Skip to content

Instantly share code, notes, and snippets.

# aws\_ecr\_repository
The ECR Repository data source allows the ARN, Repository URI and Registry ID to be retrieved for an ECR repository.
## Example Usage
```hcl
data "aws_ecr_repository" "service" {
name = "ecr-repository"
}
<?xml version="1.0" encoding="UTF-8"?>
<meta-runner name="Terraform Provider">
<description>Terraform Test Runner to stand up and destroy supporting infra for some of the Acceptance Test Providers</description>
<settings>
<parameters>
<param name="WORKING_DIRECTORY" value="" />
<param name="TF_WORKDIR" value="" />
<param name="TF_VERSION" value="" />
<param name="TF_TESTVARS" value="" />
<param name="PROVIDER_NAME" value="" />
------- Stdout: -------
=== RUN TestAccAzureRMTemplateDeployment_disappears
--- FAIL: TestAccAzureRMTemplateDeployment_disappears (219.47s)
testing.go:265: Step 0 error: Error applying: 1 error(s) occurred:
* azurerm_template_deployment.test: Error creating deployment: resources.DeploymentsClient#CreateOrUpdate: Failure sending request: StatusCode=200 -- Original Error: Long running operation terminated with status 'Failed': Code="DeploymentFailedCleanUp" Message="The deployment operation failed, because it was unable to cleanup. Please see https://aka.ms/arm-debug for usage details."
FAIL
### Keybase proof
I hereby claim:
* I am stack72 on github.
* I am stack72 (https://keybase.io/stack72) on keybase.
* I have a public key whose fingerprint is 8517 5217 5859 7E0B 426C E880 C4F0 D82D B144 762A
To claim this, I am signing this object:
apt-get install nginx
@stack72
stack72 / raid_ephemeral.sh
Created February 8, 2016 18:14 — forked from joemiller/raid_ephemeral.sh
detect all ephemeral disks on EC2 then stripe together in a raid-0 vol mounted at /mnt
#!/bin/bash
#
# this script will attempt to detect any ephemeral drives on an EC2 node and create a RAID-0 stripe
# mounted at /mnt. It should be run early on the first boot of the system.
#
# Beware, This script is NOT fully idempotent.
#
METADATA_URL_BASE="http://169.254.169.254/2012-01-12"
zookeeper-data-directory=/opt/zookeeper/snapshots
zookeeper-install-directory=/opt/zookeeper
zookeeper-log-directory=/opt/zookeeper/transactions
log-index-directory=/opt/zookeeper/transactions
cleanup-period-ms=300000
check-ms=30000
backup-period-ms=600000
client-port=2181
cleanup-max-files=20
backup-max-store-ms=21600000
variable "vpc_id" {}
variable "ingress_cidr_blocks" {}
variable "key_name" {}
variable "ami" {}
variable "instance_type" {}
variable "private_subnets" {}
variable "public_subnets" {}
variable "availability_zones" {}
variable "cluster_name" {}
resource "aws_security_group" "consul_elb" {
log.console = file
log.console.level = info
log.console.file = $(platform_log_dir)/console.log
log.error.file = $(platform_log_dir)/error.log
log.syslog = off
log.crash = on
log.crash.file = $(platform_log_dir)/crash.log
log.crash.maximum_message_size = 64KB
log.crash.size = 10MB
log.crash.rotation = $D0
user www-data;
worker_processes 4;
pid /run/nginx.pid;
events {
worker_connections 768;
# multi_accept on;
}
http {