Skip to content

Instantly share code, notes, and snippets.

@reespozzi
reespozzi / terraform_env_setup
Created November 14, 2025 10:58
Populates GITHUB_ENV with secrets needed for terraform using existing secret
- name: Set Azure credentials as environment variables
run: |
echo "Setting ARM_* env vars for Terraform..."
echo "ARM_CLIENT_ID=$(jq -r .clientId <<< '${{ secrets.AZURE_CREDENTIALS }}')" >> $GITHUB_ENV
echo "ARM_CLIENT_SECRET=$(jq -r .clientSecret <<< '${{ secrets.AZURE_CREDENTIALS }}')" >> $GITHUB_ENV
echo "ARM_SUBSCRIPTION_ID=$(jq -r .subscriptionId <<< '${{ secrets.AZURE_CREDENTIALS }}')" >> $GITHUB_ENV
echo "ARM_TENANT_ID=$(jq -r .tenantId <<< '${{ secrets.AZURE_CREDENTIALS }}')" >> $GITHUB_ENV
@reespozzi
reespozzi / example.tf
Created February 3, 2023 15:42
Terraform Conditional Dynamic Block example
resource "azurerm_monitor_diagnostic_setting" "my_mds" {
name = "my-mds"
target_resource_id = azurerm_virtual_network.my_vnet.id
log_analytics_workspace_id = azurerm_log_analytics_workspace.my_ws.id
dynamic "enabled_log" {
for_each = var.my_condition ? [1] : []
content {
category = "AuditEvent"
retention_policy {