Menu

  • Home
  • Work
    • AI
    • Cloud
      • Virtualization
      • IaaS
      • PaaS
    • Architecture
    • BigData
    • Python
    • Java
    • Go
    • C
    • C++
    • JavaScript
    • PHP
    • Others
      • Assembly
      • Ruby
      • Perl
      • Lua
      • Rust
      • XML
      • Network
      • IoT
      • GIS
      • Algorithm
      • Math
      • RE
      • Graphic
    • OS
      • Linux
      • Windows
      • Mac OS X
    • Database
      • MySQL
      • Oracle
    • Mobile
      • Android
      • IOS
    • Web
      • HTML
      • CSS
  • Life
    • Cooking
    • Travel
    • Gardening
  • Gallery
  • Video
  • Music
  • Essay
  • Home
  • Work
    • AI
    • Cloud
      • Virtualization
      • IaaS
      • PaaS
    • Architecture
    • BigData
    • Python
    • Java
    • Go
    • C
    • C++
    • JavaScript
    • PHP
    • Others
      • Assembly
      • Ruby
      • Perl
      • Lua
      • Rust
      • XML
      • Network
      • IoT
      • GIS
      • Algorithm
      • Math
      • RE
      • Graphic
    • OS
      • Linux
      • Windows
      • Mac OS X
    • Database
      • MySQL
      • Oracle
    • Mobile
      • Android
      • IOS
    • Web
      • HTML
      • CSS
  • Life
    • Cooking
    • Travel
    • Gardening
  • Gallery
  • Video
  • Music
  • Essay

Terraform: a practical guide to infrastructure as code

20
Oct
2021

Terraform: a practical guide to infrastructure as code

By Alex
/ in IaaS
0 Comments

Terraform is an infrastructure-as-code tool. You describe the target infrastructure in configuration files, and Terraform compares that description with real infrastructure, builds a plan, and then creates, updates, or deletes objects until the two match. The real job is not "writing cloud scripts." It is keeping an explicit model of infrastructure state.

What Terraform manages

Terraform can manage far more than basic IaaS objects. A Terraform configuration may include virtual machines, networks, DNS records, IAM bindings, managed databases, and even SaaS resources. The boundary is the provider model: if a provider can create, read, update, and delete a resource type, Terraform can manage it.

The CLI workflow has three moving parts:

  1. The Terraform CLI itself.
  2. Configuration files written in the Terraform language, which is based on HCL.
  3. Providers, which are plugins that talk to cloud or service APIs.

Terraform reads the configuration, builds an execution plan, and decides which objects must be created, changed, replaced, or removed. It also tracks dependencies between resources and applies changes in parallel where that is safe.

CLI basics
Installing the CLI

Install Terraform from the official downloads page and place the binary on $PATH.

Useful global behavior

Terraform supports -chdir=DIR to run commands against a different working directory. That is handy in scripts and monorepos.

Shell completion can be installed with terraform -install-autocomplete and removed with terraform -uninstall-autocomplete.

Resource addresses

Many subcommands accept resource addresses. A few common forms are:

1
2
3
4
5
6
7
8
# resource_type.resource_name
aws_instance.foo
 
# indexed resource instance
aws_instance.bar[1]
 
# resource inside nested child modules
module.foo.module.bar.aws_instance.baz
CLI configuration file

The CLI configuration file path can be set with TF_CLI_CONFIG_FILE. On non-Windows systems, the default path is $HOME/.terraformrc. This file can configure plugin caching, credentials, and provider installation behavior.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
plugin_cache_dir   = "$HOME/.terraform.d/plugin-cache"
disable_checkpoint = true
 
credentials "app.terraform.io" {
  token = "xxxxxx.atlasv1.zzzzzzzzzzzzz"
}
 
provider_installation {
  filesystem_mirror {
    path    = "/usr/share/terraform/providers"
    include = ["example.com/*/*"]
  }
 
  direct {
    exclude = ["example.com/*/*"]
  }
 
  dev_overrides {
    "hashicorp.com/edu/hashicups-pf" = "$(go env GOBIN)"
  }
}

dev_overrides is mainly for provider development. It lets you test a local provider binary without going through the full registry and checksum flow.

Core commands
init

terraform init prepares the working directory. Terraform commands are expected to run from a directory that contains Terraform configuration files. Initialization downloads providers and modules, sets up the backend, and creates local working data.

After initialization, the directory usually contains:

  • .terraform/, which stores provider and module downloads.
  • terraform.tfstate when the local backend is used.
  • terraform.tfstate.d/ when multiple workspaces are used with the local backend.

Some changes require re-running initialization, especially provider version changes, module source changes, and backend configuration changes.

terraform get can download modules without doing the full set of init tasks. terraform init -upgrade upgrades providers and modules to newer versions that still satisfy the version constraints.

validate

terraform validate checks whether the configuration is syntactically and structurally valid.

plan

terraform plan shows the changes Terraform would like to make. It compares the desired state from configuration with the current state of the infrastructure, using both the state file and provider API reads.

Terraform's core execution loop is built around three commands: plan, apply, and destroy.

Saving a plan
Shell
1
terraform plan -out=FILE

A saved plan can later be passed to terraform apply.

Planning modes
  1. Destroy mode, enabled by -destroy, builds a plan that removes everything tracked by the current configuration.
  2. Refresh-only mode, enabled by -refresh-only, updates state and root outputs to match infrastructure changes made outside Terraform.
Input variables and concurrency

Use -var 'NAME=VALUE' to set input variables directly, and -var-file=FILENAME to load them from a file.

Use -parallelism=n to cap concurrency. The default is 10.

Other options
Option Meaning
-refresh=false Skip the pre-plan refresh step. This can reduce remote API calls, but Terraform may miss drift introduced outside Terraform.
-replace=ADDRESS Force Terraform to plan a replacement for a single resource instance, such as aws_instance.example[0].
-target=ADDRESS Limit planning to a specific resource and its dependencies. Useful for debugging, but easy to abuse.
-input=false Disable interactive prompts for root input variables. This is standard in CI and batch execution.
apply

terraform apply executes the proposed changes. By default it runs an implicit plan first, though it can also execute a previously saved plan file.

The basic form is terraform apply [options] [plan file].

Automatic approval

Use -auto-approve to skip manual approval.

Lock timeout

Use -lock-timeout=DURATION to wait for a state lock before failing.

destroy

terraform destroy removes all infrastructure objects managed by the current configuration and workspace.

Other commands
Command Meaning
console Evaluate Terraform expressions interactively.
fmt Format configuration files.
force-unlock Remove a stale state lock. Use carefully, because unlocking while another process is still running can corrupt state.
graph Generate a dependency graph of the configuration.
import Attach an existing infrastructure object to a resource address in configuration.
login / logout Manage credentials for remote services such as Terraform Cloud or a private module registry.
output Show root module outputs.
providers Show provider dependencies for the current module.
refresh Refresh state to match remote infrastructure.
show Display a saved plan or current state in human-readable form.
workspace Manage and switch workspaces.
taint and untaint

taint marks a resource instance as not fully functional. That flag does not immediately change infrastructure, but the next plan will propose destroying and recreating the object.

untaint clears that status.

Terraform language basics
Blocks

A Terraform configuration is built from blocks. The syntax looks like this:

1
2
3
<BLOCK TYPE> "<BLOCK LABEL>" "<BLOCK LABEL>" {
  <IDENTIFIER> = <EXPRESSION>
}

A block is a container, and its meaning depends on the block type. In a resource block, the two labels identify the resource type and local name.

Depending on block type, the number of labels may be zero, fixed, or variable. A block body may contain arguments or nested blocks. Top-level blocks are limited to a fixed set of Terraform language constructs.

1
2
3
resource "aws_vpc" "main" {
  cidr_block = var.base_cidr_block
}
Arguments and identifiers

An argument assigns a value to a name. The available arguments and their types depend on context, usually the resource type or block type.

Identifiers are used for argument names, block type names, and many Terraform object names. They may contain letters, digits, -, and _, but cannot start with a digit.

Comments

Single-line comments can start with # or //. Multi-line comments use /* ... */.

Data types
Type Meaning
string Unicode text, for example "hello".
number Numeric value, for example 6.02.
bool true or false.
list / tuple Ordered collections, for example ["us-west-1a", "us-west-1c"].
map / object Key-value structures, for example { name = "Mabel", age = 52 }.

null represents the null value.

