サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
2025年ランキング
developer.hashicorp.com
Dynamically generate X.509 certificates with the PKI secrets engine plugin.
Hands-on: Try the Reuse Configuration with Modules tutorials. A module is a container for multiple resources that are used together. You can use modules to create lightweight abstractions, so that you can describe your infrastructure in terms of its architecture, rather than directly in terms of physical objects. The .tf files in your working directory when you run terraform plan or terraform appl
This assumes we have a bucket created called mybucket. The Terraform state is written to the key path/to/my/key. Note that for the access credentials we recommend using a partial configuration. State StorageThe S3 backend stores state data in an S3 object at the path set by the key parameter in the S3 bucket indicated by the bucket parameter. Using the example shown above, the state would be store
This guide is meant for enterprise users looking to advance their Terraform usage from a few individuals to a full organization. For Terraform code style recommended practices, refer to the Terraform style guide. IntroductionHashiCorp specializes in helping IT organizations adopt cloud technologies. Based on what we've seen work well, we believe the best approach to provisioning is collaborative i
This topic contains reference information about the environment variables you can use with the Terraform CLI. IntroductionTerraform refers to a number of environment variables to customize various aspects of its behavior. None of these environment variables are required when using Terraform, but you can use them to change some of Terraform's default behaviors or to increase output verbosity for de
Policy as code is the idea of writing code in a high-level language to manage and automate policies. By representing policies as code in text files, proven software development best practices can be adopted such as version control, automated testing, and automated deployment. Many existing policy or ACL systems do not practice policy as code. Many policies are set by clicking in a GUI, which isn't
Use the locals block to define values and reuse them within a Terraform module. Hands-on: Try the Simplify Terraform Configuration with Locals tutorial. BackgroundThe locals block is similar to function-scoped variables in other programming languages. Local values assign names to expressions, letting you use the name multiple times within a module instead of repeating the expression. You can defin
Validated PatternsField-tested patterns for using HashiCorp products
Tip Before following the recommendations in this guide to build your own infrastructure pipelines from scratch, consider whether HCP Terraform's built in version control integration, run triggers, and other features meet your needs while automatically implementing best practices. For teams that use Terraform as a key part of a change management and deployment pipeline, it can be desirable to orche
Recent versions of Windows 10 now include Windows Subsystem for Linux (WSL) as an optional Windows feature. The WSL supports running a Linux environment within Windows. Vagrant support for WSL is still in development and should be considered beta. Vagrant InstallationVagrant must be installed within the Linux distribution used with WSL. While the vagrant.exe executable provided by the Vagrant Wind
In the previous tutorial, you created an EC2 instance on AWS with Terraform. In this tutorial, you will learn how Terraform implements changes to your configuration. You will add input variables and output values to make your configuration more dynamic and flexible, and use a module to reference reusable collections of infrastructure. PrerequisitesTo follow this tutorial you will need: The Terrafo
This page describes how to integrate modules into your configuration so that you can reuse collections of resource definitions. For information about the module workflow and key concepts, refer to Modules overview. For instruction on how to create reusable child modules, refer to Develop modules. Hands-on: Try the Reuse Configuration with Modules tutorials. OverviewYou can provision collections of
This topic describes the workflow for creating and managing resources in Terraform configuration. or a general overview of how to provision infrastructure, refer to Core Terraform workflow. IntroductionA resource is any infrastructure object you want to create and manage with Terraform, including virtual networks, compute instances, or higher-level components such as DNS records. The kinds of reso
Terraform lets you safely and consistently manage your infrastructure as code across multiple cloud providers. To provision infrastructure with Terraform, you will write configuration in Terraform's configuration language, configure your cloud provider credentials, and apply your configuration with the Terraform Command Line Interface (CLI). To use Terraform, you first need to install it. HashiCor
HCP Terraform provides an API for a subset of its features. If you need assistance or want to submit a feature request, visit the HashiCorp support center and open a ticket. Before planning an API integration, consider whether the HCP Terraform and Terraform Enterprise provider meets your needs. It can't create or approve runs in response to arbitrary events, but it's a useful tool for managing yo
Provisioner name: ansible_local The Vagrant Ansible Local provisioner allows you to provision the guest using Ansible playbooks by executing ansible-playbook directly on the guest machine. Warning: If you are not familiar with Ansible and Vagrant already, we recommend starting with the shell provisioner. However, if you are comfortable with Vagrant already, Vagrant is a great way to learn Ansible.
Command: vagrant snapshot This is the command used to manage snapshots with the guest machine. Snapshots record a point-in-time state of a guest machine. You can then quickly restore to this environment. This lets you experiment and try things and quickly restore back to a previous state. Snapshotting is not supported by every provider. If it is not supported, Vagrant will give you an error messag
No versions of this document exist before v1.16.x. Click below to redirect to the version homepage. The Vault SSH secrets engine provides secure authentication and authorization for access to machines via the SSH protocol. The Vault SSH secrets engine helps manage access to machine infrastructure, providing several ways to issue SSH credentials. The Vault SSH secrets engine supports the following
What is Nomad?Nomad is a flexible workload orchestrator that enables an organization to easily deploy and manage any containerized or legacy application using a single, unified workflow. Nomad can run a diverse workload of Docker, non-containerized, microservice, and batch applications. Nomad enables developers to use declarative infrastructure-as-code for deploying applications. Nomad uses bin pa
What is Nomad?A simple and flexible scheduler and orchestrator to deploy and manage containers and non-containerized applications across on-prem and clouds at scale
The terraform graph command generates a visual representation of a configuration or execution plan that you can use to generate charts. This command uses the DOT language generate graphs. Refer to the GraphViz documentation for additional information. UsageUsage: terraform graph [options] By default the result is a simplified graph which describes only the dependency ordering of the resources (res
Hands-on: Try the Perform CRUD Operations with Providers tutorial. Terraform relies on plugins called providers to interact with cloud providers, SaaS providers, and other APIs. Terraform configurations must declare which providers they require so that Terraform can install and use them. Additionally, some providers require configuration (like endpoint URLs or cloud regions) before they can be use
Terraform DocumentationTerraform is an infrastructure as code tool that lets you build, change, and version infrastructure safely and efficiently. This includes low-level components like compute instances, storage, and networking, as well as high-level components like DNS entries and SaaS features.
Embedded within strings in Terraform, whether you're using the Terraform syntax or JSON syntax, you can interpolate other values. These interpolations are wrapped in ${}, such as ${var.foo}. The interpolation syntax is powerful and allows you to reference variables, attributes of resources, call functions, etc. You can perform simple math in interpolations, allowing you to write expressions such a
Vault is an intricate system with numerous distinct components. This page details the system architecture and hopes to assist Vault users and developers to build a mental model while understanding the theory of operation. Note: This page covers the technical details of Vault. The descriptions and elements contained within are for users that wish to learn about Vault without having to reference the
Modern software works because of secrets. Secrets are sensitive, discrete pieces of information like credentials, encryption keys, authentication certificates, and other critical pieces of information your applications need to run consistently and securely. Use Vault to centralizing secret management and harden your application deployments. Manage 3rd-party secretsManage 3rd-party secrets by integ
What is Vault?Secure, store, and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets, and other sensitive data using a UI, CLI, or HTTP API.
{ "Memory": { "total": 8192864256, "available": 7154810880, "used": 1406787584, "usedPercent": 17.17088847126628, "free": 1683918848, "active": 2873405440, "inactive": 2777124864, "wired": 0, "laundry": 0, "buffers": 131567616, "cached": 4970590208, "writeBack": 0, "dirty": 1069056, "writeBackTmp": 0, "shared": 9121792, "slab": 770506752, "sreclaimable": 0, "sunreclaim": 0, "pageTables": 5103616,
次のページ
このページを最初にブックマークしてみませんか?
『developer.hashicorp.com』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く