I learned a lot in this 10 minutes, thanks! Yesterday i was pretty frustrated trying to validate my policies, today everything is working
@cloudonaut
2 жыл бұрын
Thanks a lot for your feedback!
@manishmahajan6094
Жыл бұрын
Amazing ... flawless ... Will apply this in realtime
@cloudonaut
Жыл бұрын
Thanks for your feedback!
@techmiker
2 жыл бұрын
I love the video. It's really helpful. Thank you! Maybe you could include some links in the description to any documentation that's relevant?
@cloudonaut
2 жыл бұрын
Thanks a lot for your feedback, Mike. We will improve our video descriptions.
@scleiton
2 жыл бұрын
Thanks Andreas Wittig
@cloudonaut
2 жыл бұрын
You are welcome!
@JorgeVidinhaChannel
3 жыл бұрын
Thank You !! could you create terraform videos of using data resource to create aws_instances in existent VPC’s and existent roles ? Thanksounaut
@cloudonaut
3 жыл бұрын
Thanks for your idea!
@carlosmora8791
Ай бұрын
Quick question. What is the advantage of using Terraform for the IAM management process over some bash/python scripting processes? I understand Terraform can do it, but is it the right tool for that process compared with the scripts versioned?
@cloudonaut
Ай бұрын
In our opinion, tools using the descriptive approach to define infrastructure work best (Terraform, CloudFormation, CDK, ...). Using scripts is error prone and complicated, as you have to deal with creating, updating, and deleting resources in code.
@oleksandrlytvyn532
Жыл бұрын
Thanks 👍🏼
@cloudonaut
Жыл бұрын
You are welcome!
@cappuccinopapi3038
3 жыл бұрын
Yesss, great! Thanks a lot man!
@cloudonaut
3 жыл бұрын
No worries!
@markotitel
2 жыл бұрын
What do you people prefer to use more? TF or CF? Do you combine the two?
@cloudonaut
2 жыл бұрын
We usually use either TF or CF. Not both in a project. See cloudonaut.io/cloudformation-vs-terraform/ for details.
@floriandesneux2516
Жыл бұрын
Is there a reason why you split List and Put/Get? You can have both resources section in one. Nice video!
@cloudonaut
Жыл бұрын
Yes, there is a reason for that. The resource for ListBucket is the bucket, the resource for Get/PutObject is the object. Different ARNs.
@floriandesneux2516
Жыл бұрын
@@cloudonaut What I mean is something like this: - Effect: Allow Action: - s3:GetObject - s3:PutObject - s3:ListBucket Resource: - !Sub arn:aws:s3:::mybucket - !Sub arn:aws:s3:::mybucket/*
@cloudonaut
Жыл бұрын
@@floriandesneux2516 For clarity and to avoid errors when extending a policy, we prefer using a statement per resource. That's why we split the statement for the S3 bucket and S3 objects into two.
@AparnaBL
3 жыл бұрын
Thankyou !!
@cloudonaut
3 жыл бұрын
You're welcome!
@zachswift588
2 жыл бұрын
I’m curious about the cycle of special characters that happens before you get to an open square bracket. Is that a side effect of using a non traditional keyboard layout?
@cloudonaut
2 жыл бұрын
This was a side-effect of using Michael's keyboard which my fingers refused to type on correctly. ;)
@zachswift588
2 жыл бұрын
@@cloudonaut LOL thanks for the video.
@ankitvarshney5989
2 жыл бұрын
Thank For the tutorial!! if we have lot of s3 bucket and how to define loop in ( "Resource": ["...."])?
@cloudonaut
2 жыл бұрын
Check out blog.gruntwork.io/terraform-tips-tricks-loops-if-statements-and-gotchas-f739bbae55f9.
@DanielWeikert
2 жыл бұрын
Just got started with terraform and the easiest way for me to understand and use it is something like this resource "aws_iam_role_policy_attachment" "additional_policy" { role = "${aws_iam_role.iam_for_lambda.name}" policy_arn = "arn:aws:iam::aws:policy/CloudWatchFullAccess" } Anything wrong with that? Thanks
@cloudonaut
2 жыл бұрын
You are using an IAM policy managed by AWS. The problem with that is, that it does not allow you to implement least privilege access to your resources. For example, because the policies provided by AWS do not restrict access to certain resources.
Пікірлер: 31