Akuda solutions come packaged as production-ready Terraform Modules. This documentation will guide you through the prerequisites, setting up repositories, deploying infrastructure, and link you to useful resources along the way.
You’ll be in control of the Terraform infrastructure code and empowered to make customizations and optimizations to meet your specific business needs.
To use the infrastructure code successfully, you’ll need working knowledge of Terraform, Git Source Control, and your Cloud providers technologies.
main.tf files, update all module sources to use your repositories Git URL instead of the local path. Helpful information on module sources can be found here.v0.1.0-alpha.For this guide, we will focus on deploying infrastructure locally via the Terraform CLI.
terraform init
yes to authorize and start the deployment.terraform apply
Note: You can make changes to your Terraform configuration and rerun terraform apply command. Terraform will perform the minimum amount of changes required to bring the real-world infrastructure in line with your infrastructure configuration defined in code.
Excellent, you can now provision and manage infrastructure with ease. If only you had a reliable way to destroy it, especially your development and testing environments. You don’t want to be responsible for bill shock.
yes to authorize the destroy.terraform destroy
When running Terraform locally, we recomend installing the AWS CLI which can be used to handle authentication. Note that this is not required when running Terraform non-interactively in a CI/CD pipeline.
When running Terraform locally, we recommend authenticating with the AWS CLI by following this simple two step process.
aws configure
When running Terraform non-interactively in a CI/CD pipeline, we recommend providing your credentials via the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY, environment variables, representing your AWS Access Key and AWS Secret Key, respectively.
When running Terraform locally, we recomend installing the Azure CLI which can be used to handle authentication. Note that this is not required when running Terraform non-interactively in a CI/CD pipeline.
When running Terraform locally, we recommend authenticating with the Azure CLI. When running Terraform non-interactively in a CI/CD pipeline, we recommend using a Managed Service Identity or Service Principal.
When running Terraform locally, we recomend installing the Google Cloud SDK which can be used to handle authentication. Note that this is not required when running Terraform non-interactively in a CI/CD pipeline.
When running Terraform locally, we recommend authenticating with the gcloud CLI by running the command in your terminal and following the prompts.
gcloud auth application-default login
When running Terraform non-interactively on Google Cloud, we recommend using a Google Service Account. This will allow Terraform to authenticate to Google Cloud without having to bake in a separate credential/authentication file. Ensure that the scope of the VM/Cluster is set to or includes https://www.googleapis.com/auth/cloud-platform.
When running Terraform non-interactively in a CI/CD pipeline outside of Google Cloud, we recomend you create a service account, ensure the key is placed onto the file system where Terraform resides, and set the GOOGLE_APPLICATION_CREDENTIALS environment variable to the path of the service account key.
All of the code we create is written in Terraform Configuration Language. We consider it to be the primary user interface. It’s a language that’s easy to read, easy to write, and the defacto standard in Infrastructure as Code. Developing an intermediate understanding of the language will increase your confidence in our solutions and empower you to make customizations to suite your specific needs.
The code we create is intended to be driven by the Terraform CLI. Wether you intend to use your own machine or execute Terraform via CI/CD pipelines, it’s important to develop working knowledge of the Terraform CLI.
By default, the Terraform CLI uses local state storage to keep track off and manage infrastructure provisioned by Terraform. While this may work fine for a solo engineer without intentions to use CI/CD pipelines, it will not work in a team setting. This link provides information for configuring a Terraform Backend.
The solutions we sell are packaged as Terraform Modules and intended to be stored in your organizations private source control (GitHub, GitLab, Azure DevOps, Bitbucket, etc). This link will help you develop an understanding of the standard module structure, usage, and best practices which all Akuda solutions employ.
Achieving state-of-the-art provisioning practices is a journey with several steps along the way. Akuda accelerates this journey by getting you started with production-ready Terraform Infrastructure Code, but their are still practices you’ll need to adopt to advance your maturity. This guide for Terraform Recommended Practices will walk you through them.
Having Infrastructure Code that follows all the best practices is great but it’s only half of the equation. You still need to ensure the make up of your cloud infrastructure is secure, high-performing, resilient, and efficient. This is where Cloud Architecture Frameworks come in. They provide this guidance which we employ, and their is one for every major cloud provider.
