content large_stringlengths 3 20.5k | url large_stringlengths 54 193 | branch large_stringclasses 4
values | source large_stringclasses 42
values | embeddings listlengths 384 384 | score float64 -0.21 0.65 |
|---|---|---|---|---|---|
to add the new policy. You can only select policy sets compatible with the chosen policy set framework. If there are no policy sets available, you can [create a new one](#create-policy-sets). The policy is now available in the HCP Terraform UI for you to edit and add to one or more policy sets. #### Edit managed polici... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/manage-policy-sets/index.mdx | main | terraform | [
-0.011576639488339424,
0.014768988825380802,
0.03452688455581665,
-0.01734188199043274,
0.013842360116541386,
0.04253824055194855,
0.002515897387638688,
-0.06626135855913162,
-0.06390103697776794,
0.15098139643669128,
-0.034128692001104355,
-0.056450728327035904,
0.06395741552114487,
-0.02... | -0.015641 |
Terraform shows a form to create a policy set connected to that repository. - For automated workflows, click \*\*No VCS Connection\*\*. HCP Terraform shows a form to create an empty policy set. You can use the API to add policies to this empty policy set later. 1. Choose a \*\*Policy framework\*\* for the policies you ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/manage-policy-sets/index.mdx | main | terraform | [
-0.036064889281988144,
0.0025042358320206404,
0.02318938635289669,
-0.016288047656416893,
-0.01060237642377615,
0.010340956039726734,
0.021831190213561058,
-0.07170477509498596,
-0.006185824517160654,
0.11510631442070007,
-0.04797060415148735,
-0.09286419302225113,
0.03172069787979126,
0.0... | 0.035616 |
settings and click \*\*Update policy set\*\*. ### Evaluate a policy runtime upgrade For OPA and Sentinel policy sets using agents, we recommend choosing a specific runtime version for your policy set to ensure consistent behavior. HCP Terraform and Terraform Enterprise no longer supports the `latest` tag for OPA policy... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/manage-policy-sets/index.mdx | main | terraform | [
0.0019130632281303406,
-0.0103034358471632,
0.0688566043972969,
-0.03462880849838257,
0.00404382636770606,
-0.06962715089321136,
-0.06154618039727211,
-0.05898287519812584,
-0.03257074952125549,
0.1000949814915657,
-0.01397516205906868,
-0.032288677990436554,
-0.02504446543753147,
-0.01130... | 0.000251 |
# Configure a Sentinel policy set with a VCS repository To enable policy enforcement, you must group Sentinel policies into policy sets. You can then apply those policy sets globally or to specific [projects](/terraform/cloud-docs/projects/manage) and workspaces. @include 'tfc-package-callouts/policies.mdx' One way to ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/manage-policy-sets/sentinel-vcs.mdx | main | terraform | [
-0.0014656811254099011,
-0.0341072753071785,
0.013395879417657852,
-0.05015052855014801,
-0.0005655868444591761,
0.032689157873392105,
0.009097123518586159,
-0.055672917515039444,
-0.0020073093473911285,
0.07131915539503098,
-0.03622801974415779,
-0.060594797134399414,
0.05117619037628174,
... | 0.047808 |
false, the rule is not evaluated and returns true. Finally, the example uses parameters to facilitate module reuse within Terraform. Refer to the [Sentinel parameter documentation](/sentinel/docs/language/parameters) for details. ```hcl import "time" import "tfrun" import "timezone" param token default "WbNKULOBheqV" p... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/manage-policy-sets/sentinel-vcs.mdx | main | terraform | [
-0.012414602562785149,
0.01506882719695568,
0.06429408490657806,
0.04367939382791519,
0.0414905920624733,
-0.038659434765577316,
0.038212019950151443,
-0.006927721668034792,
-0.026568276807665825,
0.0525888092815876,
-0.06858217716217041,
-0.09649887681007385,
-0.013147898949682713,
0.0138... | 0.086828 |
# Configure an OPA policy set with a VCS repository To enable policy enforcement, you must group OPA policies into policy sets and apply those policy sets globally or to specific [projects](/terraform/cloud-docs/projects/manage) and workspaces. > \*\*Hands-on:\*\* Try the [Detect Infrastructure Drift and Enforce OPA Po... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/manage-policy-sets/opa-vcs.mdx | main | terraform | [
-0.026194589212536812,
0.00785592757165432,
0.06667562574148178,
-0.053536612540483475,
-0.022806894034147263,
-0.05880415067076683,
-0.009939100593328476,
-0.06927427649497986,
0.017486434429883957,
0.0720740556716919,
-0.007397790439426899,
-0.047668829560279846,
0.028799613937735558,
-0... | 0.012282 |
-> \*\*Note:\*\* This is documentation for the next version of the `tfstate` Sentinel import, designed specifically for Terraform 0.12. This import requires Terraform 0.12 or higher, and must currently be loaded by path, using an alias, example: `import "tfstate/v2" as tfstate`. # tfstate/v2 Sentinel import The `tfstat... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate-v2.mdx | main | terraform | [
-0.029476070776581764,
-0.015151423402130604,
0.015326186083257198,
-0.025310110300779343,
0.03925075754523277,
-0.006940439809113741,
0.04303285479545593,
-0.039112161844968796,
0.002719488460570574,
0.03575166314840317,
-0.03783399611711502,
-0.06418929994106293,
0.016313211992383003,
-0... | 0.154162 |
with pre-release versions (example: `0.12.0beta1`). Future versions of this import will include helpers to assist with processing versions that will account for these kinds of exceptions. ## The `resources` Collection The `resources` collection is a collection representing all of the resources in the state, across all ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate-v2.mdx | main | terraform | [
-0.05141504481434822,
0.02091391570866108,
-0.016470029950141907,
0.05307997390627861,
0.08398152142763138,
-0.04301143437623978,
0.01878119632601738,
-0.0379675067961216,
0.006943580228835344,
-0.013283561915159225,
0.022884301841259003,
-0.022602658718824387,
0.10087119042873383,
-0.0526... | 0.047552 |
# tfrun Sentinel import reference The `tfrun` import provides access to data associated with a [Terraform run][run-glossary]. @include 'tfc-package-callouts/policies.mdx' This import currently consists of run attributes, as well as namespaces for the `organization`, `workspace` and `cost-estimate`. Each namespace provi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfrun.mdx | main | terraform | [
-0.034029409289360046,
0.0008736985619179904,
0.021001648157835007,
-0.00248105195350945,
-0.02726253680884838,
-0.030852241441607475,
0.05031345412135124,
-0.04953046143054962,
0.023016231134533882,
0.08414127677679062,
-0.010921608656644821,
-0.12530043721199036,
0.023779090493917465,
-0... | 0.132639 |
the `replace-addrs` attribute in the API. Will be null if no resource targets are specified. ### Value: `speculative` \* \*\*Value Type:\*\* Boolean. Specifies whether the plan associated with the run is a [speculative plan](/terraform/cloud-docs/workspaces/run/remote-operations#speculative-plans) only. ### Value: `tar... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfrun.mdx | main | terraform | [
-0.01809627376496792,
0.030520213767886162,
0.04901162534952164,
-0.01889745332300663,
0.019804339855909348,
-0.06676195561885834,
0.01097145862877369,
-0.10204111784696579,
0.020525721833109856,
0.040195271372795105,
-0.01925910823047161,
-0.11611612886190414,
0.04060082882642746,
-0.0181... | -0.006121 |
### Value: `vcs\_repo` \* \*\*Value Type:\*\* A string-keyed map of values. Contains data associated with a VCS repository connected to the workspace. Details regarding each attribute can be found in the documentation for the HCP Terraform [Workspaces API](/terraform/cloud-docs/api-docs/workspaces). This value can be `... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfrun.mdx | main | terraform | [
-0.005882018245756626,
0.05280306935310364,
0.01876404881477356,
0.043744321912527084,
-0.016691699624061584,
0.005265553016215563,
0.019823379814624786,
-0.03040136955678463,
0.02964256890118122,
0.08166410773992538,
-0.024929052218794823,
-0.16929173469543457,
0.10123056173324585,
-0.044... | 0.06284 |
# tfconfig Sentinel import ~> \*\*Warning:\*\* The `tfconfig` import is now deprecated and will be permanently removed in August 2025. We recommend that you start using the updated [tfconfig/v2](/terraform/cloud-docs/policy-enforcement/import-reference/tfconfig-v2) import as soon as possible to avoid disruptions. The `... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.02689613774418831,
-0.014453859999775887,
0.018468255177140236,
-0.020745260640978813,
0.06009069085121155,
-0.008242922835052013,
0.007745780050754547,
-0.03890826553106308,
0.00635113101452589,
0.048501066863536835,
0.003489350201562047,
-0.05377423018217087,
0.0050857397727668285,
0.... | 0.087235 |
├── config (map of keys) │ │ ├── references (map of keys) (TF 0.12 and later) │ │ └── provisioners │ │ └── NUMBER │ │ ├── config (map of keys) │ │ ├── references (map of keys) (TF 0.12 and later) │ │ └── type (string) │ └── variables │ └── NAME │ ├── default (value) │ └── description (string) ├── module\_paths ([][]str... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.03724582865834236,
0.06801741570234299,
-0.0037875273264944553,
0.008692199364304543,
0.022823186591267586,
-0.0028043778147548437,
0.04597160965204239,
-0.001692384947091341,
-0.0032971655018627644,
0.02303023263812065,
0.03345199674367905,
-0.09298020601272583,
0.10694249719381332,
-0... | 0.010825 |
main = rule { subject.module(["foo"]).resources.null\_resource.foo.config.triggers[0].foo is "bar" } ``` ### Value: `module\_paths` \* \*\*Value Type:\*\* List of a list of strings. The `module\_paths` value within the [root namespace](#namespace-root) is a list of all of the modules within the Terraform configuration.... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.03719453886151314,
0.04247044026851654,
0.035069722682237625,
0.026302680373191833,
0.061476729810237885,
-0.06519405543804169,
0.038429148495197296,
-0.047721873968839645,
0.01969507709145546,
0.014742914587259293,
0.021722886711359024,
-0.052058737725019455,
0.0779787078499794,
-0.027... | 0.028069 |
data sources, use the same syntax, except with `data` in place of `resources`. ### Value: `config` \* \*\*Value Type:\*\* A string-keyed map of values. The `config` value within the [resource namespace](#namespace-resources-data-sources) is a map of key-value pairs that directly map to Terraform config keys and values.... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.05763954669237137,
0.06357241421937943,
-0.006939605809748173,
0.027385588735342026,
-0.005842703394591808,
-0.02335551753640175,
0.08406446874141693,
-0.03662044182419777,
-0.012305022217333317,
0.025762634351849556,
-0.0019502838840708137,
-0.10346728563308716,
0.1189611628651619,
-0.... | 0.039948 |
tfconfig.resources.null\_resource.foo.provisioners[0].type is "local-exec" } ``` ## Namespace: Module Configuration The \*\*module configuration\*\* namespace displays data on \_module configuration\_ as it is given within a `module` block. This means that the namespace concerns itself with the contents of the declarat... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.04061690345406532,
0.005220895167440176,
-0.08025066554546356,
0.07156158238649368,
0.00503462553024292,
-0.03213485702872276,
0.07971451431512833,
0.04517602548003197,
-0.005073751322925091,
-0.0699511170387268,
0.04651844501495361,
-0.08792562782764435,
0.043026357889175415,
0.0043485... | -0.011714 |
within the [output namespace](#namespace-outputs) represents the defined description for this output. As an example, given the following output declaration block: ```hcl output "id" { description = "foobar" value = "${null\_resource.foo.id}" } ``` The following policy would evaluate to `true`: ```python import "tfconfi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.040043629705905914,
0.05796709284186363,
-0.05222969874739647,
0.052530061453580856,
0.03586456924676895,
-0.013364746235311031,
0.0694895014166832,
-0.006750090047717094,
0.04489085450768471,
-0.06024978682398796,
-0.021168241277337074,
-0.10921646654605865,
0.10501951724290848,
0.0301... | 0.09025 |
tfconfig.providers.aws.alias.east.config.region is "us-east-1" } ``` ### Value: `config` \* \*\*Value Type:\*\* A string-keyed map of values. -> \*\*With Terraform 0.11 or earlier\*\*, if the config value is defined as an expression (and not a static value), the value will be in its raw, non-interpolated string. \*\*Wi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig.mdx | main | terraform | [
-0.003785186680033803,
0.04755531623959541,
0.062043558806180954,
-0.01721118576824665,
0.0086493119597435,
-0.023880772292613983,
0.051422350108623505,
-0.02899443916976452,
0.007498595397919416,
0.04444010928273201,
0.01727701909840107,
-0.1001087948679924,
0.03397601842880249,
-0.031577... | -0.036938 |
# tfplan Sentinel import reference ~> \*\*Warning:\*\* The `tfplan` import is now deprecated and will be permanently removed in August 2025. We recommend that you start using the updated [tfplan/v2](/terraform/cloud-docs/policy-enforcement/import-reference/tfplan-v2) import as soon as possible to avoid disruptions. The... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan.mdx | main | terraform | [
-0.06409687548875809,
0.013351762667298317,
0.051797594875097275,
0.0035025053657591343,
0.11129549890756607,
-0.055799830704927444,
-0.011994271539151669,
-0.02888433448970318,
-0.006167371291667223,
0.10345572233200073,
-0.002045739209279418,
-0.019316652789711952,
-0.017609981819987297,
... | 0.100218 |
``` module = func(ADDR) ``` \* \*\*Return Type:\*\* A [module namespace](#namespace-module). The `module()` function in the [root namespace](#namespace-root) returns the [module namespace](#namespace-module) for a particular module address. The address must be a list and is the module address, split on the period (`.`)... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan.mdx | main | terraform | [
-0.0835341364145279,
-0.05687649920582771,
-0.03738628327846527,
0.06254146993160248,
0.005387785378843546,
-0.04808364808559418,
0.029561465606093407,
0.007390697952359915,
0.01699981652200222,
-0.07212518155574799,
0.04742474853992462,
-0.016232077032327652,
0.01907929964363575,
0.026739... | 0.143482 |
/terraform/cloud-docs/policy-enforcement/import-reference/tfconfig-v2#value-default [import-tfconfig-variables]: /terraform/cloud-docs/policy-enforcement/import-reference/tfconfig-v2#namespace-variables If a default was accepted for the particular variable, the default value will be populated here. As an example, given... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan.mdx | main | terraform | [
0.001114736427552998,
0.05641666054725647,
0.03303912654519081,
0.006159094162285328,
-0.0115357656031847,
0.0027601136825978756,
0.042823273688554764,
-0.05449410900473595,
0.003804614534601569,
0.05120697617530823,
0.02212405577301979,
-0.08628201484680176,
0.03183482214808464,
0.0138662... | -0.02844 |
fetch all resources within the root module, irrespective of type, use `tfplan.resources`. This is indexed by type, as shown above with `tfplan.resources.aws\_instance`, with names being the next level down, and so on. ~> When [resource targeting](/terraform/cli/commands/plan#resource-targeting) is in effect, `tfplan.re... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan.mdx | main | terraform | [
-0.030149834230542183,
0.032075848430395126,
0.023432569578289986,
0.00382906012237072,
0.09000377357006073,
-0.08278246223926544,
0.06570945680141449,
-0.0580616295337677,
0.07043115049600601,
0.060721371322870255,
0.005476485006511211,
-0.07478755712509155,
0.04581541568040848,
-0.023191... | 0.004083 |
resource: ```hcl resource "null\_resource" "foo" { triggers = { foo = "bar" } } ``` The following policy would evaluate to `true` if one of the `triggers` in `null\_resource.foo` was being changed: ```python import "tfplan" main = rule { tfplan.resources.null\_resource.foo[0].requires\_new } ``` ## Namespace: Resource ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan.mdx | main | terraform | [
-0.09685356169939041,
0.03681252524256706,
0.008274381048977375,
0.03493422269821167,
0.06570509821176529,
-0.10693689435720444,
0.11272959411144257,
-0.0725889652967453,
0.052446264773607254,
-0.0004446349339559674,
0.06401326507329941,
-0.07375504076480865,
0.08349518477916718,
-0.027561... | 0.044744 |
{ triggers = { foo = "bar" } } ``` The following policy would evaluate to `true`: ```python import "tfplan" main = rule { tfplan.resources.null\_resource.foo[0].diff["triggers.foo"].old is "bar" } ``` | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan.mdx | main | terraform | [
-0.04542157053947449,
0.08054868876934052,
0.016872096806764603,
0.007234801538288593,
0.08241897821426392,
-0.09327882528305054,
0.11169548332691193,
-0.019766394048929214,
0.022047393023967743,
0.006707118358463049,
0.0636165514588356,
-0.017288483679294586,
0.052241772413253784,
-0.0055... | 0.031868 |
# `import` function reference overview This topic provides an overview of the Sentinel `import` function, which you can use to import Sentinel libraries into your custom Sentinel policies. Refer to [Define custom Sentinel policies](/terraform/cloud-docs/policy-enforcement/define-policies/custom-sentinel) for additional... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/index.mdx | main | terraform | [
-0.019908303394913673,
-0.0028841490857303143,
0.007713188882917166,
-0.03649124875664711,
0.06305419653654099,
0.014782475307583809,
0.0037118084728717804,
-0.026531072333455086,
-0.039265263825654984,
0.05255556479096413,
-0.004310637712478638,
-0.03926292434334755,
0.029786445200443268,
... | 0.101026 |
-> \*\*Note:\*\* This is documentation for the next version of the `tfconfig` Sentinel import, designed specifically for Terraform 0.12. This import requires Terraform 0.12 or higher, and must currently be loaded by path, using an alias, example: `import "tfconfig/v2" as tfconfig`. # tfconfig/v2 Sentinel import The `tf... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig-v2.mdx | main | terraform | [
-0.022201385349035263,
-0.02068931981921196,
-0.01295444369316101,
-0.032103534787893295,
0.010452162474393845,
-0.02329627238214016,
0.016292601823806763,
-0.013374322094023228,
0.025568349286913872,
0.0375109426677227,
-0.009377783164381981,
-0.05118722468614578,
-0.010941706597805023,
-... | 0.136529 |
all output definitions across all modules in the configuration. \* [`module\_calls`](#the-module\_calls-collection) - The configuration of all module calls (individual [`module`](/terraform/language/modules) blocks) across all modules in the configuration. These collections are specifically designed to be used with the... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig-v2.mdx | main | terraform | [
-0.02836833894252777,
0.01717471331357956,
-0.028058597818017006,
0.059979017823934555,
0.08404397964477539,
-0.015228988602757454,
0.05993224307894707,
-0.06638014316558838,
0.030406109988689423,
-0.02357112057507038,
-0.02964700572192669,
-0.07096078246831894,
0.013015640899538994,
0.019... | 0.079666 |
`references` field. More details on this field can be found in the [expression representation](/terraform/internals/json-format#expression-representation) section of the JSON output format documentation. For example, to determine if an output is based on a particular resource value, one could do: ``` import "tfconfig/v... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig-v2.mdx | main | terraform | [
-0.09554888308048248,
0.07704740017652512,
0.005110662896186113,
0.03531361743807793,
0.06974311172962189,
-0.008413729257881641,
0.02950320765376091,
-0.021065784618258476,
0.0894264504313469,
-0.012073584832251072,
-0.04268697276711464,
-0.07797187566757202,
0.024541031569242477,
0.01253... | 0.072673 |
a list indexed by the order the provisioners show up in the resource. \* `config` - The [block expression representation](#block-expression-representation) of the configuration values found in the resource. \* `count` - The [expression data](#expression-representations) for the `count` value in the resource. \* `for\_e... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig-v2.mdx | main | terraform | [
-0.062101561576128006,
0.04839523509144783,
0.001620491617359221,
0.06675222516059875,
0.08678627014160156,
-0.01311059482395649,
0.08463161438703537,
-0.07069575786590576,
0.03886392340064049,
-0.011342168785631657,
0.00997111201286316,
-0.0054817721247673035,
0.051000695675611496,
-0.007... | 0.08467 |
indexed by the key format `module\_address:name`, with each field matching their respective name below. `module\_address` and the colon delimiter are omitted for the root module. \* `module\_address` - The address of the module the declaration was found in. \* `name` - The name of the module. \* `source` - The contents... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfconfig-v2.mdx | main | terraform | [
-0.014952786266803741,
0.01160228531807661,
-0.04759687930345535,
0.06183525174856186,
-0.0009574988507665694,
0.01727943681180477,
0.06272298842668533,
-0.007273306138813496,
0.01559393759816885,
-0.07141625136137009,
-0.010289841331541538,
-0.02433437667787075,
0.06284923851490021,
-0.06... | 0.105789 |
-> \*\*Note:\*\* This is documentation for the next version of the `tfplan` Sentinel import, designed specifically for Terraform 0.12. This import requires Terraform 0.12 or higher, and must currently be loaded by path, using an alias, example: `import "tfplan/v2" as tfplan`. # tfplan/v2 Sentinel import The `tfplan/v2`... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan-v2.mdx | main | terraform | [
-0.05394239351153374,
0.04310164973139763,
0.044737424701452255,
-0.024787645787000656,
0.03549912944436073,
-0.07212135195732117,
0.010386945679783821,
-0.018259476870298386,
0.03382107987999916,
0.08057025820016861,
0.0005765420501120389,
-0.047507524490356445,
-0.014790565706789494,
-0.... | 0.111205 |
having to write complex discovery code. As an example, the following code will return all `aws\_instance` resource changes, across all modules in the plan: ``` all\_aws\_instances = filter tfplan.resource\_changes as \_, rc { rc.mode is "managed" and rc.type is "aws\_instance" } ``` You can add specific attributes to t... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan-v2.mdx | main | terraform | [
-0.052092768251895905,
0.08542500436306,
-0.021616963669657707,
0.054608579725027084,
0.09180734306573868,
-0.019340800121426582,
0.08985361456871033,
-0.07106125354766846,
0.03368840366601944,
-0.011767405085265636,
0.00013926016981713474,
-0.07078837603330612,
0.049088310450315475,
0.008... | 0.038971 |
- Applies to default lifecycle configurations. \* \*\*Create-before-destroy:\*\* `["create", "delete"]` - Applies when [`create\_before\_destroy`](/terraform/language/meta-arguments/lifecycle#create\_before\_destroy) is used in a lifecycle configuration. Note that, in most situations, the plan will list all "changes", ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan-v2.mdx | main | terraform | [
-0.051121462136507034,
0.08688022196292877,
0.045557960867881775,
-0.01097483653575182,
0.09553036838769913,
-0.05630125850439072,
0.08252564072608948,
-0.08909790217876434,
0.060810305178165436,
0.05000657960772514,
-0.009907620027661324,
-0.0577496737241745,
0.003558229887858033,
0.02366... | 0.014892 |
the collection key. \* `value` - The value of the variable assigned during the plan. ## The `planned\_values` Collection The `planned\_values` collection is a special collection in that it contains two fields that alias to state collections with the \_planned\_ state set. This is the best prediction of what the state w... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan-v2.mdx | main | terraform | [
-0.05057692900300026,
0.06916394829750061,
-0.024026699364185333,
0.0008602701709605753,
0.02071167342364788,
-0.005549078807234764,
0.025371968746185303,
-0.06385510414838791,
0.06998927891254425,
0.05184057727456093,
-0.006327833514660597,
-0.06209465116262436,
0.06089325249195099,
-0.05... | 0.090259 |
value are below: \* `name` - The name of the output, also the index key. \* `change` - The data describing the change that will be made to this output. For more details, see [Change Representation](#change-representation). ## The `raw` Collection The `raw` collection exposes the raw, unprocessed plan data, direct from ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfplan-v2.mdx | main | terraform | [
-0.04709022864699364,
0.1126607209444046,
0.007079934701323509,
-0.03387277573347092,
0.0003248772118240595,
0.0040377406403422356,
-0.03954034298658371,
-0.06217649206519127,
-0.004732224624603987,
0.022422460839152336,
0.019566088914871216,
-0.07495642453432083,
0.04301362484693527,
-0.0... | 0.021836 |
# Import: tfstate ~> \*\*Warning:\*\* The `tfstate` import is now deprecated and will be permanently removed in August 2025. We recommend that you start using the updated [tfstate/v2](/terraform/cloud-docs/policy-enforcement/import-reference/tfstate-v2) import as soon as possible to avoid disruptions. The `tfstate/v2` ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate.mdx | main | terraform | [
-0.025954974815249443,
0.010516108945012093,
0.034797269850969315,
-0.04610768333077431,
0.06678874045610428,
0.004703056998550892,
0.03694656863808632,
-0.06360868364572525,
-0.00002798072455334477,
0.06910569220781326,
-0.032324548810720444,
-0.06741432845592499,
0.03264797478914261,
-0.... | 0.073588 |
triggers = { foo = "bar" } } ``` The following policy would evaluate to `true` if the resource was present in the state: ```python import "tfstate" main = rule { tfstate.module(["foo"]).resources.null\_resource.foo[0].attr.triggers.foo is "bar" } ``` ### Value: `module\_paths` \* \*\*Value Type:\*\* List of a list of s... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate.mdx | main | terraform | [
-0.033358387649059296,
0.01960417442023754,
0.06420700997114182,
0.03153739124536514,
0.08174040913581848,
-0.058276984840631485,
0.06738080084323883,
-0.061828941106796265,
0.04538555070757866,
0.03763439133763313,
0.017638031393289566,
-0.05828295275568962,
0.08997729420661926,
-0.011919... | 0.070282 |
`path` value within the [module namespace](#namespace-module) contains the path of the module that the namespace represents. This is represented as a list of strings. As an example, if the following module block was present within a Terraform configuration: ```hcl module "foo" { # ... } ``` The following policy would e... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate.mdx | main | terraform | [
-0.05502140149474144,
0.0243468526750803,
-0.005822137929499149,
0.033554740250110626,
0.035532910376787186,
-0.04482104629278183,
0.08626363426446915,
-0.05178019031882286,
0.046871840953826904,
-0.003278611460700631,
-0.020837103947997093,
-0.08112768828868866,
0.08579820394515991,
0.019... | 0.057605 |
= "bar" } } resource "null\_resource" "bar" { # ... depends\_on = [ "null\_resource.foo", ] } ``` The following policy would evaluate to `true` if the resource was in the state: ```python import "tfstate" main = rule { tfstate.resources.null\_resource.bar[0].depends\_on contains "null\_resource.foo" } ``` ### Value: `i... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate.mdx | main | terraform | [
-0.08534706383943558,
0.05107903108000755,
0.0020595965906977654,
0.03421308472752571,
0.0217521283775568,
-0.030452268198132515,
0.11742690205574036,
-0.04496360942721367,
0.007106519304215908,
0.005658650770783424,
-0.015850631520152092,
-0.0908735990524292,
0.08137353509664536,
0.014739... | 0.035953 |
question. Note that the only valid primitive output type in Terraform is currently a string, which means that any int, float, or boolean value will need to be converted before it can be used in comparison. This does not apply to primitives within maps and lists, which will be their original types. As an example, given ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/import-reference/tfstate.mdx | main | terraform | [
0.030025547370314598,
0.09884725511074066,
0.05282570794224739,
-0.013828014954924583,
0.012539158575236797,
-0.012011914514005184,
0.03809187561273575,
-0.04913131892681122,
-0.04073571786284447,
0.040057867765426636,
-0.0525004044175148,
-0.07284688949584961,
0.03933482617139816,
0.03683... | 0.001795 |
# Define Sentinel policies in HCP Terraform This topic describes how to create and manage custom policies using Sentinel policy language. For instructions about how to use pre-written Sentinel policies from the registry, refer to [Run pre-written Sentinel policies](/terraform/cloud-docs/policy-enforcement/prewritten-se... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/custom-sentinel.mdx | main | terraform | [
-0.01175743993371725,
-0.0018396046943962574,
0.009777112863957882,
-0.02918793447315693,
0.019625086337327957,
0.02346244640648365,
0.03257221728563309,
-0.013192393817007542,
-0.03144446015357971,
0.06781642884016037,
-0.03454133868217468,
-0.05202079564332962,
0.042177725583314896,
-0.0... | 0.094111 |
example function does several useful things while finding resources: - It checks every module (including the root module) for resources of the specified type by iterating over the `module\_paths` namespace. The top-level `resources` namespace is more convenient, but it only reveals resources from the root module. - It ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/custom-sentinel.mdx | main | terraform | [
-0.038305237889289856,
0.009637638926506042,
0.017240585759282112,
0.061060961335897446,
0.10568807274103165,
-0.06434077769517899,
0.032690323889255524,
-0.04165464639663696,
0.03105958364903927,
0.017063291743397713,
-0.025554321706295013,
-0.030995098873972893,
0.007536532357335091,
0.0... | 0.198271 |
condition in this case since the applied value will not be known. While this function allows a rule to validate an attribute against a list, some rules will only need to validate an attribute against a single value; in those cases, you could either use a list with a single value or embed that value inside the function ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/custom-sentinel.mdx | main | terraform | [
-0.01951713114976883,
0.07363714277744293,
0.03276318311691284,
0.0291381124407053,
0.08129415661096573,
-0.04872016981244087,
0.04684846103191376,
0.007942628115415573,
-0.07465439289808273,
-0.05401398614048958,
-0.038367584347724915,
-0.061663128435611725,
0.05526767671108246,
0.0792669... | 0.017452 |
# Define policies overview This topic provides overview information about how to define policies as code. Policies are rules for enforcing how Terraform provisions infrastructure as code for your workspaces and projects. ## Workflows You can use two policy-as-code frameworks to define fine-grained, logic-based policies... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/index.mdx | main | terraform | [
-0.03723403438925743,
0.01749821938574314,
0.026996079832315445,
-0.0023833352606743574,
0.019651029258966446,
-0.05538618192076683,
-0.00474339397624135,
-0.04923514276742935,
-0.014987451955676079,
0.10599169135093689,
-0.049891382455825806,
-0.0352533720433712,
0.012404512614011765,
0.0... | 0.103447 |
# Define Open Policy Agent policies for HCP Terraform This topic describes how to create and manage custom policies using the open policy agent (OPA) framework. Refer to the following topics for instructions on using HashiCorp Sentinel policies: - [Define custom Sentinel policies](/terraform/cloud-docs/policy-enforceme... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/opa.mdx | main | terraform | [
-0.021769443526864052,
0.038208574056625366,
0.05248064547777176,
-0.03711549565196037,
-0.007468828000128269,
-0.05995792895555496,
0.023004913702607155,
-0.011045261286199093,
-0.03226390853524208,
0.09780768305063248,
-0.01487121544778347,
-0.05648770555853844,
0.036523908376693726,
-0.... | 0.109724 |
msg := sprintf( "HCP Terraform workspace %s has been configured to automatically provision Terraform infrastructure. Change the workspace Apply Method settings to 'Manual Apply'", [run.workspace.name], ) } ``` The following test validates `block\_auto\_apply\_runs`. The test is written in rego and uses the OPA [test fo... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/opa.mdx | main | terraform | [
-0.0314369797706604,
0.008281601592898369,
0.019204355776309967,
-0.002223346149548888,
0.0042644161731004715,
-0.06992821395397186,
-0.03548358380794525,
-0.018318675458431244,
-0.01431233435869217,
0.09488648921251297,
0.004992095287889242,
-0.09132932871580124,
0.006792341358959675,
0.0... | 0.020279 |
property is a boolean, indicating whether the variable is a [sensitive value](/terraform/cloud-docs/variables/managing-variables#sensitive-values). | #### Project Namespace The following table contains the properties for the `project` namespace. | Property Name | Type | Description | |---------- | ------------ | ------... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/policy-enforcement/define-policies/opa.mdx | main | terraform | [
-0.0031168016139417887,
0.02705984376370907,
-0.005960042588412762,
0.05822720006108284,
-0.06420902907848358,
-0.007881661877036095,
0.05896187201142311,
-0.07057633250951767,
0.011496873572468758,
0.047144487500190735,
-0.01993955858051777,
-0.13719874620437622,
0.09478937834501266,
-0.0... | 0.042119 |
[private]: /terraform/cloud-docs/registry [speculative plan]: /terraform/cloud-docs/workspaces/run/remote-operations#speculative-plans [tfe-provider]: https://registry.terraform.io/providers/hashicorp/tfe/latest/docs # The CLI-driven remote run workflow > \*\*Hands-on:\*\* Try the [Log in to HCP Terraform from the CLI]... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/cli.mdx | main | terraform | [
0.006843152921646833,
0.02304481714963913,
0.00923018530011177,
-0.06099811568856239,
-0.05060475692152977,
-0.05503048375248909,
-0.0684325248003006,
-0.04181019961833954,
0.019152343273162842,
0.053740035742521286,
-0.06047120317816734,
-0.08168606460094452,
0.04192504286766052,
-0.00820... | 0.07865 |
{ organization = "my-org" workspaces { tags = ["networking"] } } } ``` -> \*\*Note:\*\* The `cloud` block is available in Terraform v1.1 and later. Previous versions can use the [`remote` backend](/terraform/language/settings/backends/remote) to configure the CLI workflow and migrate state. 1. Run `terraform init`. ```... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/cli.mdx | main | terraform | [
-0.01631852239370346,
-0.0502442792057991,
0.05815042927861214,
-0.04984477162361145,
0.00338270072825253,
-0.034816160798072815,
-0.04321931675076485,
-0.11634007841348648,
-0.020878806710243225,
0.03724392130970955,
0.011775882914662361,
-0.06664030998945236,
0.016977844759821892,
-0.001... | 0.021909 |
-> \*\*Version note:\*\* `.terraformignore` support was added in Terraform 0.12.11. CLI-driven runs upload an archive of your configuration directory to HCP Terraform. If the directory contains files you want to exclude from upload, you can do so by defining a [`.terraformignore` file in your configuration directory](/... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/cli.mdx | main | terraform | [
0.006968043744564056,
0.07622607797384262,
0.0034983642399311066,
-0.0007767052738927305,
0.004085786174982786,
-0.04714100435376167,
-0.0042081004939973354,
-0.07424517720937729,
0.012232520617544651,
0.03224698081612587,
-0.02458438090980053,
-0.05163881182670593,
0.053925395011901855,
-... | 0.00395 |
run `terraform apply -auto-approve` with the saved plan. - \*\*Remote Execution:\*\* HCP Terraform does not support uploading saved plans for remote execution, so we recommend running `terraform apply -auto-approve` immediately after approving the speculative plan to prevent the plan from becoming stale. !> \*\*Warning... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/cli.mdx | main | terraform | [
-0.025779936462640762,
0.04778052493929863,
0.0850013718008995,
-0.033010903745889664,
0.019601695239543915,
-0.037463508546352386,
-0.07208839058876038,
-0.07131549715995789,
-0.007094904780387878,
0.10232435166835785,
-0.03672488033771515,
-0.06756589561700821,
0.018176674842834473,
-0.0... | -0.011579 |
terraform apply [...] Plan: 1 to add, 0 to change, 1 to destroy. ------------------------------------------------------------------------ Organization policy check: Sentinel Result: false Sentinel evaluated to false because one or more Sentinel policies evaluated to false. This false was not due to an undefined value o... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/cli.mdx | main | terraform | [
-0.012100991792976856,
0.008677566424012184,
0.07996132224798203,
0.02041669376194477,
0.05257304757833481,
-0.05682120472192764,
-0.0025855661369860172,
-0.057367030531167984,
-0.003327737096697092,
0.12485141307115555,
-0.013136018067598343,
-0.047316811978816986,
0.004605788737535477,
0... | 0.015363 |
# HCP Terraform's run environment HCP Terraform is designed as an execution platform for Terraform, and most of its features are based around its ability to perform Terraform runs in a fleet of disposable worker VMs. This page describes some features of the run environment for Terraform runs managed by HCP Terraform. #... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/run-environment.mdx | main | terraform | [
0.031664200127124786,
0.034255798906087875,
0.03536604717373848,
-0.0189621951431036,
-0.011586309410631657,
-0.04232972115278244,
-0.081743523478508,
-0.06781087070703506,
-0.02210419625043869,
0.037393968552351,
-0.04695853218436241,
-0.0405987873673439,
0.005765355192124844,
-0.04737512... | 0.110405 |
Previous versions can use the [`remote` backend](/terraform/language/settings/backends/remote) to configure the CLI workflow and migrate state. ### Autogenerated API Token Instead of using existing user credentials, HCP Terraform generates a unique per-run API token and provides it to the Terraform worker in the [CLI c... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/run-environment.mdx | main | terraform | [
-0.03295611962676048,
-0.02449401281774044,
0.003346903482452035,
-0.05369812995195389,
-0.041745491325855255,
0.005954259540885687,
-0.028064018115401268,
-0.0448574498295784,
0.011891704052686691,
0.02296445518732071,
-0.07249952852725983,
-0.06588618457317352,
0.048081863671541214,
0.02... | 0.059167 |
| The name of the branch that the associated Terraform configuration version was ingressed from. | `main` | | `TFC\_CONFIGURATION\_VERSION\_GIT\_COMMIT\_SHA` | The full commit hash of the commit that the associated Terraform configuration version was ingressed from. | `abcd1234...` | | `TFC\_CONFIGURATION\_VERSION\_GIT... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/run-environment.mdx | main | terraform | [
0.018017971888184547,
0.03113352134823799,
-0.008480967953801155,
-0.021396655589342117,
0.016563288867473602,
0.007610526867210865,
0.005989175755530596,
-0.013531124219298363,
0.05008010193705559,
0.05697305500507355,
0.010335986502468586,
-0.03712739795446396,
0.04420219734311104,
-0.05... | 0.050098 |
# Run states and stages Each plan and apply run passes through several stages of action: pending, plan, cost estimation, policy check, apply, and completion. HCP Terraform shows a run's progress through each stage as a run state. In the list of workspaces on HCP Terraform's main page, each workspace shows the state of ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/states.mdx | main | terraform | [
-0.005277056712657213,
0.03621301054954529,
0.06790453940629959,
-0.0027016308158636093,
0.008586659096181393,
-0.016931898891925812,
0.0011096770176663995,
-0.1071915253996849,
0.00726680364459753,
0.04509966820478439,
-0.040115274488925934,
-0.067698173224926,
0.04295223206281662,
-0.052... | 0.073179 |
in this stage:\_ - \*\*Planning:\*\* HCP Terraform is currently running `terraform plan`. - \*\*Needs Confirmation:\*\* `terraform plan` has finished. Runs sometimes pause in this state, depending on the workspace and organization settings. \_Leaving this stage:\_ - If the `terraform plan` command failed, the run does ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/states.mdx | main | terraform | [
-0.0028990551363676786,
0.05298550799489021,
0.06551044434309006,
0.021057171747088432,
0.03366817533969879,
-0.006691907066851854,
-0.007905859500169754,
-0.0759214237332344,
0.016351159662008286,
0.07680163532495499,
-0.025557152926921844,
-0.07131443917751312,
0.035040728747844696,
-0.0... | 0.104861 |
you enabled [Open Policy Agent (OPA) policies](/terraform/cloud-docs/policy-enforcement/opa) and runs after a successful `terraform plan` and before Cost Estimation. In this stage, HCP Terraform checks whether the plan adheres to the policies in the OPA policy sets for the workspace. \_States in this stage:\_ - \*\*Pol... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/states.mdx | main | terraform | [
0.0022471954580396414,
0.014749038964509964,
0.06111958622932434,
0.024434693157672882,
0.003990514203906059,
-0.06355109810829163,
-0.025387510657310486,
-0.06231851875782013,
0.003778328187763691,
0.09724341332912445,
-0.023449430242180824,
-0.060078538954257965,
0.014544888399541378,
-0... | -0.016178 |
If a user with permission to manage policy overrides, overrides the failed policy, the run proceeds to the \*\*Policy Checked\*\* state. ([More about permissions.](/terraform/cloud-docs/users-teams-organizations/permissions)) - If a user with permission to apply runs discards the run, the run does not continue (\*\*Dis... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/states.mdx | main | terraform | [
-0.023692462593317032,
0.043159473687410355,
0.06508004665374756,
-0.0024171415716409683,
0.011622722260653973,
-0.053590819239616394,
-0.00006555314030265436,
-0.06579510867595673,
-0.005529513116925955,
0.11480268090963364,
-0.02730793133378029,
0.022880014032125473,
0.00919268187135458,
... | 0.018571 |
from the configured external system(s). - External systems must respond initially with a `200 OK` acknowledging the request is in progress. After that, they have 10 minutes to return a status of `passed`, `running`, or `failed`. If the timeout expires, HCP Terraform assumes that the run tasks is in the `failed` status.... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/states.mdx | main | terraform | [
-0.043538469821214676,
0.05107695981860161,
0.04195595532655716,
0.009078503586351871,
0.0175715833902359,
-0.03781610354781151,
-0.027943605557084084,
-0.0515066497027874,
0.01622762344777584,
0.05275312811136246,
-0.029887663200497627,
-0.059576258063316345,
0.059354763478040695,
-0.0555... | 0.08982 |
# Remote operations > \*\*Hands-on:\*\* Try the [Get Started — HCP Terraform](/terraform/tutorials/cloud-get-started?utm\_source=WEBSITE&utm\_medium=WEB\_IO&utm\_offer=ARTICLE\_PAGE&utm\_content=DOCS) tutorials. HCP Terraform provides a central interface for running Terraform within a large collaborative organization. ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/remote-operations.mdx | main | terraform | [
0.004209311679005623,
0.005443086847662926,
0.003823960432782769,
-0.01853053830564022,
-0.035567473620176315,
-0.037466343492269516,
-0.0675484836101532,
-0.0348832942545414,
-0.01389964111149311,
0.0644654706120491,
-0.01851613260805607,
-0.052933309227228165,
0.05578926205635071,
-0.066... | 0.105021 |
Runs that are waiting for other runs to finish are in a \_pending\_ state, and a workspace might have any number of pending runs. There are two exceptions to the run queue, which can proceed at any time and do not block the progress of other runs: - Plan-only runs. - The planning stages of [saved plan runs](/terraform/... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/remote-operations.mdx | main | terraform | [
-0.005190461408346891,
-0.00916933175176382,
0.04533927142620087,
0.010508207604289055,
-0.015991317108273506,
-0.0035948692820966244,
-0.05732876807451248,
-0.1359037607908249,
0.0647580549120903,
0.0750693827867508,
-0.04202931374311447,
-0.006209094077348709,
-0.009565627202391624,
-0.0... | 0.027864 |
because they don't affect real infrastructure. HCP Terraform lists past speculative plan runs alongside a workspace's other runs. There are three ways to run speculative plans: - In VCS-backed workspaces, pull requests start speculative plans, and the VCS provider's pull request interface includes a link to the plan. S... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/remote-operations.mdx | main | terraform | [
-0.005117230117321014,
-0.002858510008081794,
0.07849868386983871,
0.001145809656009078,
0.04945074021816254,
-0.06206030398607254,
-0.05059477686882019,
-0.058084167540073395,
0.09613615274429321,
0.03886224702000618,
-0.06251341104507446,
-0.026260647922754288,
0.006046098656952381,
-0.0... | -0.000706 |
# Install software in the run environment Terraform relies on provider plugins to manage resources. In most cases, Terraform can automatically download the required plugins, but there are cases where plugins must be managed explicitly. In rare cases, it might also be necessary to install extra software on the Terraform... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/install-software.mdx | main | terraform | [
0.009962871670722961,
-0.05981398746371269,
0.019637061282992363,
-0.023678112775087357,
-0.022389136254787445,
-0.04321237653493881,
-0.0333702452480793,
-0.044985875487327576,
0.01655876822769642,
0.05216743424534798,
0.015801768749952316,
-0.03639944642782211,
-0.014070011675357819,
0.0... | 0.080888 |
to a configuration repo, or you can add them as Git submodules and symlink the executable files into `terraform.d/plugins/`. Submodules are a good choice when many workspaces use the same custom provider, since they keep your repos smaller. If using submodules, enable the ["Include submodules on clone" setting](/terraf... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/install-software.mdx | main | terraform | [
-0.04657858610153198,
-0.08485904335975647,
0.06855680048465729,
0.015866095200181007,
-0.020725419744849205,
-0.012000559829175472,
-0.013962149620056152,
-0.04266991466283798,
-0.0012086306232959032,
0.10191009193658829,
0.00005452343248180114,
-0.040563806891441345,
0.02122853882610798,
... | 0.028528 |
# UI and VCS-driven run workflow HCP Terraform has three workflows for managing Terraform runs. - The UI/VCS-driven run workflow described below, which is the primary mode of operation. - The [API-driven run workflow](/terraform/cloud-docs/workspaces/run/api), which is more flexible but requires you to create some tool... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/ui.mdx | main | terraform | [
-0.05234444886445999,
0.007980040274560452,
0.00004199211616651155,
-0.023405417799949646,
-0.012978754937648773,
-0.0553162656724453,
-0.054111432284116745,
-0.06236414611339569,
0.06780635565519333,
0.04352429509162903,
-0.06915678828954697,
-0.075107641518116,
0.02472730167210102,
-0.03... | 0.137683 |
supported options. Run modes that have a plan phase support debugging mode. This is equivalent to setting the `TF\_LOG` environment variable to `TRACE` for this run only. To enable debugging, click \*\*Additional planning options\*\* under the run mode and click \*\*Enable debugging mode\*\*. See [Debugging Terraform](... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/ui.mdx | main | terraform | [
0.00500753428786993,
0.029742654412984848,
0.06651579588651657,
0.06513266265392303,
0.058983348309993744,
-0.08671413362026215,
-0.03469128534197807,
-0.11073978990316391,
0.021599918603897095,
0.11899527907371521,
-0.05428994446992874,
-0.035366132855415344,
-0.01576392538845539,
0.02321... | -0.007663 |
executing malicious code or exposing sensitive information, HCP Terraform doesn't run speculative plans for pull requests that originate from forks of a repository. -> \*\*Note:\*\* On Terraform Enterprise, administrators can choose to allow speculative plans on pull requests that originate from forks. To learn more ab... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/ui.mdx | main | terraform | [
-0.02232043817639351,
0.028750069439411163,
0.07271569222211838,
-0.02022801712155342,
-0.023041104897856712,
-0.03500301018357277,
0.0016007001977413893,
-0.051944512873888016,
0.04296331852674484,
0.08294220268726349,
-0.04059009253978729,
-0.059758611023426056,
0.00451116356998682,
-0.0... | 0.00578 |
# The API-driven run workflow HCP Terraform has three workflows for managing Terraform runs. - The [UI/VCS-driven run workflow](/terraform/cloud-docs/workspaces/run/ui), which is the primary mode of operation. - The API-driven run workflow described below, which is more flexible but requires you to create some tooling.... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/api.mdx | main | terraform | [
-0.059647176414728165,
0.009589887224137783,
0.015044262632727623,
-0.012914229184389114,
-0.02586883306503296,
-0.06507834047079086,
-0.08165481686592102,
-0.07520187646150589,
0.058338191360235214,
0.024187423288822174,
-0.06769493222236633,
-0.0934956818819046,
0.02712130919098854,
-0.0... | 0.090974 |
Workspace ID The first step identified the organization name and the workspace name; however, the [configuration version API](/terraform/cloud-docs/api-docs/configuration-versions) expects the workspace ID. As such, the ID has to be looked up. If the workspace ID is already known, this step can be skipped. This step us... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/api.mdx | main | terraform | [
-0.0514521449804306,
0.05680328607559204,
-0.0016538426280021667,
0.03728650510311127,
-0.007177263963967562,
-0.025600122287869453,
-0.0278445016592741,
-0.06479642540216446,
0.06301391869783401,
0.07985293120145798,
-0.02365681156516075,
-0.06071856617927551,
0.04340564087033272,
0.00617... | 0.006556 |
the `plan` and `apply` operations. In addition to uploading configurations and starting runs, you can use HCP Terraform's APIs to create and modify workspaces, edit variable values, and more. See the [API documentation](/terraform/cloud-docs/api-docs) for more details. | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/api.mdx | main | terraform | [
-0.022017471492290497,
0.0035101461689919233,
0.018314741551876068,
0.02388874441385269,
-0.04463418945670128,
-0.0009253738098777831,
-0.06345144659280777,
-0.06311918795108795,
-0.03028968907892704,
0.11177388578653336,
-0.04238428547978401,
-0.03874312341213226,
0.05270635336637497,
-0.... | 0.032236 |
# Run modes and options HCP Terraform runs support many of the same modes and options available in the Terraform CLI. ## Plan and Apply (Standard) The default run mode of HCP Terraform is to perform a plan and then apply it. If you have enabled auto-apply and are using a VCS or API workflow, a successful plan applies i... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/modes-and-options.mdx | main | terraform | [
-0.02304874174296856,
0.0420602485537529,
0.059731870889663696,
0.0031451652757823467,
-0.008304878138005733,
-0.02312651462852955,
-0.05245143175125122,
-0.06685500591993332,
0.024846086278557777,
0.07364488393068314,
-0.03802910074591637,
-0.06739185005426407,
0.030736291781067848,
-0.02... | 0.02151 |
Saved plans are ideal for interactive CLI workflows, where you can perform many exploratory plans and then choose one to apply, or for custom continuous integration workflows where the default run queue behavior isn't suitable. - \*\*CLI:\*\* Use `terraform plan -out ` to perform and save a plan, then use `terraform ap... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/modes-and-options.mdx | main | terraform | [
-0.0381152480840683,
0.06229327991604805,
0.03187571465969086,
-0.028930051252245903,
-0.03510836884379387,
0.014399653300642967,
-0.05746304616332054,
-0.06897305697202682,
0.002312152646481991,
0.03805175796151161,
-0.0632895678281784,
-0.07144483923912048,
0.04480931907892227,
-0.032142... | 0.032398 |
imply some additional limitations on HCP Terraform features for remote plans created with targeting: - [Sentinel](/terraform/cloud-docs/policy-enforcement) policy checks for targeted plans will see only the selected subset of resource instances planned for changes in [the `tfplan` import](/terraform/cloud-docs/policy-e... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/modes-and-options.mdx | main | terraform | [
-0.0027099016588181257,
0.034395575523376465,
0.05357183516025543,
0.018630806356668472,
0.10829481482505798,
-0.024121800437569618,
0.025817502290010452,
-0.06523700803518295,
0.025978444144129753,
0.07537520676851273,
-0.03358243405818939,
-0.0785595029592514,
0.04615674167871475,
0.0034... | 0.021352 |
# Manage and view runs Each workspace in HCP Terraform includes a list of its current, pending, and historical runs. You can view and interact with these runs in the UI. You can also lock workspaces to temporarily prevent new runs. ## API Refer to the [Runs API](/terraform/cloud-docs/api-docs/run) and [lock a Workspace... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/manage.mdx | main | terraform | [
-0.021752947941422462,
0.0037107327952980995,
0.01741785928606987,
0.021706413477659225,
0.03855011612176895,
0.010239532217383385,
-0.058381251990795135,
-0.10840854793787003,
0.022227594628930092,
0.09440243989229202,
-0.04156899452209473,
-0.04183143377304077,
0.008035900071263313,
-0.0... | 0.051862 |
a run is roughly equivalent to typing `ctrl+c` during a Terraform plan or apply on the CLI. The running Terraform process is sent an INT signal, which instructs Terraform to end its work, update state for any resources that have already been changed, and wrap up in the safest way possible. In rare cases, a canceled run... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/run/manage.mdx | main | terraform | [
-0.027974415570497513,
0.04594583064317703,
0.05637718364596367,
0.021862894296646118,
0.0006300135282799602,
-0.010952888987958431,
-0.038279008120298386,
-0.1152484342455864,
0.058353159576654434,
0.09463084489107132,
-0.029874658212065697,
-0.006307561881840229,
0.013712888583540916,
-0... | 0.071306 |
# Design no-code ready modules Terraform [modules](/terraform/language/modules) let you define standardized collections of infrastructure resources that downstream users can more easily deploy. No-code ready modules build on these advantages by letting users deploy a module's resources without writing any Terraform con... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/no-code-provisioning/module-design.mdx | main | terraform | [
-0.006423213053494692,
-0.018289191648364067,
-0.03200783208012581,
-0.015558727085590363,
-0.033994127064943314,
-0.025629235431551933,
-0.04254378750920296,
-0.06783922761678696,
0.001985666574910283,
0.061677541583776474,
0.012926719151437283,
-0.031214168295264244,
0.03394618630409241,
... | 0.029075 |
approach lets users focus on business concerns instead of infrastructure concerns. For example, you could build modules that satisfy the following well-scoped use cases: - Deploying all resources needed for a three-tier web application - Deploying a database with constraints on resource allocation and deployment region... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/no-code-provisioning/module-design.mdx | main | terraform | [
-0.034428179264068604,
0.012401487678289413,
0.025897569954395294,
-0.025880757719278336,
-0.012857280671596527,
0.0007927600527182221,
-0.029895322397351265,
-0.06478717923164368,
-0.05833250284194946,
0.017351776361465454,
0.004117228090763092,
-0.0572483204305172,
0.03109482116997242,
-... | 0.000697 |
# Provision no-code infrastructure No-code provisioning lets you deploy infrastructure resources in a new HCP Terraform workspace without writing any Terraform configuration. You can create a no-code workspace from any module version labeled \*\*No-code Ready\*\* in your organization's [private registry](/terraform/clo... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/no-code-provisioning/provisioning.mdx | main | terraform | [
-0.015243055298924446,
-0.05370893329381943,
-0.025696715340018272,
-0.02792462706565857,
-0.03707705810666084,
-0.015352933667600155,
-0.0756039246916771,
-0.07354384660720825,
-0.007119668647646904,
0.08101750165224075,
0.00875464640557766,
-0.07233677804470062,
0.036513566970825195,
-0.... | 0.002408 |
apply\*\* is the default option for a no-code workspace. 1. Click \*\*Create workspace\*\*. HCP Terraform creates a new workspace and starts a run. Depending on the apply method, it automatically applies your infrastructure or prompts you for approval to create the no-code module's resources. ## Operations in No-Code W... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/workspaces/no-code-provisioning/provisioning.mdx | main | terraform | [
-0.029743969440460205,
-0.014371034689247608,
-0.016426917165517807,
0.04740230366587639,
-0.027624696493148804,
0.022818032652139664,
-0.008770636282861233,
-0.09916302561759949,
-0.024914810433983803,
0.05610593408346176,
-0.0026966670993715525,
-0.06777139008045197,
0.04671693965792656,
... | 0.029554 |
# API Tokens This topic describes the distinct types of API tokens you can use to authenticate with HCP Terraform. Note that HCP Terraform only displays API tokens once when you initially create them and are obfuscated thereafter. If the token is lost, it must be regenerated. Refer to [Team Token API](/terraform/cloud-... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/api-tokens.mdx | main | terraform | [
-0.05334385111927986,
0.02112750895321369,
0.06125481799244881,
-0.01626928150653839,
-0.015363669022917747,
0.0011317896423861384,
0.022595670074224472,
-0.040989428758621216,
0.02868051454424858,
0.01986047998070717,
-0.06519491225481033,
-0.0566365122795105,
0.052177347242832184,
0.0054... | 0.077903 |
perform actions the team itself cannot, since users can belong to multiple teams, can belong to multiple organizations, and can authenticate with Terraform's `atlas` backend for running Terraform locally. If an API token is generated for the "owners" team, then that API token will have all of the same permissions that ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/api-tokens.mdx | main | terraform | [
0.0024287293199449778,
-0.000046195786126190796,
-0.026332881301641464,
-0.04722187668085098,
-0.008919409476220608,
-0.04546600207686424,
-0.011587780900299549,
-0.050150077790021896,
0.04552479460835457,
0.028372399508953094,
-0.020283859223127365,
-0.08062925189733505,
0.02223911136388778... | 0.095396 |
example, using the [HCP Terraform for Splunk](/terraform/cloud-docs/integrations/splunk) app. To manage an organization's audit trails token, go to \*\*Organization settings > API Token\*\* and use the settings under the "Audit Token" header. Each organization can only have a \_single\_ valid audit trails token. Only [... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/api-tokens.mdx | main | terraform | [
-0.03556809574365616,
0.01869090273976326,
0.015650322660803795,
0.023825112730264664,
0.05319327488541603,
-0.007098193280398846,
0.010317474603652954,
-0.07881046086549759,
0.06281815469264984,
0.060113575309515,
-0.018973397091031075,
-0.05744374170899391,
0.032077427953481674,
0.041798... | 0.129655 |
as valid and may not be used to authenticate to any API. Any API requests made with an expired token will fail. HashiCorp recommends setting an expiration on all new authentication tokens. Creating tokens with an expiration date helps reduce the risk of accidentally leaking valid tokens or forgetting to delete tokens m... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/api-tokens.mdx | main | terraform | [
-0.03213481605052948,
0.0192460548132658,
0.025609975680708885,
-0.03284834325313568,
-0.004646228160709143,
-0.010654715821146965,
-0.05911048501729965,
-0.04211510717868805,
0.0202960092574358,
0.03390616178512573,
0.0035670604556798935,
-0.0033744298852980137,
0.0144500732421875,
0.0171... | 0.041063 |
# Configure two-factor authentication This topic describes how to enable two-factor authentication (2FA) and require it to access HCP Terraform and Terraform Enterprise interfaces. @include 'eu/2fa.mdx' ## Overview Configuring 2FA protects user accounts and sensitive data. Complete the following steps to configure 2FA ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/2fa.mdx | main | terraform | [
0.019757011905312538,
0.009068261831998825,
0.008985595777630806,
-0.07328832894563675,
-0.02274610847234726,
0.020644791424274445,
-0.0359683595597744,
-0.04642346128821373,
-0.0551847405731678,
0.007943443022668362,
-0.022857224568724632,
-0.12207835912704468,
0.04859023168683052,
0.0003... | 0.032722 |
logs in with their HCP credentials depends on their linked HCP identity: - \*\*Email\*\*: Follow the instructions in the [HashiCorp Cloud MFA](/hcp/docs/hcp/iam/mfa) docs. - \*\*GitHub\*\*: Follow the instructions in the [Configuring GitHub two-factor authentication](https://docs.github.com/en/authentication/securing-y... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/2fa.mdx | main | terraform | [
0.009463424794375896,
0.020318273454904556,
-0.009627469815313816,
-0.05304765701293945,
0.02014458365738392,
0.03217315301299095,
-0.026825731620192528,
-0.021371904760599136,
-0.045397598296403885,
0.02255392074584961,
0.028482429683208466,
-0.10630730539560318,
0.056295908987522125,
-0.... | 0.025086 |
[organizations]: /terraform/cloud-docs/users-teams-organizations/organizations [teams]: /terraform/cloud-docs/users-teams-organizations/teams [invite]: /terraform/cloud-docs/users-teams-organizations/organizations#users [owners]: /terraform/cloud-docs/users-teams-organizations/teams#the-owners-team # Create and manage ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/users.mdx | main | terraform | [
-0.0086995093151927,
-0.0021579815074801445,
-0.032477006316185,
-0.05533722788095474,
-0.011335248127579689,
-0.04473491385579109,
-0.010431928560137749,
-0.04437633603811264,
0.04241305962204933,
0.03766501694917679,
-0.04049811512231827,
-0.07190614193677902,
0.08431947976350784,
0.0347... | 0.052976 |
Site admin permissions On Terraform Enterprise instances, some user accounts have a special site admin permission that allows them to administer the entire instance. Admin permissions are distinct from normal organization-level permissions, and they apply to a different set of UI controls and API endpoints. Admin users... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/users.mdx | main | terraform | [
0.011658781208097935,
0.006667421665042639,
-0.010730176232755184,
-0.020159471780061722,
-0.017370644956827164,
-0.05355583131313324,
-0.006418393459171057,
-0.046961959451436996,
0.008276929147541523,
0.09714999049901962,
-0.03657675161957741,
-0.036750491708517075,
0.003210707101970911,
... | 0.022891 |
browser windows Any of these actions requires you to re-authenticate regardless of session timeout settings. ### Organizations Click \*\*Organizations\*\* in the sidebar to view a list of the organizations where you are a member. If you are on the [owners team][owners], the organization is marked with an \*\*OWNER\*\* ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/users.mdx | main | terraform | [
-0.029251964762806892,
0.03616726025938988,
-0.03556327521800995,
-0.021167591214179993,
0.008162525482475758,
0.04136836528778076,
0.007414449006319046,
-0.1115892082452774,
0.07381679862737656,
0.08328485488891602,
-0.05026036500930786,
-0.029255632311105728,
0.047912269830703735,
0.0279... | 0.00316 |
expiration date and time. Refer to [API Token Expiration](/terraform/cloud-docs/users-teams-organizations/api-tokens#token-expiration) for details. #### Creating a token To create a new token: 1. Click \*\*Create an API token\*\*. The \*\*Create API token\*\* box appears. 1. Enter a \*\*Description\*\* that explains wh... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/users.mdx | main | terraform | [
-0.019531501457095146,
0.01952298916876316,
0.016658524051308632,
0.022902961820364,
0.01456946600228548,
0.013199114240705967,
-0.043200455605983734,
-0.03215926140546799,
0.08152272552251816,
0.07733640819787979,
-0.044910281896591187,
-0.05029410496354103,
0.0267555583268404,
-0.0062236... | 0.053101 |
# Create and manage reserved tag keys This topic describes how to create and manage reserved tag keys in HCP Terraform. You can use reserved tag keys to help managers consistently label workspaces and projects in your organization. ## Introduction You can define reserved tag keys that appear as suggested labels when ma... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/manage-reserved-tags.mdx | main | terraform | [
-0.02108924835920334,
0.01083921454846859,
-0.027930574491620064,
0.024676579982042313,
0.022263284772634506,
-0.020917270332574844,
0.018018774688243866,
-0.05948172137141228,
0.019622771069407463,
0.07567476481199265,
0.00400771526619792,
-0.10004395991563797,
0.07866527140140533,
0.0093... | 0.02636 |
[teams]: /terraform/cloud-docs/users-teams-organizations/teams [users]: /terraform/cloud-docs/users-teams-organizations/users [owners]: /terraform/cloud-docs/users-teams-organizations/teams#the-owners-team # Organizations overview This topic provides overview information about how to create and manage organizations in ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx | main | terraform | [
0.014451626688241959,
-0.008240215480327606,
-0.023126184940338135,
-0.04045700281858444,
-0.046979229897260666,
-0.021563082933425903,
-0.05253243073821068,
-0.06041599437594414,
-0.024404678493738174,
0.041820019483566284,
-0.051889851689338684,
-0.10705210268497467,
0.0528978556394577,
... | 0.088568 |
reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Refer to [Create and manage reserved tag keys](/terraform/cloud-docs/users-teams-organizations/organizations/manage-reserved-tags) for instructions. You can also view single-value tags ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx | main | terraform | [
-0.0024897248949855566,
0.029021287336945534,
-0.06432794779539108,
0.030027320608496666,
0.07825738191604614,
-0.035893019288778305,
0.027619067579507828,
-0.06964126974344254,
0.07130362093448639,
0.06457676738500595,
-0.00010809100785991177,
-0.0504772812128067,
0.04805305600166321,
0.0... | 0.05304 |
Click the trash icon for a tag and confirm that you want to permanently delete it when prompted. #### Teams @include 'tfc-package-callouts/team-management.mdx' All users in an organization can access the \*\*Teams\*\* page, which displays a list of [teams][] within the organization. Organization owners and users with t... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx | main | terraform | [
-0.029141584411263466,
0.03279147669672966,
-0.026695294305682182,
-0.020404113456606865,
0.07650488615036011,
-0.04963100701570511,
-0.0015596734592691064,
-0.11742331087589264,
0.08497822284698486,
0.05725087225437164,
-0.03951092064380646,
-0.03186310455203056,
0.06920143216848373,
0.02... | 0.040934 |
the workspaces documentation for more details. #### Runs From the Workspaces page, click \*\*Settings\*\* in the sidebar, then \*\*Runs\*\* to view all of the current runs in your organization's workspaces. The \*\*Runs\*\* page displays: - The name of the run - The run's ID - What triggered the run - The workspace and... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx | main | terraform | [
0.004457605537027121,
0.026991339400410652,
0.047361984848976135,
0.027566352859139442,
0.027901994064450264,
-0.009685548953711987,
-0.05050334334373474,
-0.14712436497211456,
0.014775301329791546,
0.08543746918439865,
-0.052986402064561844,
-0.02941368706524372,
0.006063202396035194,
-0.... | 0.021256 |
Events -> \*\*Note:\*\* This feature is in beta. Review the event logs for GitLab.com connections. #### VCS Providers Configure [VCS providers](/terraform/cloud-docs/vcs) to use in the organization. You must have [permission to manage VCS settings](/terraform/cloud-docs/users-teams-organizations/permissions). [permissi... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/index.mdx | main | terraform | [
-0.01589270308613777,
0.03433073312044144,
0.036678921431303024,
0.014430810697376728,
-0.00838441401720047,
-0.01175394095480442,
0.00899141188710928,
-0.11679844558238983,
0.08289970457553864,
0.07829838991165161,
0.0011507063172757626,
-0.05569684877991676,
0.043494462966918945,
-0.0129... | 0.066215 |
# Configure VCS status checks Status checks are notifications sent to your version control system's VCS provider, providing details about specific commits, including the present status of the HCP Terraform run. Please refer to your VCS provider's documentation regarding status checks (e.g., [GitHub Status Checks](https... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/vcs-status-checks.mdx | main | terraform | [
0.01655745692551136,
0.010046718642115593,
0.024165954440832138,
-0.024618515744805336,
0.002419411903247237,
-0.01455574668943882,
-0.0452444888651371,
-0.0864638239145279,
0.024965524673461914,
0.11153703927993774,
-0.04553760215640068,
-0.06760043650865555,
0.007777427788823843,
-0.0420... | 0.004075 |
# Automatically cancel plan-only workspace runs This topic describes how to configure HCP Terraform to automatically cancel plan-only workspace runs triggered by pull requests in the VCS. ## Introduction When connected to a VCS, HCP Terraform can automatically start a workspace run that performs a `terraform plan` oper... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/vcs-speculative-plan-management.mdx | main | terraform | [
-0.01235197577625513,
0.02628384530544281,
0.06534148007631302,
0.022491401061415672,
-0.014221208170056343,
-0.03167308121919632,
-0.05467411130666733,
-0.11290397495031357,
0.0692315399646759,
0.08666910231113434,
-0.033385563641786575,
-0.021157555282115936,
-0.006068558897823095,
-0.02... | 0.019448 |
# Namespace overview Namespaces let you connect a GitHub account to an HCP Terraform organization, letting organization members collectively manage that GitHub account’s public registry artifacts. Every artifact in the [public Terraform registry](https://registry.terraform.io/) connects to a namespace that matches the ... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/public-namespace/index.mdx | main | terraform | [
-0.06435073167085648,
-0.08383336663246155,
-0.050842974334955215,
0.022019527852535248,
-0.024244852364063263,
-0.046036284416913986,
0.011041299439966679,
-0.09836145490407944,
0.05804486945271492,
0.0151600930839777,
0.010275200009346008,
-0.09683024883270264,
0.10778480768203735,
0.006... | 0.091234 |
# Manage namespace artifacts Namespaces let you connect a GitHub account to an HCP Terraform organization, letting organization members collectively manage that GitHub account’s existing and future public registry artifacts. Namespaces do not support publishing or managing [policy libraries](/terraform/registry/policy-... | https://github.com/hashicorp/web-unified-docs/blob/main//content/terraform-docs-common/docs/cloud-docs/users-teams-organizations/organizations/public-namespace/artifacts.mdx | main | terraform | [
-0.02283305488526821,
-0.043208517134189606,
-0.05051574483513832,
-0.042440224438905716,
-0.018599500879645348,
-0.03176881745457649,
-0.029827795922756195,
-0.09087855368852615,
0.012138460762798786,
0.09391245245933533,
-0.038989510387182236,
-0.059234973043203354,
0.07788567245006561,
... | 0.047157 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.