HashiCorp Terraform 是一種基礎架構即程式碼 (IaC) 工具,可讓您佈建及管理雲端基礎架構。Terraform 提供稱為「供應商」的外掛程式,可讓您與雲端服務供應商和其他 API 互動。您可以使用 Terraform 提供者 Google Cloud佈建及管理 Google Cloud 資源,包括 Google SecOps。
本頁面將介紹如何搭配使用 Terraform 與 Google SecOps,包括 Terraform 的運作方式簡介,以及一些有助於開始搭配使用 Terraform 與 Google Cloud的資源。此外,您還會找到 Google SecOps 的 Terraform 參考文件連結、程式碼範例,以及使用 Terraform 佈建 Google SecOps 資源的指南。
[[["容易理解","easyToUnderstand","thumb-up"],["確實解決了我的問題","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["難以理解","hardToUnderstand","thumb-down"],["資訊或程式碼範例有誤","incorrectInformationOrSampleCode","thumb-down"],["缺少我需要的資訊/範例","missingTheInformationSamplesINeed","thumb-down"],["翻譯問題","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["上次更新時間:2025-09-04 (世界標準時間)。"],[[["\u003cp\u003eTerraform is an infrastructure-as-code (IaC) tool that uses providers, such as the Terraform provider for Google Cloud, to manage and provision cloud infrastructure, including Google SecOps resources.\u003c/p\u003e\n"],["\u003cp\u003eTerraform uses a declarative approach, where you define the desired infrastructure in configuration files, and Terraform handles the provisioning without the need to write code detailing how to provision the infrastructure.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eterraform apply\u003c/code\u003e command provisions infrastructure, interacts with Google SecOps APIs, and creates a state file to track and manage resources, ensuring the real-world infrastructure matches the defined configuration.\u003c/p\u003e\n"],["\u003cp\u003eTerraform resources are the fundamental elements used to describe infrastructure objects, and several specific resources are available for Google SecOps, as listed in the documentation provided.\u003c/p\u003e\n"],["\u003cp\u003eThis page offers code samples, documentation links, and an overview of Terraform's functionality with Google SecOps for users looking to use it in their environment.\u003c/p\u003e\n"]]],[],null,["# Provision Google SecOps resources with Terraform\n\nHashiCorp Terraform is an infrastructure-as-code (IaC) tool that lets you\nprovision and manage cloud infrastructure. Terraform provides plugins called\n*providers* that let you interact with cloud providers and other APIs. You can\nuse the *Terraform provider for Google Cloud* to provision and manage\nGoogle Cloud resources, including Google SecOps.\n\nThis page introduces you to using Terraform with Google SecOps, including an\nintroduction to how Terraform works and some resources to help you get started using\nTerraform with Google Cloud. You'll also find links to Terraform reference docs for\nGoogle SecOps, code examples, and guides for using Terraform to provision\nGoogle SecOps resources.\n\nFor instructions on how to get started with Terraform for Google Cloud, see\n[Install and configure Terraform](/docs/terraform/install-configure-terraform) or the\n[Terraform for Google Cloud quickstart](/docs/terraform/create-vm-instance).\n\nHow Terraform works\n-------------------\n\nTerraform has a declarative and configuration-oriented syntax, which you can\nuse to describe the infrastructure that you want to provision in your\nGoogle Cloud project. After you author this configuration in one or more\nTerraform configuration files, you can use the Terraform CLI to apply this\nconfiguration to your Google SecOps resources.\n\nThe following steps explain how Terraform works:\n\n1. You describe the infrastructure you want to provision in a *Terraform\n configuration file*. You don't need to write code describing how to provision the infrastructure. Terraform provisions the infrastructure for you.\n2. You run the `terraform plan` command, which evaluates your configuration and generates an execution plan. You can review the plan and make changes as needed.\n3. You run the `terraform apply` command, which performs the following\n actions:\n\n 1. It provisions your infrastructure based on your execution plan by invoking the corresponding Google SecOps APIs in the background.\n 2. It creates a *Terraform state file*, which is a JSON file that maps the resources in your configuration file to the resources in the real-world infrastructure. Terraform uses this file to keep a record of the most recent state of your infrastructure, and to determine when to create, update, and destroy resources.\n 3. When you run `terraform apply`, Terraform uses the mapping in\n the state file to compare the existing infrastructure to the code, and make\n updates as necessary:\n\n - If a resource object is defined in the configuration file, but doesn't exist in the state file, Terraform creates it.\n - If a resource object exists in the state file, but has a different configuration from your configuration file, Terraform updates the resource to match your configuration file.\n - If a resource object in the state file matches your configuration file, Terraform leaves the resource unchanged.\n\nTerraform resources for Google SecOps\n-------------------------------------\n\n*Resources* are the fundamental elements in the Terraform language. Each\nresource block describes one or more infrastructure objects, such as virtual\nnetworks or compute instances.\n\nThe following table lists the Terraform resources available for\nGoogle SecOps:\n\n\n\u003cbr /\u003e\n\nWhat's next\n-----------\n\n- [Terraform on Google Cloud documentation](/docs/terraform)\n- [Google Cloud provider documentation in HashiCorp](https://registry.terraform.io/providers/hashicorp/google/latest/docs)\n- [Infrastructure as code for Google Cloud](/docs/terraform/iac-overview)"]]