Skip to content


Here are 868 public repositories matching this topic...

rgl commented Aug 14, 2020

I'm trying to use nbering/terraform-provider-ansible by placing it in ~/.terraform.d/plugins/linux_amd64/terraform-provider-ansible, but terraform init never seems to actually find it (NB this works fine in 0.12.x). Why is that?

Can 0.13 actually load plugins from local file-system directories (as [described in the documentation](

wchao commented Jun 28, 2020

I get the following warnings once a minute:

2020-06-23 23:11:13,900 [ ][WARNING ][24993] Skipped invalid cache mtime entry in /var/cache/salt/master/roots/mtime_map: /srv/salt/a/b/c/ifcfg-eth0:0:1533517049.0

2020-06-23 23:11:13,901 [ ][WARNING ][24993] Skipped invalid cache mtime entry in /var/cache/salt

alikhajeh1 commented Sep 17, 2020

When I run infracost --help, I see the following and it's not clear from the description which one I should use:

   --tfjson value            Path to Terraform Plan JSON file
   --tfplan value            Path to Terraform Plan file. Requires 'tfdir' to be set
   --tfdir value              Path to the Terraform project directory (default: current working directory)

One user has alre

aviflax commented Sep 14, 2020

Hi, I just created a new environment (test2) for my app, and now I’m trying to deploy a service to that environment but it fails.

Just for context, I’m attempting to use a monorepo setup:

  • My apps (services) are in /apps/
  • My copilot manifests etc are in /infrastructure/copilot/
  • I always run copilot from /infrastructure/
  • Each manifest has an image property that points to
anguslees commented Mar 21, 2018

Garbage collection works by listing everything with the gc-tag. In a busy cluster, we really want that filter to happen server-side and ideally using an index of some sort.

That means we should use a Kubernetes label, not an annotation.

I think this will require a two-step migration plan (write both but continue to read annotation; release; drop support for annotation; release).

🚀 Geodesic is a cloud automation shell. It's the fastest way to get up and running with a rock solid, production grade cloud platform built on top of strictly Open Source tools. ★ this repo!

  • Updated Sep 15, 2020
  • Shell

Improve this page

Add a description, image, and links to the infrastructure-as-code topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the infrastructure-as-code topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.