Difference between revisions of "Terraform provider: aws"
Jump to navigation
Jump to search
↑ https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/vpc
↑ https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_target
↑ https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_policy
↑ https://registry.terraform.io/search/providers?q=aws_ecs_service
Line 25: | Line 25: | ||
Including Tags: | Including Tags: | ||
{{tf_aws_provider_tags}} | {{tf_aws_provider_tags}} | ||
+ | |||
+ | |||
+ | provider "aws" { | ||
+ | [[shared_config_files]] = [var.tfc_aws_dynamic_credentials.default.shared_config_file] | ||
+ | } | ||
== Installing == | == Installing == |
Revision as of 17:33, 20 February 2024
Contents
Configuration examples
provider "aws" { profile = "your_profile_name" }
provider "aws" { version = "~> 3.38.0" region = "us-east-1" profile = "your_profile_name" }
provider "aws" { region = var.region version = ">= 0.13" assume_role { role_arn = "arn:aws:iam::01234567890:role/role_in_account_b" } }
Including Tags:
# Terraform 0.12 (2019) and later syntax provider "aws" { # ... other configuration ... default_tags { tags = { Environment = "Production" Owner = "Ops" } } }
provider "aws" { shared_config_files = [var.tfc_aws_dynamic_credentials.default.shared_config_file] }
Installing
Installing hashicorp/aws v4.31.0 Installing hashicorp/aws v4.29.0... Installing hashicorp/aws v4.28.0... Installing hashicorp/aws v4.15.1... Installing hashicorp/aws v3.63.0...
Resources
RDS:
S3:
aws_s3_bucket
aws_s3_versioning
aws_s3_bucket_inventory
aws_s3_bucket_lifecycle_configuration
aws_s3control_bucket_lifecycle_configuration
Errors
Error: Provider produced inconsistent final plan
Error: error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.
Error: configuring Terraform AWS Provider: failed to get shared config profile
AWS Error: A Profile was specified along with the environment variables "AWS ACCESS KEY ID" and "AWS SECRET ACCESS KEY". The Profile is now used instead of the environment variable credentials.
Limitation
aws account disable-region
not implemented
Related terms
- Data sources:
aws_caller_identity
- CloudFormation resource types: (Type:)
- Terraform S3 backend:
backends.tf
providers.tf
- Terraform provider: AWS
- AWS Control Tower Account Factory for Terraform (AFT)
- Terraform AWS data sources
AWS_DEFAULT_REGION
- Terraform modules
- Terraform provider-level tagging
required_version
Activities / Changelog
- Terraform AWS Provider Version 4 Upgrade Guide: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/version-4-upgrade
- Terraform AWS provider 4.0: https://www.hashicorp.com/blog/terraform-aws-provider-4-0-refactors-s3-bucket-resource
See also
- Terraform AWS: provider, resources, modules, data sources, VPC, IAM, Net, EC2, S3, Route53, ACM, CloudWatch, SES, RDS, ECS,
awscc, autoscaling, EKS
- Terraform provider:
AWS, Cloudflare
,GoogleWorkspace
,Kubernetes, Helm, .terraform/providers/
,template
,tfe
,providers.tf, dns, hashicorp/, hashicorp/tls
, Terraform provider versioning, Libvirt, datadog,terraform providers, required_version, onepassword
,rancher2
,time, terraform.tf
- Terraform resources, Terraform providers, Terraform provisioner,
random_password, random_string, null_resource
Advertising: