-
Updated
Aug 17, 2021 - Go
Terraform

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 10,011 public repositories matching this topic...
-
Updated
Aug 17, 2021 - Go
Hi. I am using v0.28.18 terragrunt.
I want to apply tf module in two different AWS regions. And I want to keep state for each region in different s3 keys like:
terragrunt-test/terraform-us-east-1.tfstate
terragrunt-test/terraform-us-east-2.tfstate
The only way I thought I could do that was using locals. My configurations:
###### account1.tfvars:
aws_profile = "account1"
aws_region =
-
Updated
May 25, 2021
Running infracost breakdown --config-file infracost.yml --terraform-workspace=ali-test
correctly shows:
Error: --config-file flag cannot be used with the following flags: --path, --terraform-*, --usage-file
Our help text mentions the same thing:
--config-file string Path to Infracost config file. Cannot be used with path, terraform* or usage-file flags
However,
centos 8.x 支持计划
centos 8.2 已经发布了,想了解下对 centos 8.x 的支持计划大概是怎样的,谢谢。
-
Updated
Aug 5, 2021 - Shell
-
Updated
Aug 17, 2021 - Rust
-
Updated
Aug 17, 2021 - Go
Describe the bug
Python is evaluating the following input as true and therefore breaking on the next line. If I change the name of variable "omsagentAddonFinal" to say "dfasdfasdf", the test will run fine.
if "omsagent" in conf["properties"]["addonProfiles"]:
"addonProfiles": "[union(variables('omsagentAddonFinal'), variables('azurepolicyAddon'),variables('appgwIngr
-
Updated
Aug 15, 2021 - HTML
-
Updated
Aug 16, 2021
-
Updated
Aug 17, 2021 - HCL
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov
and tfsec
) have a --soft-fail
flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
May 16, 2021
Description
To complete #554, it can make sense to add resource source details for missing resources
Example
Follow pull-request attached to issues #874 #875 #876 for examples of implementation
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 13 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia
This is a reminder for me or a task if anyone wants :P
Basically, The last two questions aren't really regex's questions.
To do: