Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/avinor/terraform-azurerm-remote-backend
Terraform module to deploy a remote backend storage for Azure
https://github.com/avinor/terraform-azurerm-remote-backend
azure terraform terraform-module
Last synced: 3 months ago
JSON representation
Terraform module to deploy a remote backend storage for Azure
- Host: GitHub
- URL: https://github.com/avinor/terraform-azurerm-remote-backend
- Owner: avinor
- License: apache-2.0
- Created: 2019-05-08T05:58:50.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2024-03-13T22:45:27.000Z (8 months ago)
- Last Synced: 2024-06-22T22:04:11.231Z (5 months ago)
- Topics: azure, terraform, terraform-module
- Language: HCL
- Size: 354 KB
- Stars: 5
- Watchers: 3
- Forks: 15
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- jimsghstars - avinor/terraform-azurerm-remote-backend - Terraform module to deploy a remote backend storage for Azure (HCL)
README
# Remote backend
Terraform module to deploy a remote backend storage with Key Vault to manage SAS Token and key rotation. To access the remote state retrieve the SAS Token from Key Vault, do not use the access keys on storage account. SAS Token retrieved from Key Vault grants 1 day access, after that it will have to be refreshed. The access keys on storage account will automatically rotate on a 30 day schedule, this can be adjusted with the input variable `key_rotation_days`.
Each backend creates a new storage account and Key Vault. The Key Vault can also be used for storing other secrets related to terraform. Use the `access_policies` variable to define users that should have access. It is recommended to read [Secure access to a key vault](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-secure-your-key-vault) documentation for which policies to apply.
**Terraform has to run with Owner priviledge in Azure.**
## Usage
Since this will create the remote backend where state should be stored it requires special setup. These examples are based on [tau](https://github.com/avinor/tau).
1. Define tau deployment with backend and all inputs:
```terraform
backend "azurerm" {
storage_account_name = "tfstatedevsa"
container_name = "state"
key = "backend/remotestate.tfstate"
}environment_variables {
ARM_SUBSCRIPTION_ID = "******"
}module {
source = "avinor/remote-backend/azurerm"
version = "1.0.3"
}inputs {
name = "tfstatedev"
resource_group_name = "terraform-rg"
location = "westeurope"
}
```2. Run tau init, plan and apply, but do not create any overrides (skips backend configuration)
```bash
tau init --no-overrides
tau plan
tau apply
```3. State should now be stored locally. Reconfigure to move to defined backend
```bash
tau init --reconfigure
```State should now be stored remotely. Any changes after this will use the remote state that have been created with same template. Should now run `tau init` without any extra arguments.
## Resource names
Both storage account and Key Vault follow same naming convention. It formats the input name to remove all whitespace, dash etc since storage account name can only have alphanumerical characters. Name of resources use formatted name + backend name + suffix.
**Storage account:** {formatted name}{backend name}sa
**Key Vault:** {formatted name}{backend name}kv
## Access policies
Access policies for the Key Vault can be controlled by the `access_policies` variable. Each entry in list is access policy for an object_id (user, service principal or security group), which backends it should have access to and what policies. It does not allow to assign access to storage as that should not be done by any users.
It is recommended to use these access policies to controll all access to Key Vault or it can remove accesses if they are manually added and backend rerun.
```terraform
access_policies = [
{
object_id = "a08fb42d-e046-4100-8fdc-960334618440",
certificate_permissions = [],
key_permissions = [],
secret_permissions = ["Get"],
}
]
```## SAS Token
The SAS Token is stored in Key Vault as a secret with name `{storageaccount_name}-terraformsastoken`. So to access for example above run following command to get in clear text:
```bash
az keyvault secret show --vault-name tfstatedevkv --name tfstatedevsa-terraformsastoken --query value -o tsv
```If using [tau](https://github.com/avinor/tau) to run terraform executions this can be run as a prepare hook.
```terraform
hook "set_access_key" {
trigger_on = "prepare"
script = "https://raw.githubusercontent.com/avinor/terraform-azurerm-remote-backend/master/set-access-keys.sh"
args = ["tfstatedev"]
set_env = true
}
```Arguments should be the name used when creating backend. This command will return a single line with `ARM_SAS_TOKEN=****`.
## CI/CD
To use the remote state in a CI/CD process (for instance Azure DevOps Pipelines) it is recommended to create a service principal that is granted access to the Key Vault only. It can then read the SAS Token from Key Vault to access the storage account. CI/CD process should not have access to storage account directly, or use the root access key.
## Notes
### SAS Tokens in Key Vault
SAS Tokens are stored in key-vault to have better control who can access them. Users do not need access to the subscription where storage account is, just the SAS Token to access storage account. SAS Token also allows more granular access control, instead of using root access key to account.