Sunday, December 22, 2024

Terraform delivers launch-day support for Amazon S3 Tables, …

Share


The Terraform AWS provider is a plugin that enables seamless integration between Terraform and the Amazon Web Services (AWS) cloud platform. It allows users to define, provision, and manage AWS resources using Terraform’s declarative configuration language. This year, we reached the 10th anniversary of the Terraform AWS provider, crossed three billion downloads, and launched the AWS Cloud Control API provider. Developers always want to use new AWS services faster with Terraform and in this blog we will cover new launch-day support for AWS services just announced at re:Invent, and how developers can access more services faster with the AWS Cloud Control provider.

In partnership with Amazon Web Services (AWS), we are excited to announce launch-day support for a variety of new features across a number of AWS services in the HashiCorp Terraform AWS provider. These new features span S3, S3 Express, EKS, ECS, etc. These new features include:

  • S3 Tables: Iceberg on top of S3
  • Amazon S3 Express One Zone: S3 Lifecycle expirations
  • ECS: VPC Lattice
  • ECS: Service AZ rebalancing
  • EKS: Hybrid Nodes
  • EKS: Auto Mode

»

Apache Iceberg standard, which allows you to easily query tabular data in S3 using popular query engines like Apache Spark. Customers can use S3 Tables to store tabular data such as daily purchase transactions, streaming sensor data, or ad impressions as an Iceberg table in Amazon S3, and then interact with that data using analytics capabilities such as row-level transactions, queryable table snapshots, and more, all managed by Amazon S3. Additionally, Table Buckets perform continuous table maintenance to automatically optimize query efficiency over time as your data lake scales and evolves.

»

»

»

»New AWS ephemeral resources

Terraform’s management of infrastructure involves handling secrets, such as private keys, certifications, API tokens, etc. As an example, a data source may be used to fetch a secret and write it to a managed resource’s attribute. Or a secret may be generated by a resource type (e.g. a random password) and written to another resource type like a dedicated secrets manager.

Today, these secrets persist in the plan or state file. Since the secrets are stored in plain text within these artifacts, any mismanaged access to the files would compromise the secrets. We’ve been working on a feature to improve the security of this workflow, and it’s now ready for Terraform 1.10.

To enable secure handling of secrets, we’re introducing ephemeral values. These values are not stored in any artifact. Not the plan file, nor the statefile. They are not expected to remain consistent from plan to apply, or from one plan/apply round to the next.

Within the Terraform 1.10 launch, we included three new ephemeral resources in v5.77.0 of the AWS provider:

»

»

AWS provider. Given its ability to automatically support new features and services, this AWSCC provider will increase the resource coverage and significantly reduce the time it takes to support new capabilities. AWS and HashiCorp will continue to deliver high-quality, consistent releases to both the AWS and AWSCC providers.

»

getting started with Terraform on AWS on our developer education platform.

If you are completely new to Terraform, sign up for Terraform Cloud and get started using the Free offering today.



Source link

Read more

Local News