-
Updated
Apr 20, 2021 - Go
Terraform
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 8,964 public repositories matching this topic...
-
Updated
Feb 24, 2021
I am having a project structure as follows:
.
├── README.md
├── modules
│ ├── function-app-consumption
│ │ ├── locals.tf
│ │ ├── main.tf
│ │ ├── output.tf
│ │ └── variables.tf
│ └── storage-account
│ ├── main.tf
│ ├── output.tf
│ └── variables.tf
└── sandbox
├── eastus
│ ├── regional.tfvars
│ ├── functionapp-svc
│ │ └─
Requesting that you add the new Gitlab Provider as a new VCS Provider.
See here for the provider details: https://registry.terraform.io/providers/gitlabhq/gitlab/latest
centos 8.x 支持计划
centos 8.2 已经发布了,想了解下对 centos 8.x 的支持计划大概是怎样的,谢谢。
-
Updated
Feb 16, 2021 - Shell
-
Updated
Apr 19, 2021 - Rust
-
Updated
Apr 15, 2021 - HTML
-
Updated
Apr 19, 2021 - Go
Describe the bug
CKV_GCP_14 requires a backup configuration, but it does not take into consideration read replicas.
A read replica cannot have backup enabled in GCP.
To Reproduce
Steps to reproduce the behavior:
- Create a google_sql_database_instance with master_instance_name and replica_configuration
- Chekov will pop up error CKV_GCP_14
Expected behavior
Read replicas
-
Updated
Apr 9, 2021
-
Updated
Apr 18, 2021 - Go
Currently both Python templates use an override to specify a remote backend for Terraform state:
stack.add_override('terraform.backend', {
'remote': {
'hostname': 'app.terraform.io',
'organization': '${organizationName}',
'workspaces': {
'name': PR o'clock
Description
Resolves #774
The change is intended to improve the ability to manage worker groups using maps. Which should allow to more flexibly add/remove worker groups (improve this: https://github.com/terraform-aws-modules/terraform-aws-eks/blob/master/docs/faq.md#how-do-i-safely-remove-old-worker-groups).
The change includes suggested in #774 changes which include:
-
Updated
Sep 16, 2020
- terrascan version: 1.2
- Operating System: all
Description
When scanning a repo, if the severity field is not all caps (HIGH|MEDIUM|LOW), when violations are output, the color of the severity field does not show up. The compare should be case-insensitive, OR we can normalize the severity field.
What I Did
terrascan scan -d [dir]
-
Updated
Apr 19, 2021 - HCL
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 6 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia
This is a reminder for me or a task if anyone wants :P
Basically, The last two questions aren't really regex's questions.
To do: