index.md 12.0 KB
Newer Older
1 2 3 4 5 6
---
stage: Configure
group: Configure
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#designated-technical-writers
---

7 8
# Infrastructure as code with Terraform and GitLab

9 10 11 12 13 14 15
## Motivation

The Terraform integration features within GitLab enable your GitOps / Infrastructure-as-Code (IaC)
workflows to tie into GitLab's authentication and authorization. These features focus on
lowering the barrier to entry for teams to adopt Terraform, collaborate effectively within
GitLab, and support Terraform best practices.

16
## GitLab managed Terraform State
17

18 19
> [Introduced](https://gitlab.com/groups/gitlab-org/-/epics/2673) in GitLab 13.0.

20 21 22 23 24
[Terraform remote backends](https://www.terraform.io/docs/backends/index.html)
enable you to store the state file in a remote, shared store. GitLab uses the
[Terraform HTTP backend](https://www.terraform.io/docs/backends/types/http.html)
to securely store the state files in local storage (the default) or
[the remote store of your choice](../../administration/terraform_state.md).
25

26 27 28 29 30 31 32 33
The GitLab managed Terraform state backend can store your Terraform state easily and
securely, and spares you from setting up additional remote resources like
Amazon S3 or Google Cloud Storage. Its features include:

- Supporting encryption of the state file both in transit and at rest.
- Locking and unlocking state.
- Remote Terraform plan and apply execution.

34
To get started with a GitLab-managed Terraform State, there are two different options:
35

36
- [Use a local machine](#get-started-using-local-development).
37
- [Use GitLab CI](#get-started-using-gitlab-ci).
38

39
## Get started using local development
40

41 42
If you plan to only run `terraform plan` and `terraform apply` commands from your
local machine, this is a simple way to get started:
43

44 45 46 47
1. Create your project on your GitLab instance.
1. Navigate to **{settings}** **Settings > General** and note your **Project name**
   and **Project ID**.
1. Define the Terraform backend in your Terraform project to be:
48

49 50 51 52 53 54
   ```hcl
   terraform {
     backend "http" {
     }
   }
   ```
55

56 57 58 59
1. Create a [Personal Access Token](../profile/personal_access_tokens.md) with
   the `api` scope. The Terraform backend is restricted to users with
   [Maintainer access](../permissions.md) to the repository.

60
1. On your local machine, run `terraform init`, passing in the following options,
61 62 63 64
   replacing `<YOUR-PROJECT-NAME>`, `<YOUR-PROJECT-ID>`,  `<YOUR-USERNAME>` and
   `<YOUR-ACCESS-TOKEN>` with the relevant values. This command initializes your
   Terraform state, and stores that state within your GitLab project. This example
   uses `gitlab.com`:
65 66 67 68 69 70 71 72 73 74 75 76

   ```shell
   terraform init \
       -backend-config="address=https://gitlab.com/api/v4/projects/<YOUR-PROJECT-ID>/terraform/state/<YOUR-PROJECT-NAME>" \
       -backend-config="lock_address=https://gitlab.com/api/v4/projects/<YOUR-PROJECT-ID>/terraform/state/<YOUR-PROJECT-NAME>/lock" \
       -backend-config="unlock_address=https://gitlab.com/api/v4/projects/<YOUR-PROJECT-ID>/terraform/state/<YOUR-PROJECT-NAME>/lock" \
       -backend-config="username=<YOUR-USERNAME>" \
       -backend-config="password=<YOUR-ACCESS-TOKEN>" \
       -backend-config="lock_method=POST" \
       -backend-config="unlock_method=DELETE" \
       -backend-config="retry_wait_min=5"
   ```
77

78
Next, [configure the backend](#configure-the-backend).
79

80
## Get started using GitLab CI
81

82 83
If you don't want to start with local development, you can also use GitLab CI to
run your `terraform plan` and `terraform apply` commands.
84

85
Next, [configure the backend](#configure-the-backend).
86

87
## Configure the backend
88

89 90
After executing the `terraform init` command, you must configure the Terraform backend
and the CI YAML file:
91

92 93 94
CAUTION: **Important:**
The Terraform backend is restricted to users with [Maintainer access](../permissions.md)
to the repository.
95

96 97 98
1. In your Terraform project, define the [HTTP backend](https://www.terraform.io/docs/backends/types/http.html)
   by adding the following code block in a `.tf` file (such as `backend.tf`) to
   define the remote backend:
99

100 101 102 103 104 105
   ```hcl
   terraform {
     backend "http" {
     }
   }
   ```
106

107 108 109 110
1. In the root directory of your project repository, configure a
   `.gitlab-ci.yaml` file. This example uses a pre-built image which includes a
   `gitlab-terraform` helper. For supported Terraform versions, see the [GitLab
   Terraform Images project](https://gitlab.com/gitlab-org/terraform-images).
111

112
   ```yaml
113
   image: registry.gitlab.com/gitlab-org/terraform-images/stable:latest
114
   ```
115

116 117 118 119 120
1. In the `.gitlab-ci.yaml` file, define some environment variables to ease
   development. In this example, `TF_STATE` is the name of the Terraform state
   (projects may have multiple states), `TF_ADDRESS` is the URL to the state on
   the GitLab instance where this pipeline runs, and `TF_ROOT` is the directory
   where the Terraform commands must be executed:
121

122 123
   ```yaml
   variables:
124 125
     TF_STATE: ${CI_PROJECT_NAME}
     TF_ADDRESS: ${CI_API_V4_URL}/projects/${CI_PROJECT_ID}/terraform/state/${TF_STATE}
126
     TF_ROOT: ${CI_PROJECT_DIR}/environments/cloudflare/production
127

128
   cache:
129
     key: ${TF_STATE}
130
     paths:
131
       - ${TF_ROOT}/.terraform
132
   ```
133

134
1. In a `before_script`, change to your `TF_ROOT`:
135

136 137 138 139 140
   ```yaml
   before_script:
     - cd ${TF_ROOT}

   stages:
141
     - prepare
142 143 144 145
     - validate
     - build
     - deploy

146 147 148 149 150
   init:
     stage: prepare
     script:
       - gitlab-terraform init

151 152 153
   validate:
     stage: validate
     script:
154
       - gitlab-terraform validate
155 156 157 158

   plan:
     stage: build
     script:
159 160 161 162 163 164 165 166
       - gitlab-terraform plan
       - gitlab-terraform plan-json
     artifacts:
       name: plan
       paths:
         - ${TF_ROOT}/plan.cache
       reports:
         terraform: ${TF_ROOT}/plan.json
167 168 169 170 171 172

   apply:
     stage: deploy
     environment:
       name: production
     script:
173
       - gitlab-terraform apply
174 175 176 177 178 179
     dependencies:
       - plan
     when: manual
     only:
       - master
   ```
180

181 182 183
1. Push your project to GitLab, which triggers a CI job pipeline. This pipeline
   runs the `gitlab-terraform init`, `gitlab-terraform validate`, and
   `gitlab-terraform plan` commands.
184 185 186 187 188 189

The output from the above `terraform` commands should be viewable in the job logs.

## Example project

See [this reference project](https://gitlab.com/nicholasklick/gitlab-terraform-aws) using GitLab and Terraform to deploy a basic AWS EC2 within a custom VPC.
190 191 192

## Output Terraform Plan information into a merge request

193
Using the [GitLab Terraform Report artifact](../../ci/pipelines/job_artifacts.md#artifactsreportsterraform),
194 195 196 197
you can expose details from `terraform plan` runs directly into a merge request widget,
enabling you to see statistics about the resources that Terraform will create,
modify, or destroy.

198 199 200 201
Let's explore how to configure a GitLab Terraform Report artifact. You can
either use a pre-built image which includes a `gitlab-terraform` helper as
above, where `gitlab-terraform plan-json` outputs the required artifact, or you
can configure this manually as follows:
202

203
1. For simplicity, let's define a few reusable variables to allow us to
204 205 206 207
   refer to these files multiple times:

   ```yaml
   variables:
208 209
     PLAN: plan.cache
     PLAN_JSON: plan.json
210 211
   ```

212 213 214 215 216 217 218 219 220 221 222
1. Install `jq`, a
   [lightweight and flexible command-line JSON processor](https://stedolan.github.io/jq/).
1. Create an alias for a specific `jq` command that parses out the information we
   want to extract from the `terraform plan` output:

   ```yaml
   before_script:
     - apk --no-cache add jq
     - alias convert_report="jq -r '([.resource_changes[]?.change.actions?]|flatten)|{\"create\":(map(select(.==\"create\"))|length),\"update\":(map(select(.==\"update\"))|length),\"delete\":(map(select(.==\"delete\"))|length)}'"
   ```

223 224 225 226 227 228 229 230 231 232 233 234
   NOTE: **Note:**
   In distributions that use Bash (for example, Ubuntu), `alias` statements are not
   expanded in non-interactive mode. If your pipelines fail with the error
   `convert_report: command not found`, alias expansion can be activated explicitly
   by adding a `shopt` command to your script:

   ```yaml
   before_script:
     - shopt -s expand_aliases
     - alias convert_report="jq -r '([.resource_changes[]?.change.actions?]|flatten)|{\"create\":(map(select(.==\"create\"))|length),\"update\":(map(select(.==\"update\"))|length),\"delete\":(map(select(.==\"delete\"))|length)}'"
   ```

235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252
1. Define a `script` that runs `terraform plan` and `terraform show`. These commands
   pipe the output and convert the relevant bits into a store variable `PLAN_JSON`.
   This JSON is used to create a
   [GitLab Terraform Report artifact](../../ci/pipelines/job_artifacts.md#artifactsreportsterraform).
   The Terraform report obtains a Terraform `tfplan.json` file. The collected
   Terraform plan report is uploaded to GitLab as an artifact, and is shown in merge requests.

   ```yaml
   plan:
     stage: build
     script:
       - terraform plan -out=$PLAN
       - terraform show --json $PLAN | convert_report > $PLAN_JSON
     artifacts:
       reports:
         terraform: $PLAN_JSON
   ```

253 254
   For a full example using the pre-built image, see [Example `.gitlab-ci.yaml`
   file](#example-gitlab-ciyaml-file).
255

256
   For an example displaying multiple reports, see [`.gitlab-ci.yaml` multiple reports file](#multiple-terraform-plan-reports).
257

258 259
1. Running the pipeline displays the widget in the merge request, like this:

260
   ![Merge Request Terraform widget](img/terraform_plan_widget_v13_2.png)
261 262 263 264 265 266 267 268 269

1. Clicking the **View Full Log** button in the widget takes you directly to the
   plan output present in the pipeline logs:

   ![Terraform plan logs](img/terraform_plan_log_v13_0.png)

### Example `.gitlab-ci.yaml` file

```yaml
270
image: registry.gitlab.com/gitlab-org/terraform-images/stable:latest
271 272

variables:
273 274 275
  TF_STATE: ${CI_PROJECT_NAME}
  TF_ADDRESS: ${CI_API_V4_URL}/projects/${CI_PROJECT_ID}/terraform/state/${TF_STATE}
  TF_ROOT: ${CI_PROJECT_DIR}/environments/cloudflare/production
276 277

cache:
278
  key: ${TF_STATE}
279
  paths:
280
    - ${TF_ROOT}/.terraform
281 282 283 284 285

before_script:
  - cd ${TF_ROOT}

stages:
286
  - prepare
287 288 289 290
  - validate
  - build
  - deploy

291 292 293 294 295
init:
  stage: prepare
  script:
    - gitlab-terraform init

296 297 298
validate:
  stage: validate
  script:
299
    - gitlab-terraform validate
300 301 302 303

plan:
  stage: build
  script:
304 305
    - gitlab-terraform plan
    - gitlab-terraform plan-json
306
  artifacts:
307 308 309
    name: plan
    paths:
      - ${TF_ROOT}/plan.cache
310
    reports:
311
      terraform: ${TF_ROOT}/plan.json
312 313 314 315 316 317

apply:
  stage: deploy
  environment:
    name: production
  script:
318
    - gitlab-terraform apply
319 320 321 322 323 324
  dependencies:
    - plan
  when: manual
  only:
    - master
```
325

326
### Multiple Terraform Plan reports
327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381

Starting with 13.2, you can display mutiple reports on the Merge Request page. The reports will also display the `artifact: name:`. See example below for a suggested setup.

```yaml
image:
  name: registry.gitlab.com/gitlab-org/gitlab-build-images:terraform
  entrypoint:
    - '/usr/bin/env'
    - 'PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin'

cache:
  paths:
    - .terraform

stages:
  - build

.terraform-plan-generation:
  stage: build
  variables:
    PLAN: plan.tfplan
    JSON_PLAN_FILE: tfplan.json
  before_script:
    - cd ${TERRAFORM_DIRECTORY}
    - terraform --version
    - terraform init
    - apk --no-cache add jq
  script:
    - terraform validate
    - terraform plan -out=${PLAN}
    - terraform show --json ${PLAN} | jq -r '([.resource_changes[]?.change.actions?]|flatten)|{"create":(map(select(.=="create"))|length),"update":(map(select(.=="update"))|length),"delete":(map(select(.=="delete"))|length)}' > ${JSON_PLAN_FILE}
  artifacts:
    reports:
      terraform: ${TERRAFORM_DIRECTORY}/${JSON_PLAN_FILE}

review_plan:
  extends: .terraform-plan-generation
  variables:
    TERRAFORM_DIRECTORY: "review/"
  # Review will not include an artifact name

staging_plan:
  extends: .terraform-plan-generation
  variables:
    TERRAFORM_DIRECTORY: "staging/"
  artifacts:
    name: Staging

production_plan:
  extends: .terraform-plan-generation
  variables:
    TERRAFORM_DIRECTORY: "production/"
  artifacts:
    name: Production
```