Terraform
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 11,092 public repositories matching this topic...
Add basic CI
We already have some scripts in the scripts directory. It would be good to run them for every PR.
This is also a great task for beginners.
## Python/Regex fix
-
Updated
Nov 23, 2021 - Go
Currently there is no way to customize the terraform or terragrunt command you are running in each session when you go through the functions in terraform package, such as terraform.Apply or terraform.TgApplyAll if it isn't supported in terraform.Options. This is limiting if your code depends on flags like parallelism or terragrunt flags like --terragrunt-include-external-dependencies.
Hi. I am using v0.28.18 terragrunt.
I want to apply tf module in two different AWS regions. And I want to keep state for each region in different s3 keys like:
terragrunt-test/terraform-us-east-1.tfstate
terragrunt-test/terraform-us-east-2.tfstate
The only way I thought I could do that was using locals. My configurations:
###### account1.tfvars:
aws_profile = "account1"
aws_region =
-
Updated
Nov 23, 2021
See infracost/infracost#1135 and the follow-up comment for what's needed
centos 8.x 支持计划
centos 8.2 已经发布了,想了解下对 centos 8.x 的支持计划大概是怎样的,谢谢。
-
Updated
Nov 17, 2021 - Shell
-
Updated
Nov 22, 2021 - Go
Hello Team,
Here is the my current checkov_scan.yml file
name: Run Checkov action serverless
id: checkov1
uses: bridgecrewio/checkov-action@master
with:
#skip_check: CKV_AWS_23 # optional: skip a specific check_id
#quiet: true # optional: display only failed checks
#log_level: DEBUG # optional: set log level. Default WARNING
-
Updated
Nov 23, 2021 - Rust
-
Updated
Nov 22, 2021 - HTML
Community Note
- Please vote on this issue by adding a
👍 reaction to the original issue to help the community and maintainers prioritize this request - Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
- If you are inte
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Nov 22, 2021
-
Updated
Nov 11, 2021 - Go
-
Updated
Nov 24, 2021 - HCL
-
Updated
May 16, 2021
-
Updated
Nov 8, 2021 - Go
Description
We all have an aws_api_gateway_account resource inside each region of AWS that will by default output as unmanaged. We s
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 13 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia