Terraform for loop helps you write simplified, repeatable code used to deploy resources. In this article, we’ll explore 'for' loops using 'for_each' and 'count', how and when to use them, example scenarios, best practices, and much more.
Terraform for loop helps you write simplified, repeatable code used to deploy resources. In this article, we’ll explore 'for' loops using 'for_each' and 'count', how and when to use them, example scenarios, best practices, and much more.
The Terraform/OpenTofu 'lookup' function helps maintain clean, DRY, and reusable code. In this blog, we'll explore the various scenarios where the [.code]lookup[.code] function can be used, and provide some practical examples for both common and more advanced use cases.
In this blog, we’ll learn more about count, describe its use cases, and show how you can use it to create multiple resources with ease - with or without conditional expressions.
Cloud Compass enhances your cloud resource management. Using AI-assisted logic, it auto-analyzes IaC coverage blind spots and trends over time, helping you quickly close any gaps.
Join Sergey Korolev of Rakuten Viber to learn how his team automates and manages Infrastructure as Code, and how mature IaC practices improve developer experience, reduce technical debt, and streamline operations at scale.
Recent events are prompting companies to reconsider their TFC subscriptions. At this critical moment, let’s take a closer look at TFC—explore its features, limitations, and pricing model, and review potential alternatives that might better meet your needs.
The 'validate' command helps you check the syntax of your Terraform or OpenTofu code before deployment. Learn how to use it effectively for seamless infrastructure provisioning.
Terraform functions are essential for creating effective infrastructure code. In this blog post, we'll provide a 360° review of Terraform/OpenTofu functions, with practical and detailed examples.
Our latest feature enhances env0 Workflows, simplifying sharing outputs of one environment with another in the same project or workflow, and storing them securely on the env0 platform.
In this blog, we will discuss best practices you should follow for writing clean, scalable, and efficient Terraform code, and how to achieve them with env0.
The launch of OpenTofu 1.7 brings a highly anticipated update: state file encryption. In this post, we take a deep dive into this feature and other new improvements.
Discover best practices for Terraform configuration files and folder structures to optimize your IaC workflow and avoid future complex reorganizations.
“By adopting env0, we've cut down infrastructure deployment times from weeks to just 30 minutes. env0 lets us work smoothly and efficiently; it's GitOps made for infrastructure.”
In this post, we cover best practices and considerations to ensure the effective and safe execution of 'terraform destroy' within your infrastructure management processes.
With Environment Discovery, you can maintain your directory-based structure in your VCS. This enables you to use your existing approval workflows, take advantage of CodeOwners, ensure auditability, and stay aligned with Infrastructure as Code (IaC) best practices!
In this post, we've selected a range of the most popular IaC tools to provide a quick overview of the IaC ecosystem and help you find the option best suited for your organization or project.
Learn how to use env0 to create a unified platform that combines Kubernetes scalability with Terraform's provisioning strength and Helm's deployment dexterity!
Looping constructs provide a way to generate similar resources dynamically based on a collection or count. Learn how to use 'terraform for_each' for efficient infra management.
The Terraform registry is an essential asset for every Terraform user. In this blog, we provide a practical guide for how it can be used to streamline and standardize cloud infrastructure provisioning.
Born out of frequent customer requests, our TFC migration tool simplifies and accelerates the transfer from Terraform Cloud to env0, at any scale. Visit here to see it in action.
In this post, we'll compare Terraform and AWS CF, discuss their pros and cons, and demonstrate how they can be used with env0, leveraging the platform’s multi-framework support.
We introduce two new improvements to our ‘Remote Backend’ - ‘Self-Hosted Remote State’ and ‘Remote Apply’, both addressing common requests from our customers.
OpenTofu is now generally available as a stable, tested, production-ready Terraform alternative! To support the release we are rolling CI Testing, leveraging the new 'tofu test' capability!
In this blog post, we will compare the two tools, and then consider examples of how to use them together for a more efficient and comprehensive approach to infrastructure management.
All programming languages have a way to express and store values within the context of a code block. In the case of Terraform, that functionality is delivered through Terraform locals.
The release introduces several bug fixes, security improvements, and updates to documentation, the details of which you can find in our change log. Most importantly, it marks the introduction of our new OpenTofu public registry!
Terraform providers are essential to the functionality of Terraform. Learn how to install and use them to interact with diverse infrastructure services - AWS, Kubernetes,GitHub and more.
This post showcases the orchestration of Terraform deployments using Jenkins in a real-world scenario. It also delves into the pros and cons of choosing Jenkins for IaC management.
What began as a mere idea and a handful of individuals burning the midnight oil to craft a manifesto just a few weeks ago has swiftly evolved into a full-fledged Linux Foundation project.
OpenTF became a focal point for extensive media coverage, heated debates, and insightful conversations. In this post, I’ll try to recap some of these, in a way that (I hope) would provide helpful context for people new to this story.
The latest milestone in the OpenTF journey is the release of OpenTF’s public repository. Within the first 12 hours, the repo already reached over 2,700 stars...
We’re proud to announce an open-source fork of Terraform called OpenTF. We also completed all documents to become part of the Linux Foundation. Details about the next steps and FAQs are inside.
On August 10th, HashiCorp made an important announcement, signaling a shift in its product licensing strategy. Here's what env0 customers need to know.
Essential building blocks of the Internet, such as Linux, Kubernetes, and Terraform need to be truly open source: that's the only way to ensure that we are building on top of solid and predictable underpinnings.
In this post, we'll walk through how GitHub Actions work, how to use them to automate Terraform operations, and how to embrace and enhance your current workflow.
One of the foundational commands at the heart of Terraform is terraform init. This command is what sets the stage for all the subsequent operations that you perform with Terraform. It prepares a new or existing directory for Terraform usage by creating initial files, loading any remote state, downloading modules, and installing provider plugins.
Terraform backends are a native Terraform feature, which saves the state file in a remote location, rather than a local file. Terraform backends make sure that the work on the stack stays true to the state of our resources, and that we don’t run over our colleagues' work.
Terraform Cloud is a hosted service developed by HashiCorp that provides a collaborative workspace for teams to use Terraform, an open-source Infrastructure as Code (IaC) software tool. It enables teams to manage infrastructure provisioning, compliance, and management across various cloud providers, data centers, and services. This tutorial will walk you through the key features and benefits of Terraform Cloud.
Terraform CLI is a command-line interface tool that enables you to manage Infrastructure as Code (IaC) using the HashiCorp Configuration Language (HCL). With Terraform CLI, you can define, provision, and manage infrastructure resources in a human-readable format that can be versioned, reused, and shared across teams.
Terraform 'for' expression is widely used, particularly in Terraform Modules. A "For Expression" allows you to create complex type values by transforming other complex type values. This feature is not only beneficial in modules but also in your Main Infrastructure Code.
Terraform is a powerful infrastructure as code (IaC) tool that enables you to define and manage your cloud infrastructure in a declarative manner. One of the key features of Terraform is the ability to use variables, which allow you to parameterize your configurations and make them more flexible and reusable.Did you know that you could also order Domino's Pizza with Terraform? In this blog post, we will have fun with the Domino's Pizza Terraform provider while exploring the world of Terraform variables. We'll understand how to effectively use them in your infrastructure deployments.
Embracing Infrastructure as Code is a key step in your journey to cloud native operations. It also opens the door to approach other aspects of your operations as code, and a great example of this is using code to define and evaluate policy. This post will introduce you to the concepts behind policy as code, and how to use Open Policy Agent (OPA) to implement policy as code with your existing Terraform configurations.
Atlantis is a tool that automates Terraform operations through pull requests. It allows developers and operators to collaborate on infrastructure changes without leaving their version control system.
Terraform Plan aims to help you review and verify your configuration before applying it. It gives you a chance to catch any errors or inconsistencies in your terraform code, and to make sure that you are not making any unwanted changes to your infrastructure. It also helps you communicate and collaborate with your team members, by showing them what you intend to do and getting their feedback.
Infrastructure as Code is first and foremost code, and a chief principle of writing good software is leveraging abstractions to make your code reusable, scalable, and consistent. Terraform modules are the abstraction provided by HashiCorp to take logical groupings of resources and package them together in a reusable object.
Today, organizations are still figuring out how best to implement new IaC practices in their existing DevOps frameworks. This article covers a variety of options for multiple frameworks to support even the most demanding business-critical environments.
In this blog post, we will compare three popular IaC scan tools: Checkov, TFsec, and Terrascan. We will compare them based on their features, performance, usability, and compatibility.
Checkov works by scanning IaC files for common security and compliance issues, such as open security groups, unencrypted storage buckets, or missing encryption keys.
tfsec is a security scanner for your Terraform code. It performs static analysis of your code and detects potential misconfigurations that could lead to security risks.
Terrascan is a tool that helps you to scan your Infrastructure as Code for security and compliance policy violations. It supports various IaC languages such as Terraform, Kubernetes, Dockerfile, and more.
In this blog post, we examined three of the most popular tools to scan your infrastructure. These are Checkov, tfsec, and Terrascan. We saw the benefits and key features of each tool.
