Difference between revisions of "Terraform provider: aws"

From wikieduonline
Jump to navigation Jump to search
 
(9 intermediate revisions by the same user not shown)
Line 1: Line 1:
 
* https://registry.terraform.io/providers/hashicorp/aws/latest/docs
 
* https://registry.terraform.io/providers/hashicorp/aws/latest/docs
 +
* <code>[[profile]]</code>, <code>[[shared_config_files]]</code>, <code>[[shared_credentials_files]]</code>
  
 
== Configuration examples ==
 
== Configuration examples ==
 +
{{basic tf aws profile}}
 +
 
  [[provider]] "aws" {
 
  [[provider]] "aws" {
 
   [[version =]] "~> 3.38.0"
 
   [[version =]] "~> 3.38.0"
Line 16: Line 19:
 
  }
 
  }
  
Using Tags:
+
Including Tags:
 
  {{tf_aws_provider_tags}}
 
  {{tf_aws_provider_tags}}
 +
 +
[[Dynamic Credentials with the AWS Provider]]:
 +
provider "aws" {
 +
  [[shared_config_files]] = [var.tfc_aws_dynamic_credentials.default.shared_config_file]
 +
}
  
 
== Installing ==
 
== Installing ==
Line 99: Line 107:
 
* <code>[[Error: error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.]]</code>
 
* <code>[[Error: error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.]]</code>
 
* <code>[[Error: configuring Terraform AWS Provider: failed to get shared config profile]]</code>
 
* <code>[[Error: configuring Terraform AWS Provider: failed to get shared config profile]]</code>
 +
* <code>[[AWS Error: A Profile was specified along with the environment variables "AWS ACCESS KEY ID" and "AWS SECRET ACCESS KEY". The Profile is now used instead of the environment variable credentials.]]</code>
 +
 +
== Limitation ==
 +
* <code>[[aws account disable-region]]</code> not implemented
  
 
== Related terms ==
 
== Related terms ==

Latest revision as of 17:33, 20 February 2024

Configuration examples[edit]

 provider "aws" {
 profile = "your_profile_name"
}
provider "aws" {
 version = "~> 3.38.0"
 region = "us-east-1"
 profile = "your_profile_name"
}
provider "aws" {
  region     = var.region
  version    = ">= 0.13"
  assume_role {
    role_arn = "arn:aws:iam::01234567890:role/role_in_account_b"
  }
}

Including Tags:

 # Terraform 0.12 (2019) and later syntax
provider "aws" {
  # ... other configuration ...
  default_tags {
    tags = {
      Environment = "Production"
      Owner       = "Ops"
    }
  }
}

Dynamic Credentials with the AWS Provider:

provider "aws" {
  shared_config_files = [var.tfc_aws_dynamic_credentials.default.shared_config_file]
}

Installing[edit]

Installing hashicorp/aws v4.31.0
Installing hashicorp/aws v4.29.0...
Installing hashicorp/aws v4.28.0...
Installing hashicorp/aws v4.15.1...
Installing hashicorp/aws v3.63.0...

Resources[edit]

Terraform IAM resources

Networking:

CloudFront

Networking

Computing:

RDS:

S3:

KMS

CloudWatch

WAF

Route53


CodeBuild

CodeDeploy

ECR

Errors[edit]

Limitation[edit]

Related terms[edit]

Activities / Changelog[edit]

See also[edit]

  • https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/vpc
  • https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_target
  • https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_policy
  • https://registry.terraform.io/search/providers?q=aws_ecs_service
  • Advertising: