HCP Terraform
Use HCP Terraform (formerly Terraform Cloud) for collaboration, governance, and enterprise workflows.
HCP Terraform (formerly known as Terraform Cloud) is HashiCorp's managed service platform that provides a collaborative environment for teams to use Terraform effectively. It offers a centralized workflow for infrastructure as code management, making it easier for organizations to adopt and scale tβ¦
Concepts covered: HCP Terraform overview, Remote execution in HCP Terraform, HCP Terraform runs and applies, Team collaboration features, Run triggers and notifications, Policy as Code with Sentinel, Cost estimation features, HCP Terraform workspaces, Workspace variables and settings, Projects for workspace organization, Workspace execution modes, Configuring the cloud block, CLI-driven runs with HCP Terraform, VCS integration and workflows, API tokens and authentication
TA-004 - HCP Terraform Example Questions
Test your knowledge of HCP Terraform
Question 1
Scenario: ByteWave Technologies manages a Terraform Cloud organization that has grown to 175 workspaces over the past year. The company operates three distinct business segments: B2B Enterprise, Consumer Mobile, and IoT Devices. Each segment has dedicated engineering teams with different deployment cadences - B2B Enterprise deploys weekly with extensive approval workflows, Consumer Mobile deploys daily, and IoT Devices has bi-weekly firmware update cycles. The operations manager reports that the current organization structure creates confusion during incident response because on-call engineers cannot quickly determine which workspaces belong to which business segment. Last quarter, variable set updates intended for Consumer Mobile accidentally propagated to IoT Devices workspaces because both shared similar workspace naming patterns. The engineering leadership wants to implement a structure where variable sets can be scoped to specific business segments, on-call engineers can filter workspaces by segment during incidents, and team permissions can be managed at the segment level rather than workspace-by-workspace. Which implementation approach should ByteWave Technologies pursue to achieve segment-scoped variable management, improved workspace filtering, and consolidated permission management?
Question 2
Scenario: MedTech Industries runs a healthcare platform using Terraform Cloud with 85 workspaces. The organization has four distinct departments: Clinical Systems, Research & Development, Administrative Operations, and Patient Portal. Each department has a dedicated infrastructure team, and the company recently hired a new CTO who requires monthly reports showing which department owns which infrastructure resources. Currently, all workspaces exist at the organization root level with a naming convention like 'clinical-prod-api' and 'research-dev-database'. The compliance officer has flagged that access reviews are becoming increasingly complex because workspace permissions are granted individually, making it difficult to verify that only authorized personnel can access sensitive clinical infrastructure. The infrastructure director wants to streamline permission management so that granting a new team member access to all departmental workspaces can be accomplished through a single configuration change. What organizational restructuring should MedTech Industries implement to address ownership visibility, simplified access management, and departmental grouping requirements?
Question 3
A software consulting firm uses Terraform Cloud to manage infrastructure for multiple clients. They have a 'shared-services' workspace that provisions common monitoring and logging resources, with run triggers configured to three client workspaces: 'client-alpha', 'client-beta', and 'client-gamma'. The operations manager wants to set up notifications so their external ticketing system receives HTTP callbacks whenever a triggered run in any of the downstream client workspaces encounters a Sentinel policy failure. They configured a webhook notification on the 'shared-services' workspace with the 'Run Errored' event type, expecting it to capture policy failures across all triggered workspaces. After a policy check failure occurs in 'client-beta', the ticketing system does not receive any callback. The operations manager is confused because the run trigger successfully initiated the run in 'client-beta'. What explains why the ticketing system did not receive the callback when 'client-beta' experienced a policy failure?