Resourcely Documentation
LoginSign Up
  • Get Started
    • 🎱What is Resourcely?
    • 👋Why Resourcely
    • 🏃Quickstart
      • Terraform policies integrated into CI
      • Remediate policy violations in existing infrastructure
      • Templates for generating Terraform
      • Glossary
  • Concepts
    • Foundry
      • Create Blueprints with Foundry
      • Creating Guardrails with Foundry
      • lmport Terraform Modules
    • Guardrails
      • Writing your own Guardrails
      • Editing Guardrails
      • Releasing Guardrails
      • Enabling Inactive Guardrails
      • Guardrails in Action
        • 🐱GitHub Actions
        • 🦊GitLab Pipelines
    • Campaigns
      • Get started with Campaigns
      • Creating Campaigns
      • Remediate Resources
      • Campaign Agent
        • State File Support
          • Amazon Simple Storage Service (S3)
          • Google Cloud Storage (GCS)
          • HCP Terraform
          • Spacelift
        • Running Campaigns with GitHub Actions and a Repo-Hosted State File
        • Running Campaigns Locally
    • Blueprints
      • Authoring Your Own Blueprints
      • Using Built-in Resourcely Blueprints
      • Configuring Global Contexts
      • Deep Linking
    • Resources
      • Provisioning Infrastructure
      • Editing Infrastructure
      • Shopping Cart
      • Config Roots and Environments
    • Other Features and Settings
      • Global Values
      • Global Context
      • Metrics
      • Resourcely-cli
      • Resourcely.yaml
      • VCS Proxy
      • Settings
        • User management
        • Company Information
        • Notification Settings
        • Change Management
          • 🐱Connect to GitHub
          • 🦊Connect to Gitlab
        • Generate API Token
    • ✨Production Setup
      • Single Sign-On (SSO)
        • Auth0
        • AWS Single Sign-On
        • Azure AD
        • Google Workspace
        • JumpCloud
        • Okta
        • Omnissa Workspace ONE (formerly VMware)
        • OneLogin
        • Ping Identity
        • Other SAML / OIDC Providers
      • Source Code Management
        • Page
        • 🐱GitHub
        • 🦊GitLab
        • Atlassian Bitbucket
        • Azure Repos
  • Tutorials and guides
    • Remediation Use Cases
      • Apply tags to resources for automating backups
      • Implement centralized logging
    • Blueprints Use Cases
      • Automate Data Pipeline Creation
      • Encryption for GCP
      • AWS Account Factory
      • Streamline and govern AI
      • IAM Factory
      • Cost optimization for FinOps
      • Guardrails for Terraform Modules
    • Using the Resourcely Terraform Provider
      • Setup Resourcely Provider
      • Blueprints
      • Guardrails
      • Global Context
  • Integrate
    • CI/CD & Terraform Runners
      • Atlantis
      • 🐟AWS CodeBuild
      • Azure Pipelines
      • Buildkite
      • CircleCI
      • CloudBees CI
      • Codefresh
      • Digger
      • Env0
      • 🎏GitHub Actions
        • 🐱Local Plan
          • 🐹AWS with OpenID Connect
        • 🐶Terraform Cloud Integration
      • 🦊GitLab Pipelines
      • Harness
      • 🗻HashiCorp Cloud Platform (formerly Terraform Cloud)
      • Jenkins
      • Octopus Deploy
      • Scalr
      • 🌌Spacelift
      • Terramate
      • 🌎Terrateam
    • Cloud Providers
      • 🌨️Amazon Web Services (AWS)
      • 🤓Google Cloud Platform (GCP)
        • Guardrail Gaunlet at Google Cloud Next 2025
      • 💾Microsoft Azure
      • Alibaba Cloud
      • Huawei Cloud
      • IBM Cloud
      • Oracle Cloud Infrastructure (OCI)
      • Tencent Cloud
      • VMware vSphere
    • Developer Portals
      • Atlassian Compass
      • Backstage
      • Cortex
      • Harness IDP
      • Home grown internal developer portals
      • OpsLevel
      • Port
      • Roadie
    • ITSM
      • Atlassian Jira
      • FreshWorks
      • ServiceNow ITSM
      • ZenDesk
    • CSPM
      • Wiz
    • More Terraform Provider Integrations
      • 🚂ConductorOne Provider
      • Databricks Provider
      • Kubernetes Provider
      • 🐕Datadog Provider
      • ❄️Snowflake Provider
Powered by GitBook
On this page
  • Using existing External Modules
  • Importing new external Modules
  1. Concepts
  2. Foundry

lmport Terraform Modules

Customize and use custom Terraform Modules

PreviousCreating Guardrails with FoundryNextGuardrails

Last updated 9 months ago

Using existing External Modules

From the Foundry you can include a module invocation of any module previously imported.

Then select the module's source and version. If you don't see the module you're looking for you can import it as a new module.

Importing a new module will not save the existing foundry content you have in progress

Foundry will then add the module's content into the existing content

Importing new external Modules

If there is a specific module that you would like to use that has not been previously imported, you can import one from an external source. You can see all blueprints available to you by clicking on the Blueprints tab in Resourcely's navigation menu. You can press the Create a blueprint button to begin the process of creating one.

Resourcely allows you to import an existing module and manually set up the shape of your new blueprint. In order to import a module you must choose the Import a module from external source option and then press the Continue button.

Now select what source to import a module from. Resourcely allows module imports from:

  • GitHub/GitLab Repository

  • Terraform Registry

For GitHub/GitLab Repository import the Repository URL, Module Path, and Authentication are required.

For Terraform Registry import the Source (<namespace>/<module_name>/<provider>), and Module Version are required.

To create an accurate blueprint, Resourcely detects your module's inputs. In most cases, Resourcely can automatically infer types for each input. For cases where module fields cannot be auto-configured, you'll find these inputs under the Manually Configured tab.

Make sure you verify the auto-configured values, set various other metadata, and press the Continue button to proceed.

Now organize and group inputs to make it easier for developers to utilize blueprints. Press the Continue button to proceed.

Using the Terraform module as a source, import the , and then press the Continue button to proceed.

When modifying types, you can either choose from the options in the dropdown, or you can enter the type yourself using .

Google Service Accounts module
Terraform type constraints
Create Blueprints with Foundry
Add a module into Foundry
Selecting a module Source and version
Foundry with a module invocation
Resourcely Available Blueprints
Import a module from external source
Select a Source for Custom Module
Configure Module Inputs
Organize and Group Inputs