Skip to content

Latest commit

 

History

History
163 lines (105 loc) · 7.93 KB

File metadata and controls

163 lines (105 loc) · 7.93 KB

Terraform Enterprise GCP Module

IMPORTANT: You are viewing a beta version of the official module to install Terraform Enterprise. This new version is incompatible with earlier versions, and it is not currently meant for production use. Please contact your Customer Success Manager for details before using.

This is a Terraform module for provisioning a Terraform Enterprise Cluster on GCP. Terraform Enterprise is our self-hosted distribution of Terraform Cloud. It offers enterprises a private instance of the Terraform Cloud application, with no resource limits and with additional enterprise-grade architectural features like audit logging and SAML single sign-on.

About This Module

This module will install Terraform Enterprise on GCP according to the HashiCorp Reference Architecture. This module is intended to be used by practitioners seeking a Terraform Enterprise installation which requires minimal configuration in the GCP cloud.

As the goal for this main module is to provide a drop-in solution for installing Terraform Enterprise via the Golden Path, it leverages GCP native solutions such as Cloud DNS and runs a basic Ubuntu 20.04 image on Cloud Compute Engine. We have provided guidance and limited examples for other use cases.

Pre-requisites

This module is intended to run in a GCP project with minimal preparation, however it does have the following pre-requisites:

  1. Create a Cloud DNS zone for the DNS name you wish to use.
  2. Create a managed SSL Certificate in Network Services -> Load Balancing to serve as the certificate for the FQDN.

Optionally a pre-existing service account may be specified with the existing_service_account_id variable to circumvent the need to manage IAM permissions within the module.

Provisioning the SSL certificate

The SSL certificate for the TFE load balancer is a pre-requisite for this module.

The certificate can be provisioned in GCP here either by creating a managed GCP certificate or by uploading an existing certificate.

For more information on provisioning certificates in GCP, read the documentation here.

Examples of creating a self-signed certificate for use with internal load balancers can be found within the examples.

Certificate Advice

  • If you are deploying an instance with a private load balancer, the certificate needs to be a regional certificate. If you have a working certificate, you can upload this to GCP using the gcloud CLI command using the example below.
gcloud compute ssl-certificates create my-cert --certificate=fullchain.pem --private-key=privkey.pem --region=us-central1

where fullchain.pem and privkey.pem are paths to local files containing the relevant certificate material. Specify the region where you intend to deploy Terraform Enterprise. Note that these certificates will not be listed in the GCP UI, but are visible if you run

gcloud compute ssl-certificates list
  • If you are deploying a public instance of TFE, the certificate should be a global certificate. Global certificates can be uploaded through the GCP UI (Network services > Load balancing > select advanced menu > Certificates > CREATE SSL CERTIFICATE) and will be visible both in the UI and also via the use of the above gcloud command.

Project Service APIs

The following sections list the APIs that will be enabled in general and for specific operation modes.

General

External Services Mode

Active/Active

Permissions

If you are using a service account to authenticate calls to Google Cloud APIs, the following roles are required:

How to Use This Module

  • Ensure account meets module pre-requisites from above.

  • Create a Terraform configuration that pulls in this module and specifies values of the required variables:

module "tfe_node" {
  source                = "[email protected]:hashicorp/terraform-google-terraform-enterprise.git"
  namespace             = "<Namespace to uniquely identify resources>"
  node_count            = "<Number of TFE nodes to provision>"
  tfe_license_secret_id = "<Secret Manager secret comprising license>
  fqdn                  = "<Fully qualified domain name>"
  ssl_certificate_name  = "<Name of the SSL certificate provisioned in GCP>"
  dns_zone_name         = "<Name of the DNS zone in which a record set will be created>"
}
  • Run terraform init and terraform apply

Notes:

  • The google-beta provider is required to create the subnetwork that is reserved for Internal HTTP(S) Load Balancing.
  • If you are managing DNS outside of Cloud DNS:
    • Module will output resulting load balancer IP address as lb_address
    • You must configure an external DNS record using the lb_address output

Required inputs

is_replicated_deployment - If TFE will be installed using a Replicated license and deployment method

namespace - Namespace to uniquely identify resources. Used in name prefixes

dns_zone_name - Name of the DNS zone in which a record set will be created

fqdn - Fully qualified domain name

ssl_certificate_name - Name of the SSL certificate provisioned in GCP

node_count - Number of TFE nodes to provision. A number greater than 1 will enable Active/Active

Replicated Deployment

tfe_license_secret_id - The Secret Manager secret which comprises the Base64 encoded Replicated license file. The Terraform provider calls this value the secret_id and the GCP UI calls it the name.

Flexible Deployment Options - Docker

hc_license - The raw TFE license that is validated on application startup

registry_username - The username for the docker registry from which to source the terraform_enterprise container images

registry_password - The password for the docker registry from which to source the terraform_enterprise container images

Module Manifest

This module will create all infrastructure resources required to install Terraform Enterprise in a Standalone or Active/Active configuration (depending on how many nodes you specify) on GCP in the designated region according to the Reference Architecture. The default base machine image used is Ubuntu 20.04 LTS.

The resources created are:

  • VPC with public and private subnets
  • PostgreSQL instance
  • Redis cache
  • Google Storage Bucket
  • Load Balancer
  • Service Account for fetching storage objects
  • Instances and Instance group manager

Examples

Note: If you destroy and recreate the infrastructure, you will need to update the A record in Cloud DNS with the new Load Balancer address.

License

This code is released under the Mozilla Public License 2.0. Please see LICENSE for more details.