From the course: Advanced Terraform
Unlock the full course today
Join today to access over 23,700 courses taught by industry experts.
Sensitive data - Terraform Tutorial
From the course: Advanced Terraform
Sensitive data
- [Instructor] The default behavior of Terraform is to include all variable values in Terraform plan, apply, and show commands. Variables often contain sensitive data like usernames and passwords. Sensitive data should not be leaked into plans or console output. Terraform provides a feature that will mark input and output variables as sensitive. Suppose we want to use Google Cloud SQL instead of our VM-based DB instance. The native user account from MySQL and Postgres databases require a username and password. Let's look at the code for this chapter. Execute git checkout 02_04. (keyboard clicking) Now, execute gcloud space services space enable space sqladmin.goodleapis.com. In case you want to deploy this, we'll need this to be able to create the Cloud SQL instance. (keyboard clicking) And then finally, (keyboard clicking) we're going to rerun terraform init. This configuration has an additional resource that has a…
Contents
-
-
-
-
Input variables5m 52s
-
(Locked)
Using input variables6m 23s
-
(Locked)
Output variables5m 50s
-
(Locked)
Sensitive data4m 10s
-
(Locked)
Looping with count7m 59s
-
(Locked)
Looping with for_each3m 26s
-
(Locked)
Expressions and functions6m 33s
-
(Locked)
Introduction to modules2m 38s
-
(Locked)
Using Terraform modules3m 55s
-
-
-
-