How To
Segregate cloud accounts
You can configure Digger to use different accounts for
-
Storing digger specific PR-level locks
-
Terraform backend configuration
-
The target infra to plan / apply.
These all can even be different cloud providers - eg digger locks in AWS, state backend in Azure, while managing infra on GCP.
We rely on terraform expecting particular environment variables when authorising with cloud providers.
Let’s consider example where
-
Digger locks are in one aws account
-
Terraform state backend in another aws account
-
Infra is on Azure, terraform is using Managed Service Identity for auth
Then configure variables mapping in digger.yml