» Terraform Enterprise Pre-Install Checklist
Before installing Terraform Enterprise, you'll need to make several key architecture decisions and prepare some infrastructure and data files. Please make careful note of these requirements, as the installation may not be successful if these requirements are not met.
Prepare all of the following before installing:
- Choose an operational mode: Decide how Terraform Enterprise should store its data. This is affected by your choice of deployment method.
- Credentials: Ensure you have a Terraform Enterprise license and a TLS certificate for Terraform Enterprise to use.
- Data storage: Depending on your operational mode, prepare data storage services or a block storage device.
- Linux instance: Prepare a running Linux instance for Terraform Enterprise. This might require additional configuration or software installation, depending on the OS and your operational requirements. Also check the Terraform Enterprise pre-install checklist for further details.
» Operational Mode Decision
Terraform Enterprise can store its state in a few different ways, and you'll need to decide which works best for your installation. Each option has a different approach to recovering from failures and should be selected based on your organization's preferences.
Important: Make this decision before you begin installation, because some modes have additional preflight requirements. The operational mode is selected at install time and cannot be changed once Terraform Enterprise is running.
External Services - This mode stores the majority of the stateful data used by the instance in an external PostgreSQL database and an external S3-compatible endpoint, GCP Cloud Storage bucket or Azure blob storage. There is still critical data stored on the instance that must be managed with snapshots. Be sure to check the PostgreSQL Requirements for information that needs to be present for Terraform Enterprise to work. This option is best for users with expertise managing PostgreSQL or users that have access to managed PostgreSQL offerings like AWS RDS.
Mounted Disk - This mode stores data in a separate directory on the host, with the intention that the directory is configured to store its data on an external disk, such as EBS, iSCSI, etc. This option is best for users with experience mounting performant block storage.
Demo - This mode stores all data on the instance. The data can be backed up with the snapshot mechanism for restore later. This option is best for initial installation and testing, and is not recommended or supported for true production use.
The decision you make will be entered during setup.
Ensure you have all of the following credentials.
» License File
To deploy Terraform Enterprise, you must obtain a license file from HashiCorp.
» TLS Certificate and Private Key
Terraform Enterprise requires a TLS certificate and private key in order to operate. This certificate must match Terraform Enterprise's hostname, either by being issued for the FQDN or being a wildcard certificate.
The certificate can be signed by a public or private CA, but it must be trusted by all of the services that Terraform Enterprise is expected to interface with; this includes your VCS provider, any CI systems or other tools that call Terraform Enterprise's API, and any services that Terraform Enterprise workspaces might send notifications to (for example: Slack). Due to these wide-ranging interactions, we recommend using a certificate signed by a public CA.
The key and X.509 certificate should both be PEM (base64) encoded, and should be provided to the installer as text.
Important: If you use a certificate issued by a private Certificate
Authority, you must provide the certificate for that CA in the
Certificate Authority (CA) Bundle section of the installation. This allows services
running within Terraform Enterprise to access each other properly.
See Installation: Trusting SSL/TLS Certificates
for more on this.
» Data Storage
Make sure your data storage services or device meet Terraform Enterprise's requirements. These requirements differ based on operational mode:
- PostgreSQL Requirements
- Any S3-compatible object storage service, GCP Cloud Storage or Azure blob storage meets Terraform Enterprise's object storage requirements. You must create a bucket for Terraform Enterprise to use, and specify that bucket during installation. Depending on your infrastructure provider, you might need to ensure the bucket is in the same region as the Terraform Enterprise instance.
- Optionally: if you already run your own Vault cluster in production, you can configure Terraform Enterprise to use that instead of running its own internal Vault instance. Before installing Terraform Enterprise, follow the instructions in Externally Managed Vault Configuration.
Note: If you are following one of the reference architectures, refer to it while preparing your data storage services.
» Linux Instance
Terraform Enterprise runs on Linux instances, and you must prepare a running Linux instance for Terraform Enterprise before running the installer. You will start and manage this instance like any other server.
» Operating System Requirements
Terraform Enterprise currently supports running under the following operating systems:
- Debian 7.7+
- Ubuntu 14.04.5 / 16.04 / 18.04
- Red Hat Enterprise Linux 7.4 - 7.8
- CentOS 6.x / 7.4 - 7.8
- Amazon Linux 2014.03 / 2014.09 / 2015.03 / 2015.09 / 2016.03 / 2016.09 / 2017.03 / 2017.09 / 2018.03 / 2.0
- Oracle Linux 7.4 - 7.8
» Hardware Requirements
These requirements provide the instance with enough resources to run the Terraform Enterprise application as well as the Terraform plans and applies.
- At least 10GB of disk space on the root volume
- At least 40GB of disk space for the Docker data directory (defaults to
- At least 8GB of system memory
- At least 2 CPU cores
» Network Requirements
Terraform Enterprise is a networked application. Its Linux instance(s) needs to allow several kinds of incoming and outgoing network traffic.
See Network Requirements for details.
» Software Requirements (Standalone Deployment)
Some operating systems have specific configuration requirements:
For other Linux distributions, check Docker compatibility:
- The instance should run a supported version of Docker engine (1.7.1 or later, minimum 17.06.2-ce, maximum 19.03.8). This also requires a 64-bit distribution with a minimum Linux Kernel version of 3.10.
- Replicated 2.32.0 and above required when running Docker 18+.
- In Online mode, the installer will install Docker automatically.
- In Airgapped mode, Docker should be installed before you begin.
- For RedHat Enterprise and Oracle Linux, you must pre-install Docker as these distributions are not officially supported by Docker Community Edition.
Important: We do not recommend running Docker under a 2.x kernel.
» AWS-Specific Configuration
Terraform Enterprise's instance profile serves as default credentials for Terraform's AWS provider. Workspaces without environment variables for credentials will attempt to use the instance profile to provision AWS resources.
The instance profile of Terraform Enterprise's instance is the operator's responsibility. If you plan to specify any non-default permissions for Terraform Enterprise's instance profile, be aware that Terraform runs might use those permissions and plan accordingly.
SELinux is supported when Terraform Enterprise runs in External Services mode and only the default SELinux policies provided by RedHat are used. Terraform Enterprise v201812-1 or later is required for this support.
SELinux is not supported when Terraform Enterprise runs in in Demo and Mounted Disk modes. When running in these modes the host running the installer must have SELinux configured in permissive mode.
To configure SELinux in permissive mode for the runtime only, run
setenforce 0 as root.
To configure SELinux in permissive mode persistently on boot, ensure the
/etc/selinux/config file contains the following content: