
-
Updated
Sep 30, 2020 - Go
-
Updated
May 8, 2021 - Markdown
-
Updated
Mar 14, 2021 - Ruby
-
Updated
Oct 5, 2021 - Go
-
Updated
Feb 27, 2018 - HCL
Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.
That means we should use a Kubernetes label, not an annotation.
I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).
-
Updated
Apr 6, 2021 - HCL
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."