Difference between revisions of "Terraform Cloud (TFC)"
Jump to navigation
Jump to search
↑ https://www.hashicorp.com/blog/announcing-terraform-cloud
↑ https://www.hashicorp.com/blog/announcing-controlled-remote-state-access-for-terraform-cloud-and-enterprise
(23 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
[[Terraform]] Cloud is available since September 2019<ref>https://www.hashicorp.com/blog/announcing-terraform-cloud</ref>. It is free, no credit card needed, up to 5 users. On premise option is available using [[Terraform Enterprise]] software. | [[Terraform]] Cloud is available since September 2019<ref>https://www.hashicorp.com/blog/announcing-terraform-cloud</ref>. It is free, no credit card needed, up to 5 users. On premise option is available using [[Terraform Enterprise]] software. | ||
+ | * https://app.terraform.io/ | ||
− | * [[VCS]] | + | * [[Terraform VCS connection|VCS Connection]]: [[GitHub]], [[GitLab]], [[Bitbucket]], [[Azure DevOps]] |
* [[Controlled remote state Access]] (May 2021<ref>https://www.hashicorp.com/blog/announcing-controlled-remote-state-access-for-terraform-cloud-and-enterprise</ref>) feature in [[Terraform Cloud]] and Terraform Enterprise, users now have a new way to establish granular controls for [[state ]] accessibility. | * [[Controlled remote state Access]] (May 2021<ref>https://www.hashicorp.com/blog/announcing-controlled-remote-state-access-for-terraform-cloud-and-enterprise</ref>) feature in [[Terraform Cloud]] and Terraform Enterprise, users now have a new way to establish granular controls for [[state ]] accessibility. | ||
− | * Execution modes: [[Terraform remote execution mode|Remote]] / local | + | * [[Execution modes]]: [[Terraform remote execution mode|Remote]] / local |
* Auto apply: on / off | * Auto apply: on / off | ||
* [[Secret]] storage | * [[Secret]] storage | ||
Line 9: | Line 10: | ||
* [[Cost estimation]] (Related: <code>[[aws cloudformation estimate-template-cost]]</code>) | * [[Cost estimation]] (Related: <code>[[aws cloudformation estimate-template-cost]]</code>) | ||
* Export [[audit logs]] to external systems via an [[API]], or export their outputs into [[Splunk]] | * Export [[audit logs]] to external systems via an [[API]], or export their outputs into [[Splunk]] | ||
+ | * [[Single sign-on (SSO)]] | ||
+ | * [[Self hosted agents]] | ||
== Pricing == | == Pricing == | ||
Line 14: | Line 17: | ||
* Free: Private module [[Terraform registry|registry]] | * Free: Private module [[Terraform registry|registry]] | ||
* Team & Governance: [[Team management]], [[Sentinel]] | * Team & Governance: [[Team management]], [[Sentinel]] | ||
− | * Business | + | * Business: [[Terraform Cloud Agents]] |
+ | |||
+ | [[Sign up]]: [[HCP]] acccount or email | ||
== Terraform Cloud getting started == | == Terraform Cloud getting started == | ||
Line 20: | Line 25: | ||
[[git clone]] https://github.com/hashicorp/tfc-getting-started.git | [[git clone]] https://github.com/hashicorp/tfc-getting-started.git | ||
cd tfc-getting-started && ./[[scripts/setup.sh]] | cd tfc-getting-started && ./[[scripts/setup.sh]] | ||
+ | |||
+ | == Errors == | ||
+ | * <code>[[Error: configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.]]</code> | ||
+ | * <code>[[Error: configuring Terraform AWS Provider: failed to get shared config profile]]</code> | ||
== Related terms == | == Related terms == | ||
− | |||
* [[Sentinel]] | * [[Sentinel]] | ||
* Terraform Cloud Business tier integrates with [[Okta]], [[AzureAD]], or any other [[SAML 2.0]] compliant Identity | * Terraform Cloud Business tier integrates with [[Okta]], [[AzureAD]], or any other [[SAML 2.0]] compliant Identity | ||
Line 28: | Line 36: | ||
* [[Organization]] | * [[Organization]] | ||
* [[Terraform registry]]: private | * [[Terraform registry]]: private | ||
+ | * <code>[[.github/workflows/terraform.yml]]</code> | ||
+ | * [[TF_CLOUD_ORGANIZATION]] | ||
+ | * [[AWS Control Tower Account Factory for Terraform (AFT)]] | ||
+ | * [[Terraform provider: tfe]] | ||
== Activities == | == Activities == | ||
* Read about Terraform Cloud Run [[Triggers]] (Feb 2020) https://www.hashicorp.com/blog/creating-infrastructure-pipelines-with-terraform-cloud-run-triggers/ | * Read about Terraform Cloud Run [[Triggers]] (Feb 2020) https://www.hashicorp.com/blog/creating-infrastructure-pipelines-with-terraform-cloud-run-triggers/ | ||
+ | * [[After many years of using Terraform Open Source (OSS), you decide to migrate to Terraform Cloud. After the initial configuration, you create a workspace and migrate your existing state and configuration. What Terraform version would the new workspace be configured to use after the migration?]] | ||
+ | * [[Dynamic Credentials with the AWS Provider]] | ||
+ | * [[Bootstrapping trust between a TFC workspace and AWS]] | ||
== See also == | == See also == | ||
* {{Terraform Cloud}} | * {{Terraform Cloud}} | ||
− | |||
− | |||
[[Category:Terraform]] | [[Category:Terraform]] | ||
+ | [[Category:TFC]] |
Latest revision as of 13:22, 26 August 2024
Terraform Cloud is available since September 2019[1]. It is free, no credit card needed, up to 5 users. On premise option is available using Terraform Enterprise software.
- VCS Connection: GitHub, GitLab, Bitbucket, Azure DevOps
- Controlled remote state Access (May 2021[2]) feature in Terraform Cloud and Terraform Enterprise, users now have a new way to establish granular controls for state accessibility.
- Execution modes: Remote / local
- Auto apply: on / off
- Secret storage
- RBAC (Role Based Access Control) (Paid feature)
- Cost estimation (Related:
aws cloudformation estimate-template-cost
) - Export audit logs to external systems via an API, or export their outputs into Splunk
- Single sign-on (SSO)
- Self hosted agents
Contents
Pricing[edit]
https://www.hashicorp.com/products/terraform/pricing
- Free: Private module registry
- Team & Governance: Team management, Sentinel
- Business: Terraform Cloud Agents
Sign up: HCP acccount or email
Terraform Cloud getting started[edit]
terraform login git clone https://github.com/hashicorp/tfc-getting-started.git cd tfc-getting-started && ./scripts/setup.sh
Errors[edit]
Error: configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.
Error: configuring Terraform AWS Provider: failed to get shared config profile
Related terms[edit]
- Sentinel
- Terraform Cloud Business tier integrates with Okta, AzureAD, or any other SAML 2.0 compliant Identity
- Terraform variables: https://www.terraform.io/cloud-docs/workspaces/variables
- Organization
- Terraform registry: private
.github/workflows/terraform.yml
- TF_CLOUD_ORGANIZATION
- AWS Control Tower Account Factory for Terraform (AFT)
- Terraform provider: tfe
Activities[edit]
- Read about Terraform Cloud Run Triggers (Feb 2020) https://www.hashicorp.com/blog/creating-infrastructure-pipelines-with-terraform-cloud-run-triggers/
- [[After many years of using Terraform Open Source (OSS), you decide to migrate to Terraform Cloud. After the initial configuration, you create a workspace and migrate your existing state and configuration. What Terraform version would the new workspace be configured to use after the migration?]]
- Dynamic Credentials with the AWS Provider
- Bootstrapping trust between a TFC workspace and AWS
See also[edit]
- Terraform Cloud (TFC), Terraform Cloud Agents (Business version),
terraform login
,execution modes
,terraform_remote_state
, Terraform cloud block, Terraform Cloud Workflows, Terraform organization,TF_CLOUD_ORGANIZATION
, Dynamic Provider Credentials, Bootstrapping trust between a TFC workspace and AWS
Advertising: