mirror of https://github.com/hashicorp/consul
385 lines
23 KiB
Markdown
385 lines
23 KiB
Markdown
---
|
||
layout: docs
|
||
page_title: Compatible Terraform Modules for NIA
|
||
description: >-
|
||
Consul-Terraform-Sync automates execution Terraform modules for network infrastructure automation.
|
||
---
|
||
|
||
# Compatible Terraform Modules for Network Infrastructure Automation
|
||
|
||
Consul-Terraform-Sync (CTS) automates execution of Terraform modules through tasks. A task is a construct in CTS that defines the automation of Terraform and the module.
|
||
|
||
## Module Specifications
|
||
|
||
Compatible modules for CTS follow the [standard module](https://www.terraform.io/docs/modules/index.html#standard-module-structure) structure. Modules can use syntax supported by Terraform version 0.13 and newer.
|
||
|
||
### Compatibility Requirements
|
||
|
||
Below are the two required elements for module compatibility with CTS
|
||
|
||
1. **Root module** - Terraform has one requirement for files in the root directory of the repository to function as the primary entrypoint for the module. It should encapsulate the core logic to be used by CTS for task automation. `main.tf` is the recommended filename for the main file where resources are created.
|
||
2. [**`services` input variable**](#services-variable) - CTS requires all modules to have the following input variable declared within the root module. The declaration of the `services` variable can be included at the top of the suggested `variables.tf` file where other input variables are commonly declared. This variable functions as the response object from the Consul catalog API and surfaces network information to be consumed by the module. It is structured as a map of objects.
|
||
|
||
### Optional Input Variables
|
||
|
||
In addition to the required `services` input variable, CTS provides additional, optional input variables to be used within your module. Support for an optional input variable requires two changes:
|
||
|
||
1. Updating the Terraform Module to declare the input variable in the suggested `variables.tf`
|
||
1. Adding configuration to the CTS task block to define the module input values that should be provided to the input variables
|
||
|
||
See below sections for more information on [defining module input](#module-input) and [declaring optional input variables](#how-to-create-a-compatible-terraform-module) in your Terraform module.
|
||
|
||
### Module Input ((#source-input))
|
||
|
||
A task monitors [Consul objects](/docs/nia#consul-objects) that are defined by the task's configuration. The Consul objects can be used for the module input that satisfies the requirements defined by the task's Terraform module's [input variables](https://www.terraform.io/docs/language/values/variables.html).
|
||
|
||
A task's module input is slightly different from the task's condition, even though both monitor defined objects. The task's condition monitors defined objects with a configured criteria. When this criteria is satisfied, the task will trigger.
|
||
|
||
The module input, however, monitors defined objects with the intent of providing values or metadata about these objects to the Terraform module. The monitored module input and condition objects can be the same object, such as a task configured with a `condition "services"` block and `use_as_module_input` set to `true`. The module input and condition can also be different objects and configured separately, such as a task configured with a `condition "catalog-services` and `module_input "consul-kv"` block. As a result, the monitored module input is decoupled from the provided condition in order to satisfy the Terraform module.
|
||
|
||
Each type of object that CTS monitors can only be defined through one configuration within a task definition. For example, if a task monitors services, the task cannot have both `condition "services"` and `module_input "services"` configured. See [Task Module Input configuration](/docs/nia/configuration#task-module-input) for more details.
|
||
|
||
There are a few ways that a module input can be defined:
|
||
|
||
- [**`services` list**](/docs/nia/configuration#services) (deprecated) - The list of services to use as module input.
|
||
- **`condition` block's `use_as_module_input` field** - When set to true, the condition's objects are used as module input.
|
||
- Field was previously named `source_includes_var` (deprecated)
|
||
- [**`module_input` blocks**](/docs/nia/configuration#module-input) - This block can be configured multiple times to define objects to use as module input.
|
||
- Block was previously named `source_input` (deprecated)
|
||
|
||
Multiple ways of defining a module input adds configuration flexibility, and allows for optional additional input variables to be supported by CTS alongside the `services` input variable.
