text stringlengths 127 1.13k |
|---|
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Create a Terraform configuration to provision an AWS Lambda function with an associated IAM role.
Input: <noinput>
<</SYS>>
resource "aws_iam_role" "lambda_role" {
name = "lambda_role"
assume_role_policy = jsonencode({
Version = "2012-10-17",
Statement = [
{
Action = "sts:AssumeRole",
Principal = {
Service = "lambda.amazonaws.com"
},
Effect = "Allow",
Sid = ""
},
],
})
}
resource "aws_lambda_function" "example_lambda" {
filename = "lambda_function_payload.zip"
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "lambda_function.handler"
runtime = "python3.8"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
environment {
variables = {
SOME_VARIABLE = "some_value"
}
}
}
</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_s3_bucket" "my_bucket" {
bucket = "my_unique_bucket_name"
acl = "private"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please write a Terraform script to create an AWS S3 bucket with versioning enabled and public access blocked.
Input: <noinput>
<</SYS>>
resource "aws_s3_bucket" "bucket" {
bucket = "my-tf-test-bucket"
acl = "private"
versioning {
enabled = true
}
public_access_block_configuration {
block_public_acls = true
block_public_policy = true
ignore_public_acls = true
restrict_public_buckets = true
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Write a Terraform script to deploy an AWS EC2 instance with a security group allowing SSH access.
Input: <noinput>
<</SYS>>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
tags = {
Name = "ExampleInstance"
}
}
resource "aws_security_group" "allow_ssh" {
name = "allow_ssh"
description = "Allow SSH inbound traffic"
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
}
</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_instance" "example" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t2.micro"
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
<s>[INST] <<SYS>>
Please analyze the given Terraform script and provide feedback on its configuration.
Input: <terraform code>
resource "aws_lambda_function" "example_lambda" {
function_name = "example_lambda"
role = aws_iam_role.lambda_role.arn
handler = "index.handler"
runtime = "nodejs14.x"
source_code_hash = filebase64sha256("lambda_function_payload.zip")
}
<</SYS>>The given Terraform script is analyzed here with feedback and suggestions.</s> |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.