Skip to content
#

Terraform

terraform logo

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.

It uses configuration files to describe the components necessary to run a single application or your entire datacenter.

It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.

The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.

Here are 7,100 public repositories matching this topic...

terraform
rgl
rgl commented Aug 14, 2020

I'm trying to use nbering/terraform-provider-ansible by placing it in ~/.terraform.d/plugins/linux_amd64/terraform-provider-ansible, but terraform init never seems to actually find it (NB this works fine in 0.12.x). Why is that?

Can 0.13 actually load plugins from local file-system directories (as [described in the documentation](

surister
surister commented Jan 21, 2020

This is a reminder for me or a task if anyone wants :P

imagen

Basically, The last two questions aren't really regex's questions.

To do:

  • Move said questions to correct place.
  • Add new regex questions (Python related!)?
  • Maybe add a new ## Regex section, as it is a valuable skill
itssimon
itssimon commented May 6, 2020

PR o'clock

Description

  1. Add ingress rule to workers and cluster security groups to allow Fargate pods to communicate with EC2 nodes
  2. Allow EKS Fargate profiles to be created via input eks_fargate_profiles = [...]. This also creates an IAM role for pod execution and extends the aws-auth ConfigMap.

Checklist

  • CI tests are passing
  • README.md has been updated aft
blast-radius
28mm
28mm commented Jan 25, 2018

Blast Radius , when launched in --serve mode, does some pretty weak error reporting, and does nothing to help users resolve problems. It asks the user to look into several possible issues, rather than checking itself...

To observe the current (undesired) behavior, run Blast Radius in an empty directory:

[...]$ mkdir tmp
[...]$ cd tmp
[...]$ blast-radius --serve

A short

Created by Mitchell Hashimoto, HashiCorp

Released July 28, 2014

Latest release 2 days ago

Repository
hashicorp/terraform
Website
www.terraform.io
Wikipedia
Wikipedia

Related Topics

hashicorp infrastructure infrastructure-as-code
You can’t perform that action at this time.