Many organizations work almost exclusively in their VCS. For these types of GitOps-style workflows, having to change from their VCS to another platform to handle IaC deployments was both time consuming, and represented an unnecessary distraction. Now, with PR Comment Commands, DevOps engineering can seamlessly interact with their env0 IaC deployment and management platform without ever leaving GIT.
When you’re deploying any type of code, whether it’s application code or infrastructure code like Terraform, you want an automated way to deploy it. Aside from application and infrastructure automation workflow, you also want a way to manage certain aspects of how you’re deploying your environment. In this blog post, you’ll learn how to deploy an AWS Elastic Kubernetes Service (Amazon EKS) cluster with Terraform using env0.
Under pressure to use an automated IaC tool but don’t want to deal with the overhead of pushing code for every change? Here’s a step-by-step look at how to use Terraform locally and still have access to all the benefits of the env0 platform.
A new year and tricky economic times seemed like the perfect opportunity to gather some IaC experts for a conversation about hiring challenges, where we’re headed, and doing more with less. In case you missed our webinar (link), here’s a bit of what I learned in my conversation with Brandt Meyers, enterprise architect with MGM Resorts International, Kat Cosgrove, lead developer advocate at Dell, and Chris Short, senior developer advocate at AWS.
Some art forms are not appreciated for their aesthetic value, like music, or literature and poetry. Yet, some ways of sharing such artworks are with a written document, e.g. music sheets and lyrics pages for songs. These art forms evolved as well and new genres of the written word came to be. One of those genres is code.
Terraform alone isn't enough. To ensure best practices, questions such as "How do we enforce policies?", "How do we lint our code?", and "How do we harden infrastructure security?" must be answered. Here are the top 4 essential Terraform tools that you should consider using in 2023 to enhance your infrastructure management process.
Infrastructure as Code (IaC) is widely used to deploy into clouds like AWS, Azure, and GCP. It can also be used to manage on-premises VMware vSphere infrastructure. This step-by-step walkthrough and video tutorial shows you how to use env0 with a self-hosted agent to manage on-premises VMware infrastructure directly.
In this video, we'll go through some background on Atlantis and then show you how to migrate from Atlantis to env0, including using the env0 remote backend for Terraform state storage.
How many of you have started with Terraform and discovered you need the same code to build multiple environments? Perhaps a dev, stage, and production environment? After researching Workspaces, Branches, and Terragrunt, you aren’t completely satisfied and want to know if there is another way. If you are here, I’ll assume that’s you!
Learn more about Terraform variables, terraform module variables, and ways to DRY out your code with some examples of how to build complex variable hierarchies.
"We can now maintain a large number of projects, and env0 ensures that the process is scalable, especially when we have to deal with multiple cloud accounts."
"With env0, that time has been drastically cut, coupled with the fact we no longer need to deploy in a linear fashion and can now deploy multiple environments simultaneously."
DevOps engineers sometimes need to perform one-off commands on their Terraform code or state. For example, “terraform import” or “terraform state rm”, or any other Terraform or bash commands. The problem is that it is dangerous to allow users to work directly from a terminal.
"We chose env0 to manage all of our AWS Terraform-based deployments. Thanks to env0, we can now collaborate and manage our environments, leveraging GitOps and governance workflows."
If you have deployed anything with an Infrastructure as Code framework (Terraform, Pulumi, etc…) recently, then you have interacted with a state file, and may not have even known it! So, what is the state file? Why is it important? What should you do with it? These are some of the most asked questions when it comes to Infrastructure as Code management. So, let’s get into it!
Nowadays all is heavy-automated and so, as requested by many of our customers, we now offer a Terraform Provider for the env0 platform! env0 is now extensible with UI, API, CLI, and Terraform Provider.
Infrastructure is typically built up from multiple layers, starting with the network to the compute layer. In order to deploy your K8s cluster, you typically need your subnets and VPCs defined ahead of time. As I talk to customers about their IaC deployment challenges, I often get asked how env0 can help with orchestrating dependencies amongst these multi-tiered, multi-layered infrastructure deployments.
In this webinar, env0 DevOps Advocate Tim Davis will be joined by Ryder Damen, the new Developer Advocate with Indeni. We'll go over the complex topic of Compliance in continuous automation, and even show a demo of Cloudrail in action in the env0 platform!
Are you currently automating your Infrastructure as Code/Terraform deployments, or are you investigating that ability now? One key piece of being successful is making sure you don't overrun the budget when you open up the ability to deploy to teams.
env0 has worked hard putting new stuff into the platform to make your life easier. Top priority is User Experience and so we do not overload the platform with unnecessary features that get in the way, we added amazing useful features only!