Skip to content

Commit 9267c55

Browse files
author
Katie Horne
committed
chore: remove info re: resources
1 parent 4b42e37 commit 9267c55

File tree

1 file changed

+8
-25
lines changed

1 file changed

+8
-25
lines changed

docs/templates.md

Lines changed: 8 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -23,22 +23,6 @@ vim <template-name>/main.tf
2323
coder templates <create/update> <template-name>
2424
```
2525

26-
## Persistent and ephemeral resources
27-
28-
Coder supports both ephemeral and persistent resources in workspaces. Ephemeral
29-
resources are destroyed when a workspace is not in use (e.g., when it is
30-
stopped). Persistent resources remain. See how this works for a sample front-end
31-
template:
32-
33-
| Resource | Type |
34-
| :--------------------------- | :--------- |
35-
| google_compute_disk.home_dir | persistent |
36-
| kubernetes_pod.dev | ephemeral |
37-
| └─ nodejs (linux, amd64) | |
38-
| api_token.backend | ephemeral |
39-
40-
When a workspace is deleted, all resources are destroyed.
41-
4226
## Parameters
4327

4428
Templates often contain *parameters*. In Coder, there are two types of parameters:
@@ -47,10 +31,9 @@ Templates often contain *parameters*. In Coder, there are two types of parameter
4731
are often cloud secrets, such as a `ServiceAccount` token, and are annotated
4832
with `sensitive = true` in the template code.
4933

50-
- **User parameters** are set when a user creates a workspace. They are unique to
51-
each workspace, often personalization settings such as "preferred
52-
region" or "workspace image".
53-
34+
- **User parameters** are set when a user creates a workspace. They are unique
35+
to each workspace, often personalization settings such as "preferred region"
36+
or "workspace image".
5437

5538
## Best Practices
5639

@@ -70,12 +53,12 @@ provider credentials out of Coder's database (making it a less valuable target f
7053
and is compatible with agent-based authentication schemes (that handle credential rotation
7154
and/or ensure the credentials are not written to disk).
7255

73-
Cloud providers for which the Terraform provider supports authenticated environments include
56+
Cloud providers for which the Terraform provider supports authenticated environments include:
7457

75-
* [Google Cloud](https://registry.terraform.io/providers/hashicorp/google/latest/docs)
76-
* [Amazon Web Services](https://registry.terraform.io/providers/hashicorp/aws/latest/docs)
77-
* [Microsoft Azure](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs)
78-
* [Kubernetes](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs)
58+
- [Google Cloud](https://registry.terraform.io/providers/hashicorp/google/latest/docs)
59+
- [Amazon Web Services](https://registry.terraform.io/providers/hashicorp/aws/latest/docs)
60+
- [Microsoft Azure](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs)
61+
- [Kubernetes](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs)
7962

8063
Additional providers may be supported; check the
8164
[documentation of the Terraform provider](https://registry.terraform.io/browse/providers) for

0 commit comments

Comments
 (0)