|
||
|
||
Additional optional input variable types:
|
||
|
||
- [**`catalog_services` variable**](#catalog-services-variable)
|
||
- [**`consul_kv` variable**](#consul-kv-variable)
|
||
|
||
#### Services Module Input ((#services-source-input))
|
||
|
||
Tasks configured with a services module input monitor for changes to services. Monitoring is either performed on a configured list of services or on any services matching a provided regex.
|
||
|
||
Sample rendered services input:
|
||
|
||
<CodeBlockConfig filename="terraform.tfvars">
|
||
|
||
```hcl
|
||
services = {
|
||
"web.test-server.dc1" = {
|
||
id = "web"
|
||
name = "web"
|
||
kind = ""
|
||
address = "127.0.0.1"
|
||
port = 80
|
||
meta = {}
|
||
tags = ["example"]
|
||
namespace = ""
|
||
status = "passing"
|
||
node = "pm8902"
|
||
node_id = "307625d3-a1cf-9e85-ff81-12017ca4d848"
|
||
node_address = "127.0.0.1"
|
||
node_datacenter = "dc1"
|
||
node_tagged_addresses = {
|
||
lan = "127.0.0.1"
|
||
lan_ipv4 = "127.0.0.1"
|
||
wan = "127.0.0.1"
|
||
wan_ipv4 = "127.0.0.1"
|
||
}
|
||
node_meta = {
|
||
consul-network-segment = ""
|
||
}
|
||
},
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
In order to configure a task with the services module input, the list of services that will be used for the input must be configured in one of the following ways:
|
||
|
||
- the task's [`services`](/docs/nia/configuration#services) (deprecated)
|
||
- a [`condition "services"` block](/docs/nia/configuration#services-condition) configured with `use_as_module_input` field set to true
|
||
- Field was previously named `source_includes_var` (deprecated)
|
||
- a [`module_input "services"` block](/docs/nia/configuration#services-module-input)
|
||
- Block was previously named `source_input "services"` (deprecated)
|
||
|
||
The services module input operates by monitoring the [Health List Nodes For Service API](/api-docs/health#list-nodes-for-service) and provides the latest service information to the input variables. A complete list of service information that would be provided to the module is expanded below:
|
||
|
||
| Attribute | Description |
|
||
| ----------------------- | ------------------------------------------------------------------------------------------------- |
|
||
| `id` | A unique Consul ID for this service. The service id is unique per Consul agent. |
|
||
| `name` | The logical name of the service. Many service instances may share the same logical service name. |
|
||
| `address` | IP address of the service host -- if empty, node address should be used. |
|
||
| `port` | Port number of the service |
|
||
| `meta` | List of user-defined metadata key/value pairs for the service |
|
||
| `tags` | List of tags for the service |
|
||
| `namespace` | Consul Enterprise namespace of the service instance |
|
||
| `status` | Representative status for the service instance based on an aggregate of the list of health checks |
|
||
| `node` | Name of the Consul node on which the service is registered |
|
||
| `node_id` | ID of the node on which the service is registered. |
|
||
| `node_address` | The IP address of the Consul node on which the service is registered. |
|
||
| `node_datacenter` | Data center of the Consul node on which the service is registered. |
|
||
| `node_tagged_addresses` | List of explicit LAN and WAN IP addresses for the agent |
|
||
| `node_meta` | List of user-defined metadata key/value pairs for the node |
|
||
|
||
Below is an example configuration for a task that will execute on a schedule and provide information about the services matching the `regexp` parameter to the task’s module.
|
||
|
||
```hcl
|
||
task {
|
||
name = "services_condition_task"
|
||
description = "execute on changes to services whose name starts with web"
|
||
providers = ["my-provider"]
|
||
module = "path/to/services-condition-module"
|
||
condition "schedule" {
|
||
cron = "* * * * Mon"
|
||
}
|
||
module_input "services" {
|
||
regexp = "^web.*"
|
||
}
|
||
}
|
||
```
|
||
|
||
#### Consul KV Module Input ((#consul-kv-source-input))
|
||
|
||
Tasks configured with a Consul KV module input monitor Consul KV for changes to KV pairs that satisfy the provided configuration. The Consul KV module input operates by monitoring the [Consul KV API](/api-docs/kv#read-key) and provides these key values to the task's module.
|
||
|
||
Sample rendered consul KV input:
|
||
|
||
<CodeBlockConfig filename="terraform.tfvars">
|
||
|
||
```hcl
|
||
consul_kv = {
|
||
"my-key" = "some value"
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
To configure a task with the Consul KV module input, the KVs which will be used for the input must be configured in one of the following ways:
|
||
|
||
- a [`condition "consul-kv"` block](/docs/nia/configuration#consul-kv-condition) configured with the `use_as_module_input` field set to true.
|
||
- Field was previously named `source_includes_var` (deprecated)
|
||
- a [`module_input "consul-kv"` block](/docs/nia/configuration#consul-kv-module-input).
|
||
- Block was previously named `source_input "consul-kv"` (deprecated)
|
||
|
||
Below is a similar example to the one provided in the [Consul KV Condition](/docs/nia/tasks#consul-kv-condition) section. However, the difference in this example is that instead of triggering based on a change to Consul KV, this task will instead execute on a schedule. Once execution is triggered, Consul KV information is then provided to the task's module.
|
||
|
||
```hcl
|
||
task {
|
||
name = "consul_kv_schedule_task"
|
||
description = "executes on Monday monitoring Consul KV"
|
||
module = "path/to/consul-kv-module"
|
||
|
||
condition "schedule" {
|
||
cron = "* * * * Mon"
|
||
}
|
||
|
||
module_input "consul-kv" {
|
||
path = "my-key"
|
||
recurse = true
|
||
datacenter = "dc1"
|
||
namespace = "default"
|
||
}
|
||
}
|
||
```
|
||
|
||
#### Catalog Services Module Input ((#catalog-services-source-input))
|
||
|
||
Tasks configured with a Catalog Services module input monitors for service and tag information provided by the [Catalog List Services API](/api-docs/catalog#list-services). The module input is a map of service names to a list of tags.
|
||
|
||
Sample rendered catalog-services input:
|
||
|
||
<CodeBlockConfig filename="terraform.tfvars">
|
||
|
||
```hcl
|
||
catalog_services = {
|
||
"api" = ["prod", "staging"]
|
||
"consul" = []
|
||
"web" = ["blue", "green"]
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
To configure a task with the Catalog Services module input, the catalog services which will be used for the input must be configured in one of the following ways:
|
||
|
||
- a [`condition "catalog-services"` block](/docs/nia/configuration#consul-kv-condition) configured with `use_as_module_input` field.
|
||
- Field was previously named `source_includes_var` (deprecated)
|
||
|
||
-> **Note:** Currently there is no support for a `module_input "catalog-services"` block.
|
||
|
||
Example of a catalog-services condition which supports module input through `use_as_module_input`:
|
||
|
||
```hcl
|
||
task {
|
||
name = "catalog_services_condition_task"
|
||
description = "execute on registration/deregistration of services"
|
||
providers = ["my-provider"]
|
||
module = "path/to/catalog-services-module"
|
||
condition "catalog-services" {
|
||
datacenter = "dc1"
|
||
namespace = "default"
|
||
regexp = "web.*"
|
||
use_as_module_input = true
|
||
node_meta {
|
||
key = "value"
|
||
}
|
||
}
|
||
}
|
||
```
|
||
|
||
## How to Create a Compatible Terraform Module
|
||
|
||
You can read more on how to [create a module](https://www.terraform.io/docs/modules/index.html) or work through a [tutorial to build a module](https://learn.hashicorp.com/tutorials/terraform/module-create). CTS is designed to integrate with any module that satisfies the specifications in the following section.
|
||
|
||
The repository [hashicorp/consul-terraform-sync-template-module](https://github.com/hashicorp/consul-terraform-sync-template-module) can be cloned and used as a starting point for structuring a compatible Terraform module. The template repository has the files described in the next steps prepared.
|
||
|
||
First, create a directory to organize Terraform configuration files that make up the module. You can start off with creating two files `main.tf` and `variables.tf` and expand from there based on your module and network infrastructure automation needs.
|
||
|
||
The `main.tf` is the entry point of the module and this is where you can begin authoring your module. It can contain multiple Terraform resources related to an automation task that uses Consul service discovery information, particularly the required [`services` input variable](#services-variable). The code example below shows a resource using the `services` variable. When this example is used in automation with CTS, the content of the local file would dynamically update as Consul service discovery information changes.
|
||
|
||
<CodeBlockConfig filename="main.tf">
|
||
|
||
```hcl
|
||
# Create a file with service names and their node addresses
|
||
resource "local_file" "consul_services" {
|
||
content = join("\n", [
|
||
for _, service in var.services : "${service.name} ${service.id} ${service.node_address}"
|
||
])
|
||
filename = "consul_services.txt"
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
Something important to consider before authoring your module is deciding the [condition under which it will execute](/docs/nia/tasks#task-execution). This will allow you to potentially use other types of CTS provided input variables in your module. It will also help inform your documentation and how users should configure their task for your module.
|
||
|
||
### Services Variable
|
||
|
||
To satisfy the specification requirements for a compatible module, copy the `services` variable declaration to the `variables.tf` file. Your module can optionally have other [variable declarations](#module-input-variables) and [CTS provided input variables](/docs/nia/terraform-modules#optional-input-variables) in addition to `var.services`.
|
||
|
||
<CodeBlockConfig filename="variables.tf">
|
||
|
||
```hcl
|
||
variable "services" {
|
||
description = "Consul services monitored by Consul-Terraform-Sync"
|
||
type = map(
|
||
object({
|
||
id = string
|
||
name = string
|
||
kind = string
|
||
address = string
|
||
port = number
|
||
meta = map(string)
|
||
tags = list(string)
|
||
namespace = string
|
||
status = string
|
||
|
||
node = string
|
||
node_id = string
|
||
node_address = string
|
||
node_datacenter = string
|
||
node_tagged_addresses = map(string)
|
||
node_meta = map(string)
|
||
|
||
cts_user_defined_meta = map(string)
|
||
})
|
||
)
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
Keys of the `services` map are unique identifiers of the service across Consul agents and data centers. Keys follow the format `service-id.node.datacenter` (or `service-id.node.namespace.datacenter` for Consul Enterprise). A complete list of attributes available for the `services` variable is included in the [documentation for CTS tasks](/docs/nia/tasks#services-condition).
|
||
|
||
Terraform variables when passed as module arguments can be [lossy for object types](https://www.terraform.io/docs/configuration/types.html#conversion-of-complex-types). This allows CTS to declare the full variable with every object attribute in the generated root module, and pass the variable to a child module that contains a subset of these attributes for its variable declaration. Modules compatible with CTS may simplify the `var.services` declaration within the module by omitting unused attributes. For example, the following services variable has 4 attributes with the rest omitted.
|
||
|
||
<CodeBlockConfig filename="variables.tf">
|
||
|
||
```hcl
|
||
variable "services" {
|
||
description = "Consul services monitored by Consul-Terraform-Sync"
|
||
type = map(
|
||
object({
|
||
id = string
|
||
name = string
|
||
node_address = string
|
||
port = number
|
||
status = string
|
||
})
|
||
)
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
### Catalog Services Variable
|
||
|
||
If you are creating a module for a [catalog-services condition](/docs/nia/tasks#catalog-services-condition), then you have the option to add the `catalog_services` variable, which contains service registration and tag information. If your module would benefit from consuming this information, you can copy the `catalog_services` variable declaration to your `variables.tf` file in addition to the other variables.
|
||
|
||
<CodeBlockConfig filename="variables.tf">
|
||
|
||
```hcl
|
||
variable "catalog_services" {
|
||
description = "Consul catalog service names and tags monitored by Consul-Terraform-Sync"
|
||
type = map(list(string))
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
The keys of the `catalog_services` map are the names of the services that are registered with Consul at the given datacenter. The value for each service name is a list of all known tags for that service.
|
||
|
||
We recommend that if you make a module with with a catalog-services condition, that you document this in the README. This way, users that want to configure a task with your module will know to configure a catalog-services [condition](/docs/nia/configuration#condition) block.
|
||
|
||
Similarly, if you use the `catalog_services` variable in your module, we recommend that you also document this usage in the README. Users of your module will then know to set the catalog-services condition [`use_as_module_input`](/docs/nia/configuration#catalog-services-condition) configuration to be true. When this field is set to true, CTS will declare the `catalog_services` variable in the generated root module, and pass the variable to a child module. Therefore, if this field is configured inconsistently, CTS will error and exit.
|
||
|
||
### Consul KV Variable
|
||
|
||
If you are creating a module for a [consul-kv condition](/docs/nia/tasks#consul-kv-condition), then you have the option to add the `consul_kv` variable, which contains a map of the keys and values for the Consul KV pairs. If your module would benefit from consuming this information, you can copy the `consul_kv` variable declaration to your `variables.tf` file in addition to the other variables.
|
||
|
||
<CodeBlockConfig filename="variables.tf">
|
||
|
||
```hcl
|
||
variable "consul_kv" {
|
||
description = "Keys and values of the Consul KV pairs monitored by Consul-Terraform-Sync"
|
||
type = map(string)
|
||
}
|
||
```
|
||
|
||
</CodeBlockConfig>
|
||
|
||
If your module contains the `consul_kv` variable, we recommend documenting the usage in the README file so that users know to set the [`use_as_module_input`](/docs/nia/configuration#consul-kv-condition) configuration to `true` in the `consul-kv` condition. Setting the field to `true` instructs CTS to declare the `consul_kv` variable in the generated root module and pass the variable to a child module. Therefore, if this field is configured inconsistently, CTS will error and exit.
|
||
|
||
### Module Input Variables
|
||
|
||
Network infrastructure differs vastly across teams and organizations, and the automation needs of practitioners are unique based on their existing setup. [Input variables](https://www.terraform.io/docs/configuration/variables.html) can be used to serve as customization parameters to the module for practitioners.
|
||
|
||
1. Identify areas in the module where practitioners could tailor the automation to fit their infrastructure.
|
||
2. Declare input variables and insert the use of variables throughout module resources to expose these options to practitioners.
|
||
3. Include descriptions to capture what the variables are and how they are used, and specify [custom validation rules for variables](https://www.terraform.io/docs/configuration/variables.html#custom-validation-rules) to provide context to users the expected format and conditions for the variables.
|
||
4. Set reasonable default values for variables that are optional, or omit default values for variables that are required module arguments.
|
||
5. Set the [sensitive argument](https://www.terraform.io/docs/language/values/variables.html#suppressing-values-in-cli-output) for variables that contain secret or sensitive values. When set, Terraform will redact the value from output when Terraform commands are run.
|
||
|
||
Terraform is an explicit configuration language and requires variables to be declared, typed, and passed explicitly through as module arguments. CTS abstracts this by creating intermediate variables at the root level from the module input. These values are configured by practitioners within the [`task` block](/docs/nia/configuration#variable_files). Value assignments are parsed to interpolate the corresponding variable declaration and are written to the appropriate Terraform files. A few assumptions are made for the intermediate variables: the variables users provide CTS are declared and supported by the module, matching name and type.
|
||
|
||
### Module Guidelines
|
||
|
||
This section covers guidelines for authoring compatible CTS modules.
|
||
|
||
#### Scope
|
||
|
||
We recommend scoping the module to a few related resources for a provider. Small modules are easier and more flexible for end users to adopt for CTS. It allows them to iteratively combine different modules and use them as building blocks to meet their unique network infrastructure needs.
|
||
|
||
#### Complexity
|
||
|
||
Consider authoring modules with low complexity to reduce the run time for Terraform execution. Complex modules that have a large number of dependencies may result in longer runs, which adds delay to the near real time network updates.
|
||
|
||
#### Providers
|
||
|
||
The Terraform module must declare which providers it requires within the [`terraform.required_providers` block](https://www.terraform.io/docs/language/providers/requirements.html#requiring-providers). We suggest to also include a version constraint for the provider to specify which versions the module is compatible with.
|
||
|
||
Aside from the `required_providers` block, provider configurations should not be included within the sharable module for network integrations. End users will configure the providers through CTS, and CTS will then translate provider configuration to the generated root module appropriately.
|
||
|
||
#### Documentation
|
||
|
||
Modules for CTS are Terraform modules and can effectively run independently from the `consul-terraform-sync` daemon and Consul environment. They should be written and designed with Terraform best practices and should be clear to a Terraform user what the module does and how to use it. Module documentation should be named `README` or `README.md`. The description should capture what the module should be used for and the implications of running it in automation with CTS.
|