infrastructure-as-code
Here are 1,236 public repositories matching this topic...
Describe the solution you'd like
It would be nice to have a way to control whether a VM starts on boot or not. Maybe a new autostart option to salt.states.virt.running and/or salt.states.virt.defined? Or maybe a new function?
Describe alternatives you've considered
I'll probably use salt.modules.virt.set_autostart for now.
-
Updated
Oct 7, 2021 - Go
Currently trivy can find package-lock.json and process it, looking for vulnerabilities. It would be nice if it could process pnpm-lock.yaml files too
According to the documentation:
"AWS Systems Manager Agent (SSM Agent) is preinstalled, by default, on the following Amazon Machine Images (AMIs):
Windows Server 2008-2012 R2 AMIs published in November 2016 or later
Windows Server 2016 and 2019"
However, the version mentioned in the issue does not support SSM. When I create the instance us
-
Updated
Oct 7, 2021 - Java
-
Updated
Oct 6, 2021 - Go
-
Updated
Sep 25, 2021 - Go
For most of my resources, most of the cost components have 0 usage. (Example: S3 bucket using standard storage, no Glacier, no infrequent/frequent access, etc).
When I have known 0 usage, I put a 0 in the YAML file; however, the Infracost output still displays these items with a cost of $0. It would be nice to skip these items (which have a quantity of 0) because they do not contribute at all t
-
Updated
Oct 6, 2021 - Go
Describe the bug
Check: CKV2_AWS_1: "Ensure that all NACL are attached to subnets"
FAILED for resource: aws_network_acl.elasticache
File: /tfplan.json:2623-2683
Guide: https://docs.bridgecrew.io/docs/ensure-that-all-nacl-are-attached-to-subnets
2624 | "values": {
2625 | "arn": "arn:aws:ec2:us-east-1:907320361432:network-acl/acl-0ed5xxxx42a675e",
2626 |
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Oct 5, 2021
-
Updated
Oct 1, 2021 - Python
-
Updated
Oct 5, 2021 - Go
-
Updated
Sep 29, 2021 - Python
-
Updated
May 16, 2021
-
Updated
Sep 30, 2021 - JavaScript
Copilot doesn't seem to have correct error behavior when I try to create a Scheduled Job with the same name as an existing service.
For example, in my app right now I have the following:
❯ copilot svc ls
Name Type
---- ----
fe Load Balanced Web Service
I can see this in SSM:
❯ aws ssm get-parameter --name /copilot/applicatio
Description
For the non-deep mode, which is the default driftctl scan command, we display every time all the information about "unmanaged", "deleted", "drifted", "managed" resources, and the coverage.
It's quite unhelpful here to display the "drifted" resources since it would be ALL THE TIME equal to 0.
Example
Found 14 resource(s)
- 21% coverage
- 3 resource(s) managed
-
Updated
Oct 5, 2021 - Go
-
Updated
Sep 21, 2021 - JavaScript
-
Updated
Aug 29, 2021 - HCL
-
Updated
Sep 30, 2020 - Go
-
Updated
May 8, 2021 - Markdown
-
Updated
Mar 14, 2021 - Ruby
-
Updated
Feb 27, 2018 - HCL
Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.
That means we should use a Kubernetes label, not an annotation.
I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).
-
Updated
Oct 5, 2021 - Go
-
Updated
Apr 6, 2021 - HCL
Improve this page
Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."