Terraform
Terraform can manage existing and popular service providers, such as AWS, as well as custom in-house solutions.
It uses configuration files to describe the components necessary to run a single application or your entire datacenter.
It generates an execution plan describing what will happen to reach the desired state, and afterwards executes it to build the desired infrastructure. As the configuration changes, Terraform is able to determine the changes and create incremental execution plans which can be applied.
The infrastructure Terraform can manage includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS (Domain Name Service) entries, SaaS (Software as a Service) features.
Here are 12,784 public repositories matching this topic...
Add basic CI
We already have some scripts in the scripts directory. It would be good to run them for every PR.
This is also a great task for beginners.
## Python/Regex fix
I suggest adding MongoDB Atlas to the supported cloud as a feather.
-
Updated
Apr 8, 2022 - Shell
Add a monthly_replicated_write usage parameters to AWS [RDS Cluster] (https://github.com/infracost/infracost/blob/master/internal/resources/aws/rds_cluster.go) to track charges for Replicated Write I/Os (see https://aws.amazon.com/rds/aurora/pricing/#Database_Storage_and_IOs)
General Availability (GA) for docker compose v2 is "Almost There". With GA we could consider upgrading docker compose examples (sample project and [test](https://github.com/
Hi, I've set TERRAGRUNT_CONFIG=.terragrunt.hcl.
So my root and leaf folders have this .terragrunt.hcl file.
Everything works well when I'm trying to run terragrunt from child folder, but I get "Could not find any subfolders with Terragrunt configuration files" error when trying to run from terragrunt run-all plan from root. Renaming .terragrunt.hcl -> terragrunt.hcl fixes the issue, but I w
-
Updated
Nov 23, 2021
-
Updated
Apr 8, 2022 - Shell
-
Updated
Apr 7, 2022 - Go
-
Updated
Apr 8, 2022 - Go
Describe the issue
I wouldn't expect to get the alert if not defined explicitly.
Examples
https://github.com/hashicorp/terraform-provider-google/releases/tag/v4.0.0
Version (please complete the following information):
- Checkov Version 2.0.780
-
Updated
Apr 6, 2022 - HTML
-
Updated
Mar 11, 2022 - TypeScript
I feel the need to document the use case where you need to link an azure function to the cosmos DB database using the connection string.
Assume you have declared a cosmosdb resource in your TF script like this
resource "azurerm_cosmosdb_account" "db" {
..
}
and now you want to define the connection string in you your azure function:
resource "azurerm_function_app" "fun
- terrascan version: 1.9.0
- terraform version: 1.0.1
Enhancement Request
Other security scanning tools (e.g. checkov and tfsec) have a --soft-fail flag or equivalent option that allows you to always exit with 0 status.
Extremely useful when running the tool without halting a pipeline for example.
I currently use a workaround, but something more concrete would be very desira
-
Updated
Apr 2, 2022
-
Updated
Apr 9, 2022 - HCL
-
Updated
Jan 8, 2022 - Go
-
Updated
Apr 9, 2022 - Ruby
-
Updated
Jan 26, 2022 - Go
-
Updated
Apr 6, 2022
Created by Mitchell Hashimoto, HashiCorp
Released July 28, 2014
Latest release 3 days ago
- Repository
- hashicorp/terraform
- Website
- www.terraform.io
- Wikipedia
- Wikipedia

