chore: remove /docs (#31558)

This commit is contained in:
Kevin Wang 2022-08-05 10:26:17 -04:00 committed by GitHub
parent e57e721c8e
commit f3ef0d9df1
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
9 changed files with 0 additions and 1379 deletions

View File

@ -1,17 +0,0 @@
[
{ "title": "Intro to Terraform", "href": "/intro" },
{ "title": "Configuration Language", "href": "/language" },
{ "title": "Terraform CLI", "href": "/cli" },
{ "title": "Terraform Cloud", "href": "/cloud-docs" },
{ "title": "Terraform Enterprise", "href": "/enterprise" },
{ "title": "Provider Use", "href": "/language/providers" },
{ "title": "Plugin Development", "href": "/plugin" },
{ "title": "Registry Publishing", "href": "/registry" },
{
"title": "Integration Program",
"path": "partnerships"
},
{ "title": "Terraform Tools", "path": "terraform-tools" },
{ "title": "CDK for Terraform", "href": "/cdktf" },
{ "title": "Glossary", "path": "glossary" }
]

File diff suppressed because it is too large Load Diff

View File

@ -1,44 +0,0 @@
---
page_title: Documentation
description: >-
Documentation for Terraform, including Terraform CLI, Terraform Cloud, and
Terraform Enterprise.
show_notification: false
---
# Terraform Documentation
Terraform is an infrastructure as code (IaC) tool that allows you to build, change, and version infrastructure safely and efficiently. This includes both low-level components like compute instances, storage, and networking, as well as high-level components like DNS entries and SaaS features.
<div className="container-fluid"><div className="row">
<div className="col-md-6 col-sm-12">
### Get Started
- Learn how Terraform [solves infrastructure challenges](/intro) and how it [compares to other tools and services](/intro/vs).
- Install Terraform and explore use cases with the [hands-on tutorials on HashiCorp Learn](https://learn.hashicorp.com/collections/terraform/aws-get-started).
### Manage Infrastructure
- Describe infrastructure on various [providers](/language/providers) with [Terraform's configuration language](/language).
- Use the [Terraform CLI](/cli) to manage configuration, plugins, infrastructure, and state.
- Use [CDK for Terraform](/cdktf) to write and deploy Terraform configurations in your preferred programming language.
</div>
<div className="col-md-6 col-sm-12">
### Collaborate
- [Terraform Cloud](/cloud) helps teams use Terraform together, with version control, state sharing, [governance](/cloud-docs/sentinel), and more.
- [Terraform Enterprise](/enterprise) is a self-hosted instance of Terraform Cloud.
### Develop and Share
- [Create a provider](/plugin) to allow Terraform to interact with a service.
- Create reusable configurations with [modules](/language/modules).
- [Publish a provider or module](/registry) to the Terraform Registry to make it publicly available.
</div>
</div></div>

View File

@ -1,217 +0,0 @@
---
page_title: Terraform Integration Program
description: >-
The Terraform Integration Program allows prospect partners to create and
publish Terraform integrations that have been verified by HashiCorp.
---
# Terraform Integration Program
The Terraform Integration Program facilitates prospect partners in creating and publishing Terraform integrations that have been verified by HashiCorp.
## Terraform Editions
Terraform is an infrastructure as code (IaC) tool that allows you to build, change, and version infrastructure safely and efficiently. This includes low-level components such as compute instances, storage, and networking, as well as high-level components such as DNS entries, SaaS features, etc. Terraform can manage both existing service providers and custom in-house solutions.
HashiCorp offers three editions of Terraform: Open Source, Terraform Cloud, and Terraform Enterprise.
- [Terraform Open Source](/) provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files.
- [Terraform Cloud (TFC)](/cloud) is a free to use, self-service SaaS platform that extends the capabilities of the open source Terraform CLI. It adds automation and collaboration features, and performs Terraform functionality remotely, making it ideal for collaborative and production environments. Terraform Cloud is available as a hosted service at https://app.terraform.io. Small teams can sign up for free to connect Terraform to version control, share variables, run Terraform in a stable remote environment, and securely store remote state. Paid tiers allow you to add more than five users, create teams with different levels of permissions, enforce policies before creating infrastructure, and collaborate more effectively.
- [Terraform Enterprise (TFE)](/enterprise) is our self-hosted distribution of Terraform Cloud with advanced security and compliance features. It offers enterprises a private instance that includes the advanced features available in Terraform Cloud.
## Types of Terraform Integrations
The Terraform ecosystem is designed to enable users to apply Terraform across different use cases and environments. The Terraform Integration Program currently supports both workflow and integration partners (details below). Some partners can be both, depending on their use cases.
- **Workflow Partners** build integrations for Terraform Cloud and/or Terraform Enterprise. Typically, these partners are seeking to enable customers to use their existing platform within a Terraform Run.
- **Infrastructure Partners** empower customers to leverage Terraform to manage resources exposed by their platform APIs. These are accessible to users of all Terraform editions.
Our Workflow Partners typically have the following use cases:
- **Code Scanning:** These partners provide tooling to review infrastructure as code configurations to prevent errors or security issues.
- **Cost Estimation:** These partners drive cost estimation of new deployment based on historical deployments.
- **Monitoring:** These partners provide performance visibility.
- **Zero Trust Security:** These partners help users create configurations to verify connections prior to providing access to an organizations systems.
- **Audit:** These partners focus on maintaining code formatting, preventing security threats, and performing additional code analysis.
- **ITSM (Information Technology Service Management):** These partners focus on implementation, deployment, and delivery of IT workflows.
- **SSO (Single Sign On):** These partners focus on authentication for end users to securely sign on.
- **CI/CD:** These partners focus on continuous integration and continuous delivery/deployment.
- **VCS:** These partners focus on tracking and managing software code changes.
Most workflow partners integrate with the Terraform workflow itself. Run tasks allow Terraform Cloud to execute tasks in external systems at specific points in the Terraform Cloud run lifecycle. This offers much more extensibility to Terraform Cloud customers, enabling them to integrate your services into the Terraform Cloud workflow. The beta release of this feature allows users to add and execute these tasks during the new pre-apply stage which exists in between the plan and apply stages. Eventually, we will open the entire workflow to Terraform Cloud users, including the pre-plan and post apply stages. Reference the [Terraform Cloud Integrations](/docs/partnerships#terraform-cloud-integrations) or [Terraform Enterprise Integrations](/docs/partnerships#terraform-enterprise-integrations) documentation for more details.
![Integration program diagram](/img/docs/terraform-integration-program-diagram.png)
Our Infrastructure Partners typically have the following use cases:
- **Public Cloud:** These are large-scale, global cloud providers that offer a range of services including IaaS, SaaS, and PaaS.
- **Container Orchestration:** These partners help with container provisioning and deployment.
- **IaaS (Infrastructure-as-a-Service):** These are infrastructure and IaaS providers that offer solutions such as storage, networking, and virtualization.
- **Security & Authentication:** These are partners with authentication and security monitoring platforms.
- **Asset Management:** These partners offer asset management of key organization and IT resources, including software licenses, hardware assets, and cloud resources.
- **CI/CD:** These partners focus on continuous integration and continuous delivery/deployment.
- **Logging & Monitoring:** These partners offer the capability to configure and manage services such as loggers, metric tools, and monitoring services.
- **Utility:** These partners offer helper functionality, such as random value generation, file creation, http interactions, and time-based resources.
- **Cloud Automation:** These partners offer specialized cloud infrastructure automation management capabilities such as configuration management.
- **Data Management:** These partners focus on data center storage, backup, and recovery solutions.
- **Networking:** These partners integrate with network-specific hardware and virtualized products such as routing, switching, firewalls, and SD-WAN solutions.
- **VCS (Version Control Systems):** These partners focus on VCS (Version Control System) projects, teams, and repositories from within Terraform.
- **Comms & Messaging:** These partners integrate with communication, email, and messaging platforms.
- **Database:** These partners offer capabilities to provision and configure your database resources.
- **PaaS (Platform-as-a-Service):** These are platform and PaaS providers that offer a range of hardware, software, and application development tools. This category includes smaller-scale providers and those with more specialized offerings.
- **Web Services:** These partners focus on web hosting, web performance, CDN and DNS services.
Infrastructure partners integrate by building and publishing a plugin called a Terraform [provider](/language/providers). Providers are executable binaries written in Go that communicate with Terraform Core over an RPC interface. The provider acts as a translation layer for transactions with external APIs, such as a public cloud service (AWS, GCP, Azure), a PaaS service (Heroku), a SaaS service (DNSimple, CloudFlare), or on-prem resources (vSphere). Providers work across Terraform OSS, Terraform Cloud and Terraform Enterprise. Refer to the [Terraform Provider Integrations documentation](/docs/partnerships#terraform-provider-integrations) for more detail.
## Terraform Provider Integrations
You can follow the five steps. below to develop your provider alongside HashiCorp. This ensures that you can publish new versions with Terraform quickly and efficiently.
![Provider Development Process](/img/docs/provider-program-steps.png)
1. **Prepare**: Develop integration using included resources
1. **Publish**: Publish provider to the Registry or plugin documentation
1. **Apply**: Apply to Technology Partnership Program
1. **Verify**: Verify integration with HashiCorp Alliances team
1. **Support**: Vendor provides ongoing maintenance and support
We encourage you to follow the tasks associated with each step fully to streamline the development process and minimize rework.
All providers integrate into and operate with Terraform exactly the same way. The table below is intended to help users understand who develops, and maintains a particular provider.
<ProviderTable />
<p></p>
### 1. Prepare
To get started with the Terraform provider development, we recommend reviewing and following the articles listed below.
#### Provider Development Kit
a) Writing custom providers [guide](https://learn.hashicorp.com/tutorials/terraform/provider-setup)
b) Creating a Terraform Provider for Just About Anything: [video](https://www.youtube.com/watch?v=noxwUVet5RE)
c) Sample provider developed by [partner](http://container-solutions.com/write-terraform-provider-part-1/)
d) Example provider for reference: [AWS](https://github.com/terraform-providers/terraform-provider-aws), [OPC](https://github.com/terraform-providers/terraform-provider-opc)
e) Contributing to Terraform [guidelines](https://github.com/hashicorp/terraform/blob/master/.github/CONTRIBUTING.md)
f) HashiCorp developer [forum](https://discuss.hashicorp.com/c/terraform-providers/tf-plugin-sdk/43)
Please submit questions or suggestions about the Terraform SDK and provider development to the HashiCorp Terraform plugin SDK forum. If you are new to provider development and would like assistance, you can leverage one of the following development agencies that have developed Terraform providers in the past:
| Partner | Email | Website |
| ------------------ | :-------------------------- | :-------------------------------------------------- |
| Crest Data Systems | <malhar@crestdatasys.com> | [www.crestdatasys.com](http://www.crestdatasys.com) |
| DigitalOnUs | <hashicorp@digitalonus.com> | [www.digitalonus.com](http://www.digitalonus.com) |
| Akava | <bd@akava.io> | [www.akava.io](http://www.akava.io) |
| OpenCredo | <hashicorp@opencredo.com> | [www.opencredo.com](http://www.opencredo.com) |
#### Provider License
All Terraform providers listed as Verified must contain one of the following open source licenses:
- CDDL 1.0, 2.0
- CPL 1.0
- Eclipse Public License (EPL) 1.0
- MPL 1.0, 1.1, 2.0
- PSL 2.0
- Ruby's Licensing
- AFL 2.1, 3.0
- Apache License 2.0
- Artistic License 1.0, 2.0
- Apache Software License (ASL) 1.1
- Boost Software License
- BSD, BSD 3-clause, "BSD-new"
- CC-BY
- Microsoft Public License (MS-PL)
- MIT
### 2. Publish
After your provider is complete and ready to release, you can publish it the integration to the [Terraform Registry](https://registry.terraform.io/). This makes it publicly available for all Terraform users.
Follow the [Terraform Registry publishing documentation](/registry/providers/publishing) and review the [provider publishing learn guide](https://learn.hashicorp.com/tutorials/terraform/provider-release-publish?in=terraform/providers). If your company has multiple products with separate providers, we recommend publishing them under the same Github organization to help with discoverability.
Once completed, your provider will be visible in the Terraform Registry and available to use in Terraform. Please confirm that everything looks correct and that documentation is rendering properly.
### 3. Apply
After your provider is published, connect with HashiCorp Alliances to onboard your integration to the HashiCorp technology ecosystem or [apply to become a technology partner](https://www.hashicorp.com/ecosystem/become-a-partner/#technology).
### 4. Verify
Work with your HashiCorp Alliances representative to verify the plugin within the Registry and become listed as an HashiCorp technology partner integration on HashiCorp website.
### 5. Support
Getting a new provider built and published to the Terraform Registry is just the first step towards enabling your users with a quality Terraform integration. Once a verified provider has been published, on-going effort is required to maintain the provider.
HashiCorp Terraform has an extremely wide community of users and contributors and we encourage everyone to report issues however small, as well as help resolve them when possible. We expect that all verified provider publishers will continue to maintain the provider and address any issues users report in a timely manner. This includes resolving all critical issues within 48 hours and all other issues within 5 business days. HashiCorp reserves the right to remove verified status from any integration that is no longer being maintained.
Vendors who choose not to support their provider and prefer to make it a community-supported provider will no longer be listed as Verified.
-> **Network Infrastructure Automation (NIA):** These integrations leverage Consuls service catalog to seamlessly integrate with Consul-Terraform-Sync (CTS) to automate changes in network infrastructure via a publisher-subscriber method. More details can be found in the [NIA Integration Program](https://www.consul.io/docs/integrate/nia-integration) documentation.
## Terraform Cloud Integrations
Run tasks allow Terraform Cloud to execute tasks in external systems at specific points in the Terraform Cloud run lifecycle. The beta release of this feature allows users to add and execute these tasks during the new pre-apply stage that exists in between the plan and apply stages. Tasks are executed by sending an API payload to the external system. This payload contains a collection of run-related information and a callback URL which the external system can use to send updates back to Terraform Cloud.
The external system can then use this run information and respond back to Terraform Cloud with a passed or failed status. Terraform Cloud uses this status response to determine if a run should proceed, based on the task's enforcement settings within a workspace.
Partners who successfully complete the Terraform Cloud integration checklist obtain a Terraform Cloud badge. This signifies HashiCorp has verified the integration and the partner is a member of the HashiCorp Technology Partner Program.
- Note: Currently, pre-apply is the only integration phase available. As of September 2021, run tasks are available only as a beta feature, are subject to change, and not all customers will see this functionality in their Terraform Cloud organization since this is currently enabled by default for our business tier customers of Terraform Cloud. If you have a customer that is interested in run tasks and are not a current Terraform Cloud for Business customer please request them to [sign up using the form](https://docs.google.com/forms/d/e/1FAIpQLSf3JJIkU05bKWov2wXa9c-QV524WNaHuGIk7xjHnwl5ceGw2A/viewform).
<img src="/img/docs/tfc-badge.png" alt="Terraform Cloud Partnership Badge" style={{display:'block', margin:'auto', width:'200px', height:'200px'}}/>
The above badge will help drive visibility for the partner as well as provide better differentiation for joint customers. This badge will be available for partners to use at their digital properties (as per guidelines in the technology partner guide that partners receive when they join HashiCorps technology partner program).
The Terraform Cloud Integration program has the following five steps.
![RunTask Program Process](/img/docs/runtask-program-steps.png)
1. **Engage**: Sign up for the Technology Partner
Program
1. **Develop & Test**: Understand and build using the API integration for Run Tasks
1. **Review**: Review integration with HashiCorp Alliances team
1. **Release**: Provide documentation for your Integration
1. **Support**: Vendor provides ongoing maintanance and support
### 1. Engage
For partners who are new to working with Hashicorp, we recommend [signing up for our Technology Partner Program](https://www.hashicorp.com/go/tech-partner). To understand more about the program, check out our “[Become a Partner](https://www.hashicorp.com/partners/become-a-partner)” page.
### 2. Develop & Test
Partners should build an integration using [Run Task APIs in Terraform Cloud](/cloud-docs/api-docs/run-tasks). To better understand how run Task enhances the workflow, see diagram listed below and check out our [announcement about Terraform run Task](https://www.hashicorp.com/blog/terraform-cloud-run-tasks-beta-now-available). [Snyk](https://docs.snyk.io/features/integrations/ci-cd-integrations/integrating-snyk-with-terraform-cloud), for example, created an integration to detect configuration anomalies in code while reducing risk to the infrastructure. For additional API resources, [click here](/cloud-docs/api-docs).
**Currently, pre-apply is the only integration phase available.**
![RunTask Diagram](/img/docs/runtask-diagram.png)
### 3. Review
Schedule time with your Partner Alliance manager to review your integration. The review should include enabling the integration on the partners platform and Terraform Cloud, explaining the use case for the integration, and a live demonstration of the functionality. If you are unable to engage with your Partner Alliances manager, you can also reach out to <technologypartners@hashicorp.com>.
### 4. Release
We add new partners to the [Terraform Run Task page](/cloud-docs/integrations/run-tasks#run-tasks-technology-partners) after the integration review and documentation is complete. On this page, you will provide a two-line summary about your integration(s). If you have multiple integrations, we highly recommend creating a summary that highlights all potential integration options.
You must provide documentation that helps users get started with your integration. You also need to provide documentation for our support team, including points of contact, email address, FAQ and/or best practices. We want to ensure end users are able to reach the right contacts for internal HashiCorp support when working with customers.
### 5. Support
At HashiCorp, we view the release step to be the beginning of the journey. Getting the integration built is just the first step in enabling users to leverage it against their infrastructure. On-going effort is required to support and maintain it after you complete the initial development.
We expect that partners will create a mechanism to track and resolve all critical issues as soon as possible (ideally within 48 hours) and all other issues within 5 business days. This is a requirement given the critical nature of Terraform Cloud to a customers operation. If you choose not to support your integration, we cannot consider it verified and will not list it on the Terraform documentation website.
## Terraform Enterprise Integrations
Terraform Enterprise integrations are workflow integrations that are validated against Terraform Enterprise. Partners with a verified Terraform Enterprise integration will be given a Terraform Enterprise verified badge. This signifies HashiCorp has verified the integration and the partner is a member of the HashiCorp Technology Partner Program. At this time we are working to release an official program around integrating with Terraform Enterprise. Until then, if you are interested in publishing a verified Terraform Enterprise integration, please reach out to us at [technologypartners@hashicorp.com](mailto:technologypartners@hashicorp.com).
<img src="/img/docs/tfe-badge.png" alt="Terraform Cloud Partnership Badge" style={{display:'block', margin:'auto', width:'200px', height:'200px'}}/>
-> Contact us at [technologypartners@hashicorp.com](mailto:technologypartners@hashicorp.com) with any questions or feedback.

View File

@ -1,73 +0,0 @@
---
page_title: Terraform Tools
description: >-
Use these tools with Terraform to solve a broad range of infrastructure and DevOps challenges.
---
# Terraform Tools
Terraform is part of a rich infrastructure and DevOps ecosystem. The tools below extend Terraforms functionality or pair with Terraform to solve a broad range of infrastructure challenges.
## Develop and Validate Configuration
|Name | Maintainer |Description| Tutorial |
|-----|------------|-----------|----------|
|[Cloud Development Kit for Terraform (CDKTF)](/cdktf)| HashiCorp | Use familiar programming languages to define and provision infrastructure. CDKTF currently supports TypeScript, Python, Java, C#, and Go (experimental).| [Write CDK for Terraform configurations](https://learn.hashicorp.com/collections/terraform/cdktf) |
|[Visual Studio Code Extension](https://marketplace.visualstudio.com/items?itemName=HashiCorp.terraform) | HashiCorp | Enable syntax highlighting and other editing features in VS Code using the Terraform Language Server.| |
|[Language Server](https://github.com/hashicorp/terraform-ls) | HashiCorp | Add support for the Terraform configuration language to editors that use the [Language Server Protocol](https://microsoft.github.io/language-server-protocol/), like Sublime Text, vim, emacs, etc.| |
|[console](https://www.terraform.io/docs/cli/commands/console.html) | HashiCorp | Evaluate Terraform expressions and explore your Terraform project's state. The console helps you develop and debug your configuration, especially when working with complex state data and Terraform expressions.| [Develop Configuration with the Console](https://learn.hashicorp.com/tutorials/terraform/console) |
## Manage Infrastructure
|Name | Maintainer |Description| Tutorial |
|-----|------------|-----------|----------|
|[Kubernetes Operator for Terraform](https://github.com/hashicorp/terraform-k8s)| HashiCorp | Manage cloud and on-prem infrastructure through a Kubernetes custom resource definition (CRD) and Terraform Cloud. | [Deploy Infrastructure with the Terraform Cloud Operator for Kubernetes](https://learn.hashicorp.com/tutorials/terraform/kubernetes-operator) |
| [ServiceNow Catalog](/docs/cloud/integrations/service-now/index.html) | HashiCorp | Create Terraform configuration to order Service Items, create workspaces, and perform Terraform runs from ServiceNow.| |
| [Consul Terraform Sync (CTS)](https://github.com/hashicorp/consul-terraform-sync) | HashiCorp | Automatically request network infrastructure updates to accommodate Consul service registrations. Works with A10 ADC, F5 BIG IP, Palo Alto Networks, and more. | [Network Infrastructure Automation (NIA)](https://learn.hashicorp.com/collections/consul/network-infrastructure-automation) |
## Automate Terraform
|Name | Maintainer |Description| Tutorial |
|-----|------------|-----------|----------|
| [`terraform-exec`](https://github.com/hashicorp/terraform-exec) | HashiCorp | Use this Go module to construct and run CLI commands. Refer to the `terraform-json` repository (below) for documentation about the return values. | |
| [`terraform-json`](https://github.com/hashicorp/terraform-json) | HashiCorp | Use the data types and helper functions in this repository to work with JSON-formatted Terraform output.| |
|[TFE Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest) | HashiCorp | Manage Terraform Cloud or Terraform Enterprise with Terraform itself. Create, modify, and delete organizations, workspaces, teams, variables, run triggers, policy sets, and more. | |
| [CircleCI Orb](https://circleci.com/developer/orbs/orb/circleci/terraform) | Third Party | Deploy your Terraform infrastructure with a CircleCI pipeline. CircleCI Orbs let you package, ship, and re-use configurations. | [Deploy Terraform infrastructure with CircleCI](https://learn.hashicorp.com/tutorials/terraform/circle-ci) |
|[GitHub Actions for Terraform](https://github.com/hashicorp/setup-terraform) | Third Party | Automate Terraform in your GitHub Actions workflow. After you have used the action, subsequent steps in the same job can run Terraform commands using the GitHub Actions run syntax. | [Automate Terraform with GitHub Actions](https://learn.hashicorp.com/tutorials/terraform/github-actions) |
## Security and Compliance
|Name | Maintainer |Description| Tutorial |
|-----|------------|-----------|----------|
| [Splunk and Terraform Cloud](/docs/cloud/integrations/splunk/index.html) | HashiCorp | Pull audit logs from Terraform Cloud into Splunk to identify the most active policies, understand significant changes in resource operations, and filter actions by specific users within your organization. | |
