Skip to content
#

terraform-module

terraform logo

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.

It uses configuration files to describe the components necessary to run a single application or your entire datacenter.

It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.

The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.

Here are 906 public repositories matching this topic...

fsacer
fsacer commented Jan 12, 2019

Metasploit install script not working with example as user is not root which makes this a single user install according to https://rvm.io/rvm/install this would mean you need to add
echo "source $HOME/.rvm/scripts/rvm" >> ~/.bash_profile
for it to source properly and re-source the bash profile or run the bash script as root.

This fails the install with

module.http_c2.azurerm_virtua
ykshatroff
ykshatroff commented Apr 8, 2020

The docs for DB identifier say:

The name of the RDS instance, if omitted, Terraform will assign a random, unique identifier

Unfortunately for me, it doesn't work:

The argument "identifier" is required, but no definition was found.

Moreover, there is nothing said about the restrictions on the identifier format: it can't be anything but alphanumeric due apparently to AWS API limitati

bsuv
bsuv commented May 26, 2018

https://github.com/terraform-aws-modules/terraform-aws-atlantis/blob/508eb0c3bb99a84dfe9fdbe57f1989be711f4197/main.tf#L186

When I tried to use atlantis plan or apply I found that it needed permissions for at least for (depending on the config files of course):

    • access to the backend (say S3)
    • access to IAM
      among others.

Initially I began by attaching existing policies, before I

tegamckinney
tegamckinney commented Aug 5, 2019

chart-repo.tf sets cluster_name = "${var.region}.${var.zone_name}" however when deploying kops module there is the ability to set cluster_name_prefix which overrides the default region name.

Other modules in the root-module set cluster_name the same way. Does it make sense to move the cluster_name_prefix logic to aws/kops-aws-platform or use some other ENV?

Created by Mitchell Hashimoto, HashiCorp

Released July 28, 2014

Latest release 13 days ago

Repository
hashicorp/terraform
Website
www.terraform.io
Wikipedia
Wikipedia

Related Topics

hashicorp infrastructure infrastructure-as-code
You can’t perform that action at this time.