Strings and templates
Escape sequences

Terraform strings support standard escapes such as \n, \r, \t, \", \\, \uNNNN, and \UNNNNNNNN.

Heredoc
1
2
3
4
5
6
block {
  value = <<EOT
hello
world
EOT
}

Indented heredoc is also supported:

1
2
3
4
5
6
block {
  value = <<-EOT
  hello
    world
  EOT
}
JSON and YAML output

Terraform can render JSON or YAML from native values with helper functions such as jsonencode:

1
2
3
4
example = jsonencode({
  a = 1
  b = "hello"
})
String templates

Terraform supports interpolation with ${ ... } and template directives with %{ ... }.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
# expression interpolation
"Hello, ${var.name}!"
 
# conditional template
"Hello, %{ if var.name != "" }${var.name}%{ else }unnamed%{ endif }!"
 
# loop template
<<EOT
%{ for ip in aws_instance.example.*.private_ip }
 
server ${ip}
%{ endfor }
 
EOT

Whitespace trimming uses ~ inside template directives.

References

Terraform expressions can reference values from several sources:

  • <RESOURCE TYPE>.<NAME> for managed resources.
  • var.<NAME> for input variables.
  • local.<NAME> for locals.
  • module.<MODULE NAME> for child module outputs.
  • data.<DATA TYPE>.<NAME> for data resources.
  • path.module, path.root, and path.cwd for filesystem paths.
  • terraform.workspace for the current workspace name.

Special values also appear in certain contexts, including count.index, each.key, each.value, and self.

Operators and function calls

Terraform supports logical operators such as !, &&, and ||; arithmetic operators such as *, /, %, +, and -; and the usual comparison operators.

1
2
3
4
<FUNCTION NAME>(<ARGUMENT 1>, <ARGUMENT 2>)
 
# argument expansion
min([55, 2453, 2]...)
Conditional expressions
1
2
3
condition ? true_val : false_val
 
var.a != "" ? var.a : "default-a"
for expressions

A for expression transforms one complex value into another. Each input element may contribute zero or one output element.

1
2
3
4
5
[for s in var.list : upper(s)]
 
[for k, v in var.map : length(k) + length(v)]
 
{ for s in var.list : s => upper(s) }

You can also filter values with an if clause:

1
[for s in var.list : upper(s) if s != ""]

Grouping mode is enabled by adding ... at the end of the value expression:

1
2
3
4
5
locals {
  users_by_role = {
    for name, user in var.users : user.role => name...
  }
}
dynamic blocks

Expressions can assign argument values, but they cannot directly repeat or conditionally emit nested blocks. That is where dynamic blocks come in.

1
2
3
4
5
6
7
8
9
10
resource "aws_elastic_beanstalk_environment" "example" {
  dynamic "setting" {
    for_each = var.settings
    content {
      namespace = setting.value["namespace"]
      name      = setting.value["name"]
      value     = setting.value["value"]
    }
  }
}

dynamic can generate nested blocks inside resources, data sources, providers, and provisioners. It cannot generate meta-argument blocks such as lifecycle.

splat expressions

Splat expressions are a concise alternative to some for expressions:

1
2
3
4
5
[for o in var.list : o.id]
var.list[*].id
 
[for o in var.list : o.interfaces[0].name]
var.list[*].interfaces[0].name

Splat syntax works with list-like collections, not maps or objects. It can also turn a single optional value into a list-like expression in some contexts:

1
for_each = var.website[*]
Type constraints

Module and provider authors can use type constraints to validate user input. Terraform's type system is stronger than it first appears. You can constrain not only the outer type, but also the shape and element types inside it.

Collection and structural types
1
2
3
4
5
6
7
list(string)
list(number)
list(any)
 
object({ name = string, age = number })
 
tuple([string, number, bool])

Terraform also performs automatic conversions between similar complex types, such as object and map, or tuple and list, when the values fit the required shape. That flexibility is convenient, but it also means module authors should think carefully about how strict they want input constraints to be.

The special any placeholder

any is not really a type. It is a placeholder that Terraform resolves to a concrete type during type-checking. For example, a value such as ["a", "b", "c"] can satisfy list(any), and Terraform will infer a more specific list element type behind the scenes.

Optional object attributes
1
2
3
4
5
6
variable "with_optional_attribute" {
  type = object({
    a = string
    b = optional(string)
  })
}
Version constraints

Version constraints appear when selecting modules, providers, or the Terraform CLI version itself:

1
2
3
4
5
6
version = ">= 1.2.0, < 2.0.0"
 
=
!=
>  >=  <  <=
~>

~> allows changes to the rightmost specified version component.

Resources and providers
Managed resources

A resource block declares the desired shape of a real infrastructure object:

1
2
3
resource "resource_type" "local_name" {
  # arguments...
}

The resource type decides which arguments exist. The local name only matters inside the current module. Together, the type and local name form the module-local identity of the resource.

Lifecycle of a managed resource

When Terraform creates a new resource, it stores the remote object's identifier in state. On later runs, Terraform compares the real object with the configuration and decides whether to update it in place, replace it, or leave it alone.

When a configuration is applied, Terraform generally does four things:

  1. Create resources that exist in configuration but not in state.
  2. Destroy resources that exist in state but no longer exist in configuration.
  3. Update resources whose arguments changed and support in-place changes.
  4. Replace resources whose arguments changed but cannot be updated in place.

That last case depends heavily on provider behavior and the underlying API. Terraform decides the graph; the provider decides what each API operation can actually do.

Reading resource attributes

Within the same module, resource attributes are accessed as <RESOURCE TYPE>.<NAME>.<ATTRIBUTE>.

Besides user-supplied arguments, resources also expose read-only attributes that come back from the provider API, such as generated IDs.

Dependencies

Terraform infers most dependencies from expressions. If one resource argument references another resource, Terraform treats that as a dependency edge in the graph.

For dependencies that cannot be inferred from expressions, use the depends_on meta-argument.

Local-only resources

Some resource types do not represent remote infrastructure at all. They only store data in Terraform state. These local-only resources are often used for intermediate values such as generated random IDs or local key material.

Providers

Every resource type belongs to a provider. A provider is a Terraform plugin that implements one or more resource types and data source types.

A module needs providers for every resource it uses, and provider configuration is usually supplied by the root module. Providers can also expose multiple configurations, often to target different regions or accounts.

1
2
3
4
5
6
7
8
9
10
11
12
provider "google" {
  region = "us-central1"
}
 
provider "google" {
  alias  = "europe"
  region = "europe-west1"
}
 
resource "google_compute_instance" "example" {
  provider = google.europe
}

Resources implicitly depend on their selected provider configuration, so Terraform will not try to create the resource before the provider is ready.

Resource meta-arguments
depends_on

depends_on handles dependencies that expression analysis cannot see. It should be used sparingly.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
resource "aws_iam_role" "example" {
  name = "example"
}
 
resource "aws_iam_role_policy" "example" {
  role = aws_iam_role.example.name
}
 
resource "aws_instance" "example" {
  iam_instance_profile = aws_iam_role.example.name
 
  depends_on = [
    aws_iam_role_policy.example,
  ]
}
count

count creates several similar resource instances from one block:

1
2
3
4
5
6
7
8
9
10
resource "aws_instance" "server" {
  count = 4
 
  ami           = "ami-a1b2c3d4"
  instance_type = "t2.micro"
 
  tags = {
    Name = "Server ${count.index}"
  }
}

Instances are referenced with index syntax such as aws_instance.server[0].

for_each

for_each is more flexible than count when instances differ in meaningful ways. It accepts a map or a set(string).

1
2
3
4
5
6
7
8
9
resource "azurerm_resource_group" "rg" {
  for_each = {
    a_group       = "eastus"
    another_group = "westus2"
  }
 
  name     = each.key
  location = each.value
}

Resources created by for_each are referenced with key syntax such as azurerm_resource_group.rg["a_group"].

The keys must be known before apply, cannot come from impure functions such as uuid or timestamp, and cannot be sensitive values.