| [Sentinel](https://www.terraform.io/docs/cloud/sentinel/index.html) | HashiCorp | Write and enforce fine-grained, logic-based policies for your infrastructure. Sentinel is an embedded policy-as-code framework integrated with the HashiCorp Enterprise products. | [Enforce Policy with Sentinel](https://learn.hashicorp.com/collections/terraform/policy) |
## Develop Terraform Providers
|Name | Maintainer |Description| Tutorial |
|-----|------------|-----------|----------|
| [Plugin SDK](/plugin/sdkv2) | HashiCorp | Develop your own Terraform providers. | [Setup and Implement Read](https://learn.hashicorp.com/tutorials/terraform/provider-setup?in=terraform/providers) |
|[Plugin Framework](/plugin/framework) | HashiCorp | A new SDK to develop your own Terraform providers. The framework provides improvements and additional features beyond what is available in the Plugin SDK. | [Implement Create and Read with the Terraform Plugin Framework](https://learn.hashicorp.com/tutorials/terraform/plugin-framework-create?in=terraform/providers) |
|[`terraform-plugin-mux`](https://github.com/hashicorp/terraform-plugin-mux)| HashiCorp | Combine providers built using different SDKs and frameworks. This lets you upgrade between SDKs or frameworks on a resource-by-resource basis instead of all at once. | |
| [`terraform-plugin-go`](https://github.com/hashicorp/terraform-plugin-go) | HashiCorp | Use low-level Go bindings for the Terraform plugin protocol as a foundation for integrations. | |
| [`terraform-plugin-go-contrib`](https://github.com/hashicorp/terraform-plugin-go-contrib) | HashiCorp | Use this set of common code packages with `terraform-plugin-go`. | |
| [`terraform-plugin-log`](https://github.com/hashicorp/terraform-plugin-log) | HashiCorp | Attach context and information to logs and use multiple loggers to filter log output. | |
## HashiCorp Products
You can use HashiCorp products together to enable self-service automation across teams and organizations.
|Name | Maintainer | Description| Tutorial |
|-----|------------|-----------|----------|
| [HashiCorp Cloud Platform (HCP) Provider](https://registry.terraform.io/providers/hashicorp/hcp/latest) | HashiCorp | Launch and run HashiCorp products as managed services that will be deployed into HashiCorp Virtual Networks (HVNs) and connected to your infrastructure resources. | |
| [Vault provider](https://registry.terraform.io/providers/hashicorp/vault/latest/docs) | HashiCorp | [Vault](https://www.vaultproject.io/) lets you secure, store, and tightly control access to tokens, passwords, certificates, encryption keys, and other sensitive data. Use this provider to read from, write to, and configure Vault. | [Inject Secrets into Terraform Using the Vault Provider](https://learn.hashicorp.com/tutorials/cloud/terraform-hcp-provider-vault)|
|[Consul Provider](https://registry.terraform.io/providers/hashicorp/consul/latest) | HashiCorp | [Consul](https://www.consul.io/) provides service-based networking for dynamic infrastructure. Use this provider to add external services to Consul, work with the key/value store, and more, using Terraform. | [Use Terraform to Register External Services](https://learn.hashicorp.com/tutorials/consul/terraform-consul-provider)|
|[HashiCorp Consul Service (HCS)](https://registry.terraform.io/providers/hashicorp/hcs/latest) | HashiCorp | Provision HashiCorp-managed Consul clusters directly through the Azure Marketplace. | |
| [HCP Packer registry](https://cloud.hashicorp.com/docs/packer) | HashiCorp | [Packer](https://www.packer.io/) lets you create identical machine images for multiple platforms from a single source template. Use the registry to track golden images, designate images for test and production environments, and query images to use in both Packer and Terraform configurations. | [Push Image Metadata to the HCP Packer Registry](https://learn.hashicorp.com/tutorials/packer/hcp-push-image-metadata) |
|[Boundary Provider](https://registry.terraform.io/providers/hashicorp/boundary/latest) | HashiCorp | [Boundary](https://www.boundaryproject.io/) is an intelligent proxy that creates granular, identity-based access controls for dynamic infrastructure. Use this provider to manage Boundary access controls for resources provisioned with Terraform. | |
| [Nomad AWS Module](https://registry.terraform.io/modules/hashicorp/nomad/aws/latest) | Third Party | [Nomad](https://www.nomadproject.io/) is a distributed, highly-available, data-center aware scheduler. Use Terraform to deploy a Nomad cluster on Amazon Web Services (AWS). |

Binary file not shown.

Before

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 67 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 21 KiB

Binary file not shown.

Before

Width:  |  Height:  |  Size: 308 KiB