IMPORTANT: You are viewing a beta version of the official module to install Terraform Enterprise. This new version is incompatible with earlier versions, and it is not currently meant for production use. Please contact your Customer Success Manager for details before using.
This is a Terraform module for provisioning a Terraform Enterprise Cluster on GCP. Terraform Enterprise is our self-hosted distribution of Terraform Cloud. It offers enterprises a private instance of the Terraform Cloud application, with no resource limits and with additional enterprise-grade architectural features like audit logging and SAML single sign-on.
This module will install Terraform Enterprise on GCP according to the HashiCorp Reference Architecture. This module is intended to be used by practitioners seeking a Terraform Enterprise installation which requires minimal configuration in the GCP cloud.
As the goal for this main module is to provide a drop-in solution for installing Terraform Enterprise via the Golden Path, it leverages GCP native solutions such as Cloud DNS and runs a basic Ubuntu 20.04 image on Cloud Compute Engine. We have provided guidance and limited examples for other use cases.
This module is intended to run in a GCP project with minimal preparation, however it does have the following pre-requisites:
- Create a Cloud DNS zone for the DNS name you wish to use.
- Create a managed SSL Certificate in Network Services -> Load Balancing to serve as the certificate for the FQDN.
Optionally a pre-existing service account may be specified with the existing_service_account_id
variable to circumvent the need to manage IAM permissions within the module.
The SSL certificate for the TFE load balancer is a pre-requisite for this module.
The certificate can be provisioned in GCP here either by creating a managed GCP certificate or by uploading an existing certificate.
For more information on provisioning certificates in GCP, read the documentation here.
Examples of creating a self-signed certificate for use with internal load balancers can be found within the examples.
- If you are deploying an instance with a private load balancer, the certificate needs to be a regional certificate. If you have a working certificate, you can upload this to GCP using the gcloud CLI command using the example below.
gcloud compute ssl-certificates create my-cert --certificate=fullchain.pem --private-key=privkey.pem --region=us-central1
where fullchain.pem
and privkey.pem
are paths to local files containing the relevant certificate material. Specify the region where you intend to deploy Terraform Enterprise. Note that these certificates will not be listed in the GCP UI, but are visible if you run
gcloud compute ssl-certificates list
- If you are deploying a public instance of TFE, the certificate should be a global certificate. Global certificates can be uploaded through the GCP UI (Network services > Load balancing > select advanced menu > Certificates > CREATE SSL CERTIFICATE) and will be visible both in the UI and also via the use of the above
gcloud
command.
The following sections list the APIs that will be enabled in general and for specific operation modes.
- Cloud Logging API
- Identity and Access Management API
- Service Networking API (unless an existing network is used)
If you are using a service account to authenticate calls to Google Cloud APIs, the following roles are required:
-
Ensure account meets module pre-requisites from above.
-
Create a Terraform configuration that pulls in this module and specifies values of the required variables:
module "tfe_node" {
source = "[email protected]:hashicorp/terraform-google-terraform-enterprise.git"
namespace = "<Namespace to uniquely identify resources>"
node_count = "<Number of TFE nodes to provision>"
tfe_license_secret_id = "<Secret Manager secret comprising license>
fqdn = "<Fully qualified domain name>"
ssl_certificate_name = "<Name of the SSL certificate provisioned in GCP>"
dns_zone_name = "<Name of the DNS zone in which a record set will be created>"
}
- Run
terraform init
andterraform apply
Notes:
- The
google-beta
provider is required to create the subnetwork that is reserved for Internal HTTP(S) Load Balancing. - If you are managing DNS outside of Cloud DNS:
- Module will output resulting load balancer IP address as
lb_address
- You must configure an external DNS record using the
lb_address
output
- Module will output resulting load balancer IP address as
is_replicated_deployment
- If TFE will be installed using a Replicated license and deployment method
namespace
- Namespace to uniquely identify resources. Used in name prefixes
dns_zone_name
- Name of the DNS zone in which a record set will be created
fqdn
- Fully qualified domain name
ssl_certificate_name
- Name of the SSL certificate provisioned in GCP
node_count
- Number of TFE nodes to provision. A number greater than 1 will enable Active/Active
tfe_license_secret_id
- The Secret Manager secret which comprises the
Base64 encoded Replicated license file. The Terraform provider calls
this value the secret_id and the GCP UI calls it the name.
hc_license
- The raw TFE license that is validated on application startup
registry_username
- The username for the docker registry from which to source the terraform_enterprise container images
registry_password
- The password for the docker registry from which to source the terraform_enterprise container images
This module will create all infrastructure resources required to install Terraform Enterprise in a Standalone or Active/Active configuration (depending on how many nodes you specify) on GCP in the designated region according to the Reference Architecture. The default base machine image used is Ubuntu 20.04 LTS.
The resources created are:
- VPC with public and private subnets
- PostgreSQL instance
- Redis cache
- Google Storage Bucket
- Load Balancer
- Service Account for fetching storage objects
- Instances and Instance group manager
Note: If you destroy and recreate the infrastructure, you will need to update the A record in Cloud DNS with the new Load Balancer address.
This code is released under the Mozilla Public License 2.0. Please see LICENSE for more details.