github.com/wikibal01/hashicorp-terraform@v0.11.12-beta1/website/guides/core-workflow.html.md (about)

     1  ---
     2  layout: "guides"
     3  page_title: "The Core Terraform Workflow - Guides"
     4  sidebar_current: "guides-core-workflow"
     5  description: |-
     6    This guide provides an overview of the core Terraform workflow and how it
     7    applies in individual, team, and organization contexts across Terraform open
     8    source and Terraform Enterprise.
     9  ---
    10  
    11  # The Core Terraform Workflow
    12  
    13  The core Terraform workflow has three steps:
    14  
    15  1. **Write** - Author infrastructure as code.
    16  2. **Plan** - Preview changes before applying.
    17  3. **Apply** - Provision reproducible infrastructure.
    18  
    19  This guide walks through how each of these three steps plays out in the context
    20  of working as an individual practitioner, how they evolve when a team is
    21  collaborating on infrastructure, and how Terraform Enterprise enables this
    22  workflow to run smoothly for entire organizations.
    23  
    24  ## Working as an Individual Practitioner
    25   
    26  Let's first walk through how these parts fit together as an individual working
    27  on infrastructure as code.
    28  
    29  ### Write
    30  
    31  You write Terraform configuration just like you write code: in your editor of
    32  choice. It's common practice to store your work in a version controlled
    33  repository even when you're just operating as an individual.
    34  
    35  ```sh
    36  # Create repository
    37  $ git init my-infra && cd my-infra
    38  
    39  Initialized empty Git repository in /.../my-infra/.git/
    40  
    41  # Write initial config
    42  $ vim main.tf
    43  
    44  # Initialize Terraform
    45  $ terraform init
    46  
    47  Initializing provider plugins...
    48  # ...
    49  Terraform has been successfully initialized!
    50  ```
    51  
    52  As you make progress on authoring your config, repeatedly running plans can help
    53  flush out syntax errors and ensure that your config is coming together as you
    54  expect.
    55  
    56  ```sh
    57  # Make edits to config
    58  $ vim main.tf
    59  
    60  # Review plan
    61  $ terraform plan
    62  
    63  # Make additional edits, and repeat
    64  $ vim main.tf
    65  ```
    66  
    67  This parallels working on application code as an individual, where a tight
    68  feedback loop between editing code and running test commands is useful.
    69  
    70  ### Plan
    71  
    72  When the feedback loop of the Write step has yielded a change that looks good,
    73  it's time to commit your work and review the final plan.
    74  
    75  ```sh
    76  $ git add main.tf
    77  $ git commit -m 'Managing infrastructure as code!'
    78  
    79  [master (root-commit) f735520] Managing infrastructure as code!
    80   1 file changed, 1 insertion(+)
    81  ```
    82  
    83  Because `terraform apply` will display a plan for confirmation before
    84  proceeding to change any infrastructure, that's the command you run for final
    85  review.
    86  
    87  ```sh
    88  $ terraform apply
    89  
    90  An execution plan has been generated and is shown below.
    91  # ...
    92  ```
    93  
    94  ### Apply
    95  
    96  After one last check, you are ready to tell Terraform to provision real
    97  infrastructure.
    98  
    99  ```sh
   100  Do you want to perform these actions?
   101  
   102    Terraform will perform the actions described above.
   103    Only 'yes' will be accepted to approve.
   104    Enter a value: yes
   105  
   106  # ...
   107  
   108  Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
   109  ```
   110  
   111  At this point, it's common to push your version control repository to a remote
   112  location for safekeeping.
   113  
   114  ```sh
   115  $ git remote add origin https://github.com/*user*/*repo*.git
   116  $ git push origin master
   117  ```
   118  
   119  This core workflow is a loop; the next time you want to make changes, you start
   120  the process over from the beginning.
   121  
   122  Notice how closely this workflow parallels the process of writing application
   123  code or scripts as an individual? This is what we mean when we talk about
   124  Terraform enabling infrastructure as code.
   125  
   126  ## Working as a Team
   127  
   128  Once multiple people are collaborating on Terraform configuration, new steps
   129  must be added to each part of the core workflow to ensure everyone is working
   130  together smoothly. You'll see that many of these steps parallel the workflow
   131  changes we make when we work on application code as teams rather than as
   132  individuals.
   133  
   134  ### Write
   135  
   136  While each individual on a team still makes changes to Terraform configuration
   137  in their editor of choice, they save their changes to version control _branches_
   138  to avoid colliding with each other's work. Working in branches enables team
   139  members to resolve mutually incompatible infrastructure changes using their
   140  normal merge conflict workflow.
   141  
   142  ```sh
   143  $ git checkout -b add-load-balancer
   144  
   145  Switched to a new branch 'add-load-balancer'
   146  ```
   147  
   148  Running iterative plans is still useful as a feedback loop while authoring
   149  configuration, though having each team member's computer able to run them
   150  becomes more difficult with time. As the team and the infrastructure grows, so
   151  does the number of sensitive input variables (e.g. API Keys, SSL Cert Pairs)
   152  required to run a plan.
   153  
   154  To avoid the burden and the security risk of each team member arranging all
   155  sensitive inputs locally, it's common for teams to migrate to a model in which
   156  Terraform operations are executed in a shared Continuous Integration (CI)
   157  environment. The work needed to create such a CI environment is nontrivial, and
   158  is outside the scope of this core workflow overview, but a full deep dive on
   159  this topic can be found in our
   160  [Running Terraform in Automation](https://www.terraform.io/guides/running-terraform-in-automation.html)
   161  guide.
   162  
   163  This longer iteration cycle of committing changes to version control and then
   164  waiting for the CI pipeline to execute is often lengthy enough to prohibit using
   165  speculative plans as a feedback loop while authoring individual Terraform
   166  configuration changes. Speculative plans are still useful before new Terraform
   167  changes are applied or even merged to the main development branch, however, as
   168  we'll see in a minute.
   169  
   170  ### Plan
   171  
   172  For teams collaborating on infrastructure, Terraform's plan output creates an
   173  opportunity for team members to review each other's work. This allows the team
   174  to ask questions, evaluate risks, and catch mistakes before any potentially
   175  harmful changes are made.
   176  
   177  The natural place for these reviews to occur is alongside pull requests within
   178  version control--the point at which an individual proposes a merge from their
   179  working branch to the shared team branch. If team members review proposed
   180  config changes alongside speculative plan output, they can evaluate whether the
   181  intent of the change is being achieved by the plan.
   182  
   183  The problem becomes producing that speculative plan output for the team to
   184  review. Some teams that still run Terraform locally make a practice that pull
   185  requests should include an attached copy of speculative plan output generated
   186  by the change author. Others arrange for their CI system to post speculative
   187  plan output to pull requests automatically.
   188  
   189  ![Screenshot of Pull Request with manually posted Terraform plan output](guides/core-workflow/manually-pasted-plan-output.png)
   190  
   191  In addition to reviewing the plan for the proper expression of its author's
   192  intent, the team can also make an evaluation whether they want this change to
   193  happen now. For example, if a team notices that a certain change could result
   194  in service disruption, they may decide to delay merging its pull request until
   195  they can schedule a maintenance window.
   196  
   197  ### Apply
   198  
   199  Once a pull request has been approved and merged, it's important for the team
   200  to review the final concrete plan that's run against the shared team branch and
   201  the latest version of the state file.
   202  
   203  This plan has the potential to be different than the one reviewed on the pull
   204  request due to issues like merge order or recent infrastructural changes. For
   205  example, if a manual change was made to your infrastructure since the plan was
   206  reviewed, the plan might be different when you merge.
   207  
   208  It is at this point that the team asks questions about the potential
   209  implications of applying the change. Do we expect any service disruption from
   210  this change? Is there any part of this change that is high risk? Is there
   211  anything in our system that we should be watching as we apply this? Is there
   212  anyone we need to notify that this change is happening?
   213  
   214  Depending on the change, sometimes team members will want to watch the apply
   215  output as it is happening. For teams that are running Terraform locally, this
   216  may involve a screen share with the team. For teams running Terraform in CI,
   217  this may involve gathering around the build log.
   218  
   219  Just like the workflow for individuals, the core workflow for teams is a loop
   220  that plays out for each change. For some teams this loop happens a few times a
   221  week, for others, many times a day.
   222  
   223  ## The Core Workflow Enhanced by Terraform Enterprise
   224  
   225  While the above described workflows enable the safe, predictable, and
   226  reproducible creating or changing of infrastructure, there are multiple
   227  collaboration points that can be streamlined, especially as teams and
   228  organizations scale.  We designed Terraform Enterprise to support and enhance
   229  the core Terraform workflow for anyone collaborating on infrastructure, from
   230  small teams to large organizations. Let's look at how Terraform Enterprise makes
   231  for a better experience at each step.
   232  
   233  ### Write
   234  
   235  Terraform Enterprise provides a centralized and secure location for storing
   236  input variables and state while also bringing back a tight feedback loop for
   237  speculative plans for config authors. Terraform configuration interacts with
   238  Terraform Enterprise via the ["remote" backend](/docs/backends/types/remote.html).
   239  
   240  ```
   241  terraform {
   242    backend "remote" {
   243      organization = "my-org"
   244      workspaces {
   245        prefix = "my-app-"
   246      }
   247    }
   248  }
   249  ```
   250  
   251  Once the backend is wired up, a Terraform Enterprise API key is all that's
   252  needed by team members to be able to edit config and run speculative plans
   253  against the latest version of the state file using all the remotely stored
   254  input variables.
   255  
   256  ```sh
   257  $ terraform workspace select my-app-dev
   258  Switched to workspace "my-app-dev".
   259  
   260  $ terraform plan
   261  
   262  Running plan remotely in Terraform Enterprise.
   263  
   264  Output will stream here. To view this plan in a browser, visit:
   265  
   266  https://app.terraform.io/my-org/my-app-dev/.../
   267  
   268  Refreshing Terraform state in-memory prior to plan...
   269  
   270  # ...
   271  
   272  Plan: 1 to add, 0 to change, 0 to destroy.
   273  ```
   274  
   275  With the assistance of this plan output, team members can each work on
   276  authoring config until it is ready to propose as a change via a pull request.
   277  
   278  ### Plan
   279  
   280  Once a pull request is ready for review, Terraform Enterprise makes the process
   281  of reviewing a speculative plan easier for team members. First, the plan is
   282  automatically run when the pull request is created. Status updates to the pull
   283  request indicate while the plan is in progress.
   284  
   285  Once the plan is complete, the status update indicates whether there were any
   286  changes in the speculative plan, right from the pull request view.
   287  
   288  <!-- TODO: [ Screenshot of PR with preview details ] -->
   289  
   290  For certain types of changes, this information is all that's needed for a team
   291  member to be able to approve the pull request. When a teammate needs to do a
   292  full review of the plan, clicking the link to Terraform Enterprise brings up a
   293  view that allows them to quickly analyze the full plan details.
   294  
   295  <!-- TODO: [ Screenshot of speculative plan details page ] -->
   296  
   297  This page allows the reviewer to quickly determine if the plan is matching the
   298  config author's intent and evaluate the risk of the change.
   299  
   300  ### Apply
   301  
   302  After merge, Terraform Enterprise presents the concrete plan to the team for
   303  review and approval.
   304  
   305  ![Screenshot of concrete plan](guides/core-workflow/concrete-plan.png)
   306  
   307  The team can discuss any outstanding questions about the plan before the change
   308  is made.
   309  
   310  ![Screenshot of back-and-forth in TFE comments](guides/core-workflow/plan-comments.png)
   311  
   312  Once the Apply is confirmed, Terraform Enterprise displays the progress live
   313  to anyone who'd like to watch.
   314  
   315  ![Screenshot of in-progress Apply](guides/core-workflow/in-progress-apply.png)
   316  
   317  <!--
   318  
   319  TODO: Add this back in w/ screenshot of notification
   320  
   321  And after the change completes, the team can be notified of its outcome.
   322  
   323      [ Multi-screenshot of Slack alert indicating Apply completed successfully and
   324      with error; except it's not gonna be Slack anymore? ]
   325  
   326  -->
   327  
   328  ## Conclusion
   329  
   330  There are many different ways to use Terraform: as an individual user, a single
   331  team, or an entire organization at scale. Choosing the best approach for the
   332  density of collaboration needed will provide the most return on your investment
   333  in the core Terraform workflow. For organizations using Terraform at scale,
   334  Terraform Enterprise introduces new layers that build on this core workflow to
   335  solve problems unique to teams and organizations.