<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Terraform on Sander Knape</title>
    <link>https://sanderknape.com/tags/terraform/</link>
    <description>Recent content in Terraform on Sander Knape</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Sat, 09 Nov 2024 12:43:02 +0200</lastBuildDate>
    <atom:link href="https://sanderknape.com/tags/terraform/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Terraform &#39;data source will be read during apply&#39; messages - What is it and how to fix</title>
      <link>https://sanderknape.com/2024/11/terraform-data-source-read-during-apply-messages-fix/</link>
      <pubDate>Sat, 09 Nov 2024 12:43:02 +0200</pubDate>
      <guid>https://sanderknape.com/2024/11/terraform-data-source-read-during-apply-messages-fix/</guid>
      <description>&lt;p&gt;Terraform users will likely be familiar with &amp;ldquo;data source will be read during apply&amp;rdquo; messages that may appear in the plan output. These messages can be confusing and may even lead to unexpected re-creation of resources. Typically, these messages are related to using data sources in combination with Terraform modules and explicit dependencies.&lt;/p&gt;&#xA;&lt;p&gt;Data sources and modules are two powerful and essential concepts. Data sources allow you to fetch information from existing resources and pass that data to other resources. Modules promote reusability and hiding complexity by encapsulating collections of resources into sharable, versioned packages. Explicit dependencies are also valid to use in various situations. But combining these concepts can lead to confusion and unexpected behavior.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Shift left AWS tag enforcement with Terraform and tfsec</title>
      <link>https://sanderknape.com/2021/05/shift-left-aws-tag-enforcement-terraform-tfsec/</link>
      <pubDate>Mon, 03 May 2021 21:03:01 +0200</pubDate>
      <guid>https://sanderknape.com/2021/05/shift-left-aws-tag-enforcement-terraform-tfsec/</guid>
      <description>&lt;p&gt;There are many ways to improve the developer experience of deploying infrastructure into the Cloud. One such method is by shifting left: provide early feedback to shorten the feedback loop and speed up development.&lt;/p&gt;&#xA;&lt;p&gt;When deploying infrastructure into AWS with an infrastructure as code tool such as Terraform, you can validate that code as part of a CI/CD pipeline. A pull request can automatically receive feedback about the configuration of resources, thus enforcing the environment to stay compliant with the organization&amp;rsquo;s policies.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