You can also chain for_each from one resource to another:

1
2
3
4
5
6
7
8
9
resource "aws_vpc" "example" {
  for_each   = var.vpcs
  cidr_block = each.value.cidr_block
}
 
resource "aws_internet_gateway" "example" {
  for_each = aws_vpc.example
  vpc_id   = each.value.id
}
lifecycle

The lifecycle block customizes replacement and update behavior:

1
2
3
4
5
resource "azurerm_resource_group" "example" {
  lifecycle {
    create_before_destroy = true
  }
}
Argument Meaning
create_before_destroy Create the replacement first, then delete the old object.
prevent_destroy Fail if the plan would delete the resource.
ignore_changes Ignore selected attribute differences when deciding whether an update is needed. The special value all suppresses all updates.
timeouts

Some resource types provide a nested timeouts block:

1
2
3
4
5
6
7
resource /* ... */ {
  timeouts {
    create = "60m"
    update = "30m"
    delete = "2h"
  }
}
Provisioners

Provisioners are the escape hatch for actions that do not fit Terraform's declarative model. Use them reluctantly. They add uncertainty and sit outside the normal planning model.

Terraform cannot reason very well about provisioner side effects. Provisioners also tend to need direct network access, credentials, and timing assumptions that make runs less predictable.

self, when, and on_failure

Provisioners use self to refer to the parent resource. They also support when and on_failure:

1
2
3
4
5
6
resource "aws_instance" "web" {
  provisioner "local-exec" {
    when    = destroy
    command = "echo 'Destroy-time provisioner'"
  }
}

If a create-time provisioner fails, Terraform marks the resource tainted so the next apply can replace it.

connection settings

Many provisioners need SSH or WinRM. Connection details can be declared at the resource level or on a specific provisioner:

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
provisioner "file" {
  connection {
    type     = "ssh"
    user     = "root"
    password = var.root_password
    host     = var.host
  }
}
 
provisioner "file" {
  connection {
    type     = "winrm"
    user     = "Administrator"
    password = var.admin_password
    host     = var.host
  }
}
null_resource and common provisioners

null_resource exists for provisioner-driven workflows that are not tied to a real managed resource.

1
2
3
4
5
6
7
8
9
10
11
resource "null_resource" "cluster" {
  triggers = {
    cluster_instance_ids = join(",", aws_instance.cluster.*.id)
  }
 
  provisioner "remote-exec" {
    inline = [
      "bootstrap-cluster.sh ${join(" ", aws_instance.cluster.*.private_ip)}",
    ]
  }
}

The common built-in provisioners are:

Provisioner Meaning
file Copy files or directories from the machine running Terraform to the target resource.
local-exec Run a local command after a resource action.
remote-exec Connect to the remote resource and run commands there.
Data sources

A data source, declared with a data block, reads information from an external system and exposes the result to the configuration. It is still provider-backed, but it only reads.

1
2
3
4
5
6
7
8
9
data "aws_ami" "example" {
  most_recent = true
 
  owners = ["self"]
  tags = {
    Name   = "app-server"
    Tested = "true"
  }
}

If the query arguments are known during planning, Terraform reads the data source during refresh. If those arguments depend on values that will only exist after apply, Terraform delays the read until apply time.

Data sources support the same dependency patterns and most of the same meta-arguments as managed resources.

Variables, locals, and outputs

Modules in Terraform behave a bit like functions. Input variables are the parameters, outputs are the return values, and locals are internal named expressions.

Input variables

Input variables parameterize a module so it can be reused in different configurations. Root module variables can be set from the CLI or variable files. Child module variables must be passed through the corresponding module block.

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
variable "image_id" {
  type        = string
  description = ""
 
  validation {
    condition     = bool-expr
    error_message = ""
  }
 
  sensitive = false
}
 
variable "availability_zone_names" {
  type    = list(string)
  default = ["us-west-1a"]
}

Variable values can come from -var, -var-file, environment variables, or automatically loaded files such as terraform.tfvars.

Locals

Locals are named expressions used to simplify or normalize configuration logic:

1
2
3
4
5
6
locals {
  common_tags = {
    Project = "demo"
    Owner   = "infra"
  }
}

Locals can reference other locals as long as there is no dependency cycle.

Outputs

Outputs expose values from a module to its caller or to the CLI:

1
2
3
output "vpc_id" {
  value = aws_vpc.main.id
}
How to read Terraform

Terraform makes more sense once you treat it as a graph engine wrapped around provider APIs. Configuration declares vertices and edges. State records which remote objects correspond to which addresses. Providers translate graph operations into API calls.

