Terraform

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 12,274 public repositories matching this topic...
Add basic CI
We already have some scripts in the scripts
directory. It would be good to run them for every PR.
This is also a great task for beginners.
## Python/Regex fix
I suggest adding MongoDB Atlas to the supported cloud as a feather.
General Availability (GA) for docker compose v2 is "Almost There". With GA we could consider upgrading docker compose examples (sample project and [test](https://github.com/
I'm looking to integrate Terragrunt with my CI/CD system and I like the output that Terragrunt provides at the start of a run-all:
Group 1
- Module A
- Module B
- Module C
- Module D
Group 2
- Module E
Group 3
- Module F
- Module G
- etc...
If an option could be added to only return this output, I could parse it during something like a Jenkins build pipeline to build check poin
Add a monthly_replicated_write
usage parameters to AWS [RDS Cluster] (https://github.com/infracost/infracost/blob/master/internal/resources/aws/rds_cluster.go) to track charges for Replicated Write I/Os (see https://aws.amazon.com/rds/aurora/pricing/#Database_Storage_and_IOs)
Manually keeping all dependencies up to date can be a time consuming task which can easily be automated.
One possible solution for this is renovatebot which periodically checks for new versions and can create a pull request for each update found.
It can easily be deployed on kubernetes via helm and works with [gite
-
Updated
Nov 23, 2021
-
Updated
Feb 16, 2022 - Shell
-
Updated
Feb 22, 2022 - Go
Is your feature request related to a problem? Please describe.
I want to be able to disable a whole level of violation. For example the low error level i want to disable but still run the checks on medium, high, critical.
Describe the solution you'd like
I would like to have this possible with a simple flag in the ci to do this. To disable the violation level : low, etc. that when yo
Describe the issue
I wouldn't expect to get the alert if not defined explicitly.
Examples
https://github.com/hashicorp/terraform-provider-google/releases/tag/v4.0.0
Version (please complete the following information):
- Checkov Version 2.0.780
-
Updated
Feb 19, 2022 - TypeScript
-
Updated
Feb 15, 2022 - HTML
Community Note
- Please vote on this issue by adding a
👍 reaction to the original issue to help the community and maintainers prioritize this request - Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do
-
Updated
Feb 22, 2022 - Go
-
Updated
Feb 22, 2022
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov
and tfsec
) have a --soft-fail
flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Feb 22, 2022 - HCL
-
Updated
Jan 8, 2022 - Go
-
Updated
Feb 22, 2022 - Ruby
-
Updated
Jan 26, 2022 - Go
-
Updated
May 16, 2021
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 6 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia