Given the following Terraform:
terraform {
version = "0.9.8"
backend "consul" {
address = "re.consul.aws-dev.manheim.com:8500"
path = "terraform/jniesen/tf-envs"
}
Given the following Terraform:
terraform {
version = "0.9.8"
backend "consul" {
address = "re.consul.aws-dev.manheim.com:8500"
path = "terraform/jniesen/tf-envs"
}
I hereby claim:
To claim this, I am signing this object:
# [cert_arn] below is replaced with the ARN that you're curious about. | |
aws elb describe-load-balancers --region us-east-1 --query 'LoadBalancerDescriptions[?contains(ListenerDescriptions[].Listener[].SSLCertificateId, `[cert_arn]`)].DNSName' |
[Unit] | |
Description=Artifactory plus some other test | |
Requires=db.service host.service logger.service | |
; A comment | |
[Service] | |
ExecStart=/bin/foo -a bar \ | |
--foo=bar \ | |
--verbose | |
ExecStop=-/bin/foo -b bop |
Pros:
kitchen-puppet
to have a puppet provisioner. kitchen-puppet
requires librarian-puppet
because it handles all puppet module dependency resolution for you via Puppetfile.beaker
Cons:
1) ManheimRemedier::CLI for ServiceNow backend allows you to open then close a CRQ when a change is made successfully | |
Failure/Error: raise ApplicationError.new(e.message) | |
ApplicationError: | |
403 Forbidden: Operation against file 'change_request' was aborted by Business Rule 'Planned Start/End Date validation^7c065dc52b61120031a6308505da153d'. Business Rule Stack:Planned Start/End Date validation | |
# ./lib/manheim_remedier/runners/snow_runner.rb:21:in `rescue in open' | |
# ./lib/manheim_remedier/runners/snow_runner.rb:14:in `open' | |
# ./lib/manheim_remedier/cli.rb:9:in `open' | |
# ./spec/external/cli_spec.rb:68:in `block (3 levels) in <top (required)>' |