Unverified Commit ffbdd721 authored by James Bardin's avatar James Bardin Committed by GitHub
Browse files

Merge pull request #26487 from hashicorp/jbardin/shell-escape

update taint command example
parents 014fb898 c1efe351
Showing with 6 additions and 2 deletions
+6 -2
......@@ -76,14 +76,18 @@ The resource aws_security_group.allow_all in the module root has been marked as
## Example: Tainting a single resource created with for_each
It is necessary to wrap the resource in single quotes and escape the quotes.
This example will taint a single resource created with for_each:
```
$ terraform taint "module.route_tables.azurerm_route_table.rt[\"DefaultSubnet\"]"
$ terraform taint 'module.route_tables.azurerm_route_table.rt["DefaultSubnet"]'
The resource module.route_tables.azurerm_route_table.rt["DefaultSubnet"] in the module root has been marked as tainted.
```
~> Note: In most `sh` compatible shells, double quotes and spaces can be
escaped by wrapping the argument in single quotes. This however varies between
other shells and operating systems, and users should use the appropriate escape
characters based on the applicable quoting rules for their shell to pass the
address string, including quotes, to Terraform.
## Example: Tainting a Resource within a Module
......
Supports Markdown
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment