Terraform On AWS for EC2, VPC, ASG, ALB, CLB, NLB, CloudWatch, SNS, S3, CodePipeline, ACM, Route53
-
Updated
Oct 7, 2023 - HCL
Terraform On AWS for EC2, VPC, ASG, ALB, CLB, NLB, CloudWatch, SNS, S3, CodePipeline, ACM, Route53
Terraform Cloud and Sentinel Policies Demo
HashiCorp Certified Terraform Associate on Azure Cloud
Terraform On AWS for EC2, VPC, ASG, ALB, CLB, NLB, CloudWatch, SNS, S3, CodePipeline, ACM, Route53
This project creates resources for a Terraform backend on S3 / DynamoDB and migrates its own state to the default workspace.
AWS S3 Bucket for Terraform State with Replication, Permission-Set Access, Multi-Account
Tooling to deploy an AWS backend for Terraform, using Ansible and CloudFormation
Continuous Deployment to Kubernetes cluster with GitHub Actions with S3 backend and DynamoDB state file locking
yet another http state storage for Terraform
Go CLI to copy terraform state file from one terraform cloud workspace to another
This project demonstrates how to set up a Terraform backend configuration option in Terraform that allows us to store and manage the state files of our infrastructure in a secure remote location with versioning and state locking using AWS S3 for remote storage and AWS DynamoDB for state locking.
Zero-Trust @hashicorp Terraform state backend
A cloudflare worker for storing terraform state using HTTP backend
Terraform module to provision Terraform state bucket, lock table and user to provision future infrastructure.
Terraform State Storage API
Sets up an S3 Bucket and DynamoDB to store Terraform State and Lock table.
Using AWS S3 as a Remote State Backend for Terraform
Add a description, image, and links to the terraform-state topic page so that developers can more easily learn about it.
To associate your repository with the terraform-state topic, visit your repo's landing page and select "manage topics."