Most Terraform work is not about memorizing syntax. It is about knowing which values are known at plan time, where dependencies come from, what the provider can update in place, and when a resource has to be replaced. Once those four things are clear, the language stops feeling mysterious.

← 草缸2021
Kubernetes Migration →

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code class="" title="" data-url=""> <del datetime=""> <em> <i> <q cite=""> <strike> <strong> <pre class="" title="" data-url=""> <span class="" title="" data-url="">

Related Posts

  • Replacing Docker Desktop with Colima on macOS
  • IaaS知识集锦
  • Ceph学习笔记

Recent Posts

  • 人工智能知识 - 编程
  • 人工智能知识 - 智能体
  • 人工智能知识 - Transformers和大模型
  • 人工智能知识 - 主要应用领域
  • 人工智能知识 - 算法和机器学习
ABOUT ME

汪震 | Alex Wong

江苏淮安人,现居北京。目前供职于腾讯云,专注国际售后AI落地。

GitHub:gmemcc

Git:git.gmem.cc

Email:gmemjunk@gmem.cc@me.com

ABOUT GMEM

绿色记忆是我的个人网站,域名gmem.cc中G是Green的简写,MEM是Memory的简写,CC则是我的小天使彩彩名字的简写。

我在这里记录自己的工作与生活,同时和大家分享一些编程方面的知识。

GMEM HISTORY
v2.00:微风
v1.03:单车旅行
v1.02:夏日版
v1.01:未完成
v0.10:彩虹天堂
v0.01:阳光海岸
MIRROR INFO
Meta
  • Log in
  • Entries RSS
  • Comments RSS
  • WordPress.org
Recent Posts
  • 人工智能知识 - 编程
    这一篇专门处理 AI 训练、微调、推理与部署中的编程栈问题。前几篇分别讲了机器学习基础、任务版图、Transfo ...
  • 人工智能知识 - 智能体
    这一篇处理模型之外的系统层问题,包括上下文工程、Harness Engineering、检索增强生成(RAG)与 ...
  • 人工智能知识 - Transformers和大模型
    这一篇聚焦现代大模型主线,内容从 Transformer 架构出发,延伸到语言模型、多模态模型、预训练与微调,以 ...
  • 人工智能知识 - 主要应用领域
    这一篇从任务视角进入现代 AI 的几个核心应用方向,重点讨论自然语言处理、计算机视觉、语音和音频处理、搜索/推荐 ...
  • 人工智能知识 - 算法和机器学习
    这一篇从常用算法进入机器学习基础概念、经典机器学习与神经网络,重点讨论“模型如何被构造、训练、评估与正则化”。前 ...
  • 人工智能知识 - 数学基础
    这一篇整理 AI 所需的数学基础,包括基础数学、线性代数、微积分与概率论统计。它回答的核心问题是:模型里的向量、 ...
  • 人工智能知识 - 简介
    这一篇作为整套 AI 总纲的导论,先不进入公式和具体模型细节,而是回答更根本的问题:什么叫智能,人工智能究竟在试 ...
  • 多语言敏感信息检测模型训练日志
    这篇文章记录一个多语言敏感信息识别项目的完整训练日志。它关注的是工程路径本身:原始 AI 合成语料如何被清洗成可 ...
  • DevPod on Kubernetes: turning devcontainer.json into a persistent remote workspace
    DevPod is an open source workspace manager ...
  • OpenClaw: Architecture, Components, and Deployment Notes
    Four Months, 343,000 Stars On November 24, 2025, ...
  • Replacing Docker Desktop with Colima on macOS
    Colima is one of the cleanest ways ...
  • Kubernetes GPU Sharing
    GPU sharing in Kubernetes depends on what ...
  • Investigating and Solving the Issue of Failed Certificate Request with ZeroSSL and Cert-Manager
    In this blog post, I will walk ...
  • A Comprehensive Study of Kotlin for Java Developers
    Introduction Purpose of the Study Understanding the Mo ...
  • LangChain: Architecture, LCEL, Agents, LangGraph, Retrieval, and Production Patterns
    LangChain is no longer best understood as ...
  • Kubernetes Migration
    Migrating a Kubernetes cluster from one cloud ...
  • Terraform: a practical guide to infrastructure as code
    Terraform is an infrastructure-as-code tool. You describ ...
  • 草缸2021
    经过四个多月的努力,我的小小荷兰景到达极致了状态。

TOPLINKS
  • Zitahli's blue 91 people like this
  • 梦中的婚礼 64 people like this
  • 汪静好 61 people like this
  • 那年我一岁 36 people like this
  • 为了爱 28 people like this
  • 小绿彩 26 people like this
  • 彩虹姐姐的笑脸 24 people like this
  • 杨梅坑 6 people like this
  • 亚龙湾之旅 1 people like this
  • 汪昌博 people like this
  • 2013年11月香山 10 people like this
  • 2013年7月秦皇岛 6 people like this
  • 2013年6月蓟县盘山 5 people like this
  • 2013年2月梅花山 2 people like this
  • 2013年淮阴自贡迎春灯会 3 people like this
  • 2012年镇江金山游 1 people like this
  • 2012年徽杭古道 9 people like this
  • 2011年清明节后扬州行 1 people like this
  • 2008年十一云龙公园 5 people like this
  • 2008年之秋忆 7 people like this
  • 老照片 13 people like this
  • 火一样的六月 16 people like this
  • 发黄的相片 3 people like this
  • Cesium学习笔记 90 people like this
  • IntelliJ IDEA知识集锦 59 people like this
  • Bazel学习笔记 38 people like this
  • 基于Kurento搭建WebRTC服务器 38 people like this
  • PhoneGap学习笔记 32 people like this
  • NaCl学习笔记 32 people like this
  • 使用Oracle Java Mission Control监控JVM运行状态 29 people like this
  • Ceph学习笔记 27 people like this
  • 基于Calico的CNI 27 people like this
Tag Cloud
ActiveMQ AspectJ CDT Ceph Chrome CNI Command Cordova Coroutine CXF Cygwin DNS Docker eBPF Eclipse ExtJS F7 FAQ Groovy Hibernate HTTP IntelliJ IO编程 IPVS JacksonJSON JMS JSON JVM K8S kernel LB libvirt Linux知识 Linux编程 LOG Maven MinGW Mock Monitoring Multimedia MVC MySQL netfs Netty Nginx NIO Node.js NoSQL Oracle PDT PHP Redis RPC Scheduler ServiceMesh SNMP Spring SSL svn Tomcat TSDB Ubuntu WebGL WebRTC WebService WebSocket wxWidgets XDebug XML XPath XRM ZooKeeper 亚龙湾 单元测试 学习笔记 实时处理 并发编程 彩姐 性能剖析 性能调优 文本处理 新特性 架构模式 系统编程 网络编程 视频监控 设计模式 远程调试 配置文件 齐塔莉
Recent Comments
  • 杨松涛 on snmp4j学习笔记
  • kaka on Cilium学习笔记
  • JackZhouMine on Cesium学习笔记
  • 陈黎 on 通过自定义资源扩展Kubernetes
  • qg on Istio中的透明代理问题
  • heao on 基于本地gRPC的Go插件系统
  • 黄豆豆 on Ginkgo学习笔记
  • cloud on OpenStack学习笔记
  • 5dragoncon on Cilium学习笔记
  • Archeb on 重温iptables
  • C/C++编程:WebSocketpp(Linux + Clion + boostAsio) – 源码巴士 on 基于C/C++的WebSocket库
  • jerbin on eBPF学习笔记
  • point on Istio中的透明代理问题
  • G on Istio中的透明代理问题
  • 绿色记忆:Go语言单元测试和仿冒 on Ginkgo学习笔记
  • point on Istio中的透明代理问题
  • 【Maven】maven插件开发实战 – IT汇 on Maven插件开发
  • chenlx on eBPF学习笔记
  • Alex on eBPF学习笔记
  • CFC4N on eBPF学习笔记
  • 李运田 on 念爷爷
  • yongman on 记录一次KeyDB缓慢的定位过程
  • Alex on Istio中的透明代理问题
©2005-2026 Gmem.cc | Powered by WordPress | 京ICP备18007345号-2