
Terraform Registry
The Terraform Registry makes it easy to use any provider or module. To use a provider or module from this registry, just add it to your configuration; when you run `terraform init`, Terraform will …
Docs overview | hashicorp/aws | Terraform | Terraform Registry
Hard-coded credentials are not recommended in any Terraform configuration and risks secret leakage should this file ever be committed to a public version control system.
azurerm_resource_group | Resources - Terraform Registry
This Feature Toggle is disabled in 2.x but enabled by default from 3.0 onwards, and is intended to avoid the unintentional destruction of resources managed outside of Terraform (for example, provisioned …
HCP Terraform
Support Terms Privacy Security Accessibility © 2026 HashiCorp, an IBM Company
Docs overview | hashicorp/azurerm - Terraform Registry
To learn the basics of Terraform using this provider, follow the hands-on get started tutorials. Interested in the provider's latest features, or want to make sure you're up to date?
Resources | hashicorp/local - Terraform Registry
When working with local files, Terraform will detect the resource as having been deleted each time a configuration is applied on a new machine where the file is not present and will generate a diff to re …
aws_lambda_function | Resources - Terraform Registry
You can fix the problem two ways: 1) updating the function's role to another role and then updating it back again to the recreated role, or 2) by using Terraform to taint the function and apply your …
Resources | hashicorp/aws - Terraform Registry
retain_on_delete (Optional) - Disables the distribution instead of deleting it when destroying the resource through Terraform. If this is set, the distribution needs to be deleted manually afterwards.
OpenStack Provider - Terraform Registry
This provider has the ability to log all HTTP requests and responses between Terraform and the OpenStack cloud which is useful for troubleshooting and debugging.
Docs overview | Telmate/proxmox - Terraform Registry
To ensure security, it's best practice to create a dedicated user and role for Terraform instead of using cluster-wide Administrator rights. The particular privileges required may change but here is a suitable …