Terraform

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 10,616 public repositories matching this topic...
## Python/Regex fix
This is a reminder for me or a task if anyone wants :P
Basically, The last two questions aren't really regex's questions.
To do:
- Move said questions to correct place.
- Add new regex questions (Python related!)?
- Maybe add a new ## Regex section, as it is a valuable skill
-
Updated
Oct 11, 2021 - Go
-
Updated
Oct 13, 2021 - Go
-
Updated
May 25, 2021
The current CloudFront output is 50 lines, it's too complicated:
aws_cloudfront_distribution.my_cf
├─ Field level encryption requests Monthly cost depends on usage: $0.02 per 10k requests
├─ Real-time log requests Monthly cost depends on usage: $0.01 per 1M lines
├─ Dedicated IP custom
centos 8.x 支持计划
centos 8.2 已经发布了,想了解下对 centos 8.x 的支持计划大概是怎样的,谢谢。
-
Updated
Oct 5, 2021 - Shell
-
Updated
Oct 12, 2021 - Go
-
Updated
Oct 13, 2021 - Rust
Describe the bug
Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
FAILED for resource: aws_network_acl.elasticache
File: /tfplan.json:2623-2683
Guide: https://docs.bridgecrew.io/docs/ensure-that-all-nacl-are-attached-to-subnets
2624 | "values": {
2625 | "arn": "arn:aws:ec2:us-east-1:907320361432:network-acl/acl-0ed5xxxx42a675e",
2626 |
-
Updated
Oct 9, 2021 - HTML
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov
and tfsec
) have a --soft-fail
flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Oct 5, 2021
-
Updated
Oct 6, 2021 - Go
-
Updated
Oct 13, 2021 - HCL
-
Updated
May 16, 2021
-
Updated
Oct 9, 2021 - Go
Description
For the non-deep mode, which is the default driftctl scan
command, we display every time all the information about "unmanaged", "deleted", "drifted", "managed" resources, and the coverage.
It's quite unhelpful here to display the "drifted" resources since it would be ALL THE TIME equal to 0.
Example
Found 14 resource(s)
- 21% coverage
- 3 resource(s) managed
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 14 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia