Terraform
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 11,668 public repositories matching this topic...
Add basic CI
We already have some scripts in the scripts directory. It would be good to run them for every PR.
This is also a great task for beginners.
## Python/Regex fix
The cors_config.origin_override argument is shown in the example on the aws_cloudfront_response_headers_policy resource reference page. But the cors_config.origin_override is missing in the cors_config Argument Reference section.
I suggest adding MongoDB Atlas to the supported cloud as a feather.
Currently there is no way to customize the terraform or terragrunt command you are running in each session when you go through the functions in terraform package, such as terraform.Apply or terraform.TgApplyAll if it isn't supported in terraform.Options. This is limiting if your code depends on flags like parallelism or terragrunt flags like --terragrunt-include-external-dependencies.
Currently, terragrunt hclfmt will tell you if there are errors with your hcl file, but not display what they are if you are using --terragrunt-check flag. Example:
terragrunt hclfmt --terragrunt-check --terragrunt-log-level error
terraform fmt has this functionality with the -diff switch to show you what changes it would end up doing, which is great for CI and the end-user feedback l
-
Updated
Nov 23, 2021
The current blue links are sometimes not easy to read, e.g. see the first screenshot from a user vs the second screenshot from my terminal (iTerm2):
 enabled. There's no explanation given for this recommendation:
AWS has retired it from their Foundational Security Best Practices controls on August 31, 2021:
https://docs.aws.amazon.com/securityhub/latest/userguide/securi
-
Updated
Jan 3, 2022 - HTML
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Jan 8, 2022
-
Updated
Jan 8, 2022 - HCL
-
Updated
Jan 8, 2022 - Go
-
Updated
Dec 17, 2021 - Go
-
Updated
May 16, 2021
Description
We all have an aws_api_gateway_account resource inside each region of AWS that will by default output as unmanaged. We s
-
Updated
Jan 4, 2022 - Go
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 3 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia
