diff --git a/website/docs/commands/taint.html.markdown b/website/docs/commands/taint.html.markdown index 8086ffefc..65c758d9c 100644 --- a/website/docs/commands/taint.html.markdown +++ b/website/docs/commands/taint.html.markdown @@ -76,14 +76,18 @@ The resource aws_security_group.allow_all in the module root has been marked as ## Example: Tainting a single resource created with for_each -It is necessary to wrap the resource in single quotes and escape the quotes. This example will taint a single resource created with for_each: ``` -$ terraform taint "module.route_tables.azurerm_route_table.rt[\"DefaultSubnet\"]" +$ terraform taint 'module.route_tables.azurerm_route_table.rt["DefaultSubnet"]' The resource module.route_tables.azurerm_route_table.rt["DefaultSubnet"] in the module root has been marked as tainted. ``` +~> Note: In most `sh` compatible shells, double quotes and spaces can be +escaped by wrapping the argument in single quotes. This however varies between +other shells and operating systems, and users should use the appropriate escape +characters based on the applicable quoting rules for their shell to pass the +address string, including quotes, to Terraform. ## Example: Tainting a Resource within a Module