01 | Securing Data with Local Sensitive Files
Mastering file permissions and console redaction in Terraform.
Mastering file permissions and console redaction in Terraform.
๐ง The Concept: Logical Providers Most Terraform providers (like AWS or Azure) manage physical infrastructure. However, Logical Providers like random exist entirely within the Terraform state. They are used to: Avoid Name Collisions: Ensuring S3 buckets or VMs have unique IDs. Dynamic Testing: Generating temporary names for lab environments. ๐ The Challenge The objective is to use the random_pet resource to generate a unique, human-readable name. Requirements: Provider: Use the random provider. Length: The pet name should consist of exactly 2 words. Separator: Use a hyphen (-) between words (e.g., fancy-cat). ๐ The Solution You can view the full configuration in my Challenge 02 Repository Folder. ...
Moving away from hardcoded values to dynamic, variable-driven configurations.
Learn how to use the time_static resource to create persistent timestamps and avoid unnecessary resource drift.
Learn how to use the time_rotating to rotate a database password every 30 days
Learn What are the Infrastructure Connective Tissue
Learn How to use conditional statements in terraform
Learn to protect S3 with cloud front with the help of terraform