Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/jbangurajr/diamond-dogs

Diamond Dogs application. https://app.pluralsight.com/library/courses/terraform-cloud-getting-started/creating-a-vcs-repository
https://github.com/jbangurajr/diamond-dogs

Last synced: about 2 months ago
JSON representation

Diamond Dogs application. https://app.pluralsight.com/library/courses/terraform-cloud-getting-started/creating-a-vcs-repository

Awesome Lists containing this project

README

        

# Deploying with the CLI and Terraform Cloud

Let's talk about the various options for deployment with Terraform Cloud. The new application you're using is not in source control at the moment, so we are going to deploy it using the CLI. We'll change that momentarily.

## Demos

- Creating a workspace on TFC with the CLI workflow
- Configuring variable values and environment variables
- Updating the Terraform configuration
- Deploying the configuration with the CLI

### Creating a workspace on TFC with the CLI workflow

Workspaces can be created using the UI, CLI, or API. To create a new workspace for the configuration, simply update the `cloud` block in the `backend.tf` file with your organization name. Save the file and run `terraform init`.

`backend.tf`

```hcl
terraform {
cloud {
organization =

workspaces {
name = "diamond_dogs_dev"
}
}
}
```

While this will create your workspace, it **will not** configure any variables or environment variables. We can do that next.

### Configuring variable values and environment variables

Terraform uses all Terraform and Environment variables for all plans and applies in this workspace. Workspaces using Terraform 0.10.0 or later can also load default values from any \*.auto.tfvars files in the configuration. You may want to use the Terraform Cloud Provider or the variables API to add multiple variables at once.

Rename `terraform.tfvars` to `terraform.auto.tfvars`

Terraform requires credentials in order to communicate with your cloud provider's API. These API keys should never be stored directly in your terraform code. We will use Terraform Cloud environment variables to store our sensitive cloud credentials for AWS.

- In the `Variables` tab of your workspace you can add environment variables for the AWS Credentials
- Add a Environment variable named `AWS_ACCESS_KEY_ID` with your AWS Access Key
- Add a second Environment variable named `AWS_SECRET_ACCESS_KEY` with your AWS Secret Key. Be sure to mark this variable as sensitive. Sensitive variables will not be displayed within the environment, and can only be overwritten - not read.

### Deploying the configuration with the CLI

We can first run a `terraform plan` and then a `terraform apply` to generate our infrastructure. The output of the remote operations will be streamed to our local console.

```bash
terraform plan
```

```bash
terraform apply
```