terraform-provider-aws
terraform-provider-lastpass
Our great sponsors
terraform-provider-aws | terraform-provider-lastpass | |
---|---|---|
98 | 1 | |
9,410 | 61 | |
2.5% | - | |
10.0 | 0.0 | |
about 13 hours ago | 11 months ago | |
Go | Go | |
Mozilla Public License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terraform-provider-aws
-
Authorization and Amazon Verified Permissions - A New Way to Manage Permissions Part XII: Terraform
If we check the support for the Terraform AWS Provider here (state for the date of publishing this article), we will see that the service is not yet fully supported. Last week, after more than half a year, support for creating a policy store was added. Additionally, we have the configuration to add template policies. However, the identity source is in the form of a PR draft, and there is no PR yet for the ability to create policies.
- 10 Ways for Kubernetes Declarative Configuration Management
-
HashiCorp silently amend Terraform Registry TOS
https://github.com/hashicorp/terraform-provider-aws/issues/3...
The size is what you get when you add every single AWS Go client into one binary.
Each service client like 1-2MB. But when you have 200 services....
-
A Cloud Development Troubleshooting Treasure Hunt
Well, at least we now have a promising lead. Some diligent googling and browsing through Github issues in the AWS provider project yielded no directly related findings. However, I did come across a few recent bug reports about the recent change AWS made regarding the treatment of public buckets. And interestingly, they described precisely the behavior I was encountering.
-
Converting Full Terraform Programs to Pulumi
> We're coming up on 10000 resources in our main Terraform repository and while there is definitely some friction, it's overall much better than having to hit the cloud API's to gather each of those states which would probably take at least an order of magnitude longer.
I don't think that's necessary true. Most cloud API's actually can return hundreds of records with 1 API calls, e.g. https://docs.aws.amazon.com/elasticloadbalancing/latest/APIR... has a maximum page size of 400.
If I manage the cloud resources via some custom tools and/or with some ansible-fu, I can decide to batch the API calls when it makes sense.
With terraform, it is not possible to do so (https://github.com/hashicorp/terraform-plugin-sdk/issues/66, https://github.com/hashicorp/terraform-provider-aws/issues/2...).
-
HEADS UP: Terraform AWS Provider 5.0.0
Release notes - https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.0.0
The only footgun I know of is changing the behavior of RDS instances created from snapshots. Force replacement on snapshot_identifier change for DB cluster resources will fuck up your world if you use a data source for snapshot_identifier since yesterday it would ignore any updates and today it will happily destroy your database (and, because AWS, all of the automated snapshots thereof) when the data identifier changes out from under it. 🎉
-
Any tools out there, or better ways, to unit test IAM policy documents?
A while back I wrote a PR for the AWS provider to expose the policy simulator directly inside Terraform: https://github.com/hashicorp/terraform-provider-aws/pull/25569
-
Weird warning after running pulumi preview
The reason you see that is because the AWS Classic provider (pulumi_aws) is built on top of the open-source terraform-provider-aws (via the Terraform bridge you identified), and terraform-provider-aws is emitting that notice at runtime. Not all Pulumi providers are built from Terraform providers, however, but some, like this one, still are. (There's a notice at the bottom of the page for each resource where this is the case.) It works like this:
-
Script or software that automatically populate specific profile in ~/.aws/credentials
See: * https://github.com/hashicorp/terraform-provider-aws/issues/10491 * https://github.com/Sceptre/sceptre/issues/674
terraform-provider-lastpass
We haven't tracked posts mentioning terraform-provider-lastpass yet.
Tracking mentions began in Dec 2020.
What are some alternatives?
crossplane - The Cloud Native Control Plane
cognito-custom-email-sender-lambda - AWS Cognito custom email sender Lambda trigger
rover - Interactive Terraform visualization. State and configuration explorer.
terraform-provider-opsgenie - Terraform OpsGenie provider
terraform-provider-snowflake - Terraform provider for managing Snowflake accounts
terraform-provider-azurerm - Terraform provider for Azure Resource Manager
semgrep - Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
k8s-vault-webhook - A k8s vault webhook is a Kubernetes webhook that can inject secrets into Kubernetes resources by connecting to multiple secret managers
zeal - Offline documentation browser inspired by Dash
terraform - Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
dash-contrib-docset-feeds - A collection of Dash's user contributed docset feed for using with Zeal
terraform-exec - Terraform CLI commands via Go.