Skip to content
#

infrastructure-as-code

Here are 1,178 public repositories matching this topic...

jouve
jouve commented Jun 3, 2021

Description

let's say I have an apache process group I want to control.

  • when using supervisord.running, the name must be apache:* (which is the same notation used by supervisor)
  • when using supervisord.dead, the name must be apache: (without the *)

As both states mirror each other, I expect them to use the same convention for name, the one from running since it

knqyf263
knqyf263 commented Oct 19, 2020

Currently, Trivy traverses all paths and looks for all Gemfile.lock in a container image. However, the image sometimes has only Gemfile.lock and doesn't install gems listed in the Gemfile.lock. I think a gem should have *.gemspec file if it is installed. e.g. rake.gemspec has the information about rake.

To avoid false positives from Gemfile.lock, we are probably able to take advantage of `*

dan-lind
dan-lind commented Aug 9, 2021

I currently have a an API mapping key in the form of common-rest-api. Using the API mapping CDK construct to create a mapping like this results in an error message: An ApiMapping key may contain only letters, numbers and one of $-_.+!*'()

Reproduction Steps

const mapping = new ApiMapping(this, 'api-mapping', {
      api: this.api,
      domainName: this.domainName,
      apiMap
infracost
alikhajeh1
alikhajeh1 commented Jul 28, 2021

Running infracost breakdown --config-file infracost.yml --terraform-workspace=ali-test correctly shows:

Error: --config-file flag cannot be used with the following flags: --path, --terraform-*, --usage-file

Our help text mentions the same thing:
      --config-file string            Path to Infracost config file. Cannot be used with path, terraform* or usage-file flags

However,

aholler2
aholler2 commented Aug 10, 2021

Describe the bug
Python is evaluating the following input as true and therefore breaking on the next line. If I change the name of variable "omsagentAddonFinal" to say "dfasdfasdf", the test will run fine.

if "omsagent" in conf["properties"]["addonProfiles"]:
"addonProfiles": "[union(variables('omsagentAddonFinal'), variables('azurepolicyAddon'),variables('appgwIngr
terrascan
adegoodyer
adegoodyer commented Aug 11, 2021
  • terrascan version: 1.9.0
  • terraform version: 1.0.1

Enhancement Request

Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.

Extremely useful when running the tool without halting a pipeline for example.

I currently use a workaround, but something more concrete would be very desira

anguslees
anguslees commented Mar 21, 2018

Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.

That means we should use a Kubernetes label, not an annotation.

I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).

Improve this page

Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."

Learn more