Skip to content
#

Terraform

terraform logo

Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.

It uses configuration files to describe the components necessary to run a single application or your entire datacenter.

It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.

The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.

Here are 10,113 public repositories matching this topic...

devops-exercises
surister
surister commented Jan 21, 2020

This is a reminder for me or a task if anyone wants :P

imagen

Basically, The last two questions aren't really regex's questions.

To do:

  • Move said questions to correct place.
  • Add new regex questions (Python related!)?
  • Maybe add a new ## Regex section, as it is a valuable skill
malcolm061990
malcolm061990 commented Mar 30, 2021

Hi. I am using v0.28.18 terragrunt.
I want to apply tf module in two different AWS regions. And I want to keep state for each region in different s3 keys like:
terragrunt-test/terraform-us-east-1.tfstate
terragrunt-test/terraform-us-east-2.tfstate

The only way I thought I could do that was using locals. My configurations:

###### account1.tfvars:
aws_profile = "account1"
aws_region  =
infracost
alikhajeh1
alikhajeh1 commented Aug 28, 2021

I noticed the name/email output was doubled:

C:\infracost>infracost.exe register
Please enter your name and email address to get an API key.
See our FAQ (https://www.infracost.io/docs/faq) for more details.
Name: Txxxxr
Name: Txxxxr
Email: xxxx@gmail.com
Email: xxxx@gmail.com

Thank you Txxxxxr!
Your API key is: xxxx
ejohn20
ejohn20 commented Aug 19, 2021

Uploading the SARIF formatted output to the GH repo fails. It does not appear to be valid SARIF according to the parser. Using the github/codeql-action/upload-sarif@v1 produces an error message with invalid data.

To Reproduce
Steps to reproduce the behavior:

  1. Create a GH Action with the following steps to run the checkov scan and generate a checkov.sarif results file:
- name
terraform-cdk
terrascan
adegoodyer
adegoodyer commented Aug 11, 2021
  • terrascan version: 1.9.0
  • terraform version: 1.0.1

Enhancement Request

Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.

Extremely useful when running the tool without halting a pipeline for example.

I currently use a workaround, but something more concrete would be very desira

Created by Mitchell Hashimoto, HashiCorp

Released July 28, 2014

Latest release 13 days ago

Repository
hashicorp/terraform
Website
www.terraform.io
Wikipedia
Wikipedia

Related Topics

hashicorp infrastructure infrastructure-as-code