Akuda solutions come packaged as production-ready Terraform Modules. This documentation will guide you through the prerequisites, setting up repositories, deploying infrastructure, and link you to useful resources along the way.
You’ll be in control of the Terraform infrastructure code and empowered to make customizations and optimizations to meet your specific business needs.
To use the infrastructure code successfully, you’ll need working knowledge of Terraform, Git Source Control, and your Cloud providers technologies.
main.tf files, update all module sources to use your repositories Git URL instead of the local path. Helpful information on module sources can be found here.v0.1.0-alpha.For this guide, we will focus on deploying infrastructure locally via the Terraform CLI.
terraform init
yes to authorize and start the deployment.terraform apply
Note: You can make changes to your Terraform configuration and rerun terraform apply command. Terraform will perform the minimum amount of changes required to bring the real-world infrastructure in line with your infrastructure configuration defined in code.
Excellent, you can now provision and manage infrastructure with ease. If only you had a reliable way to destroy it, especially your development and testing environments. You don’t want to be responsible for bill shock.
yes to authorize the destroy.terraform destroy
When running Terraform locally, we recomend installing the AWS CLI which can be used to handle authentication. Note that this is not required when running Terraform non-interactively in a CI/CD pipeline.
When running Terraform locally, we recommend authenticating with the AWS CLI by following this simple two step process.
aws configure
When running Terraform non-interactively in a CI/CD pipeline, we recommend providing your credentials via the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY, environment variables, representing your AWS Access Key and AWS Secret Key, respectively.
When running Terraform locally, we recomend installing the Azure CLI which can be used to handle authentication. Note that this is not required when running Terraform non-interactively in a CI/CD pipeline.
When running Terraform locally, we recommend authenticating with the Azure CLI. When running Terraform non-interactively in a CI/CD pipeline, we recommend using a Managed Service Identity or Service Principal.
When running Terraform locally, we recomend installing the Google Cloud SDK which can be used to handle authentication. Note that this is not required when running Terraform non-interactively in a CI/CD pipeline.
When running Terraform locally, we recommend authenticating with the gcloud CLI by running the command in your terminal and following the prompts.
gcloud auth application-default login
When running Terraform non-interactively on Google Cloud, we recommend using a Google Service Account. This will allow Terraform to authenticate to Google Cloud without having to bake in a separate credential/authentication file. Ensure that the scope of the VM/Cluster is set to or includes https://www.googleapis.com/auth/cloud-platform.
When running Terraform non-interactively in a CI/CD pipeline outside of Google Cloud, we recomend you create a service account, ensure the key is placed onto the file system where Terraform resides, and set the GOOGLE_APPLICATION_CREDENTIALS environment variable to the path of the service account key.
All of the code we create is written in Terraform Configuration Language. We consider it to be the primary user interface. It’s a language that’s easy to read, easy to write, and the defacto standard in Infrastructure as Code. Developing an intermediate understanding of the language will increase your confidence in our solutions and empower you to make customizations to suite your specific needs.
The code we create is intended to be driven by the Terraform CLI. Wether you intend to use your own machine or execute Terraform via CI/CD pipelines, it’s important to develop working knowledge of the Terraform CLI.
By default, the Terraform CLI uses local state storage to keep track off and manage infrastructure provisioned by Terraform. While this may work fine for a solo engineer without intentions to use CI/CD pipelines, it will not work in a team setting. This link provides information for configuring a Terraform Backend.
The solutions we sell are packaged as Terraform Modules and intended to be stored in your organizations private source control (GitHub, GitLab, Azure DevOps, Bitbucket, etc). This link will help you develop an understanding of the standard module structure, usage, and best practices which all Akuda solutions employ.
Achieving state-of-the-art provisioning practices is a journey with several steps along the way. Akuda accelerates this journey by getting you started with production-ready Terraform Infrastructure Code, but their are still practices you’ll need to adopt to advance your maturity. This guide for Terraform Recommended Practices will walk you through them.
Having Infrastructure Code that follows all the best practices is great but it’s only half of the equation. You still need to ensure the make up of your cloud infrastructure is secure, high-performing, resilient, and efficient. This is where Cloud Architecture Frameworks come in. They provide this guidance which we employ, and their is one for every major cloud provider.