Note
Access to this page requires authorization. You can try signing in or changing directories.
Access to this page requires authorization. You can try changing directories.
Azure Developer CLI (azd) supports multiple infrastructures as code (IaC) providers, including:
By default, azd assumes Bicep as the IaC provider. Refer to the Comparing Terraform and Bicep article for help deciding which IaC provider is best for your project.
Note
Terraform is still in beta. Read more about alpha and beta feature support on the feature versioning and release strategy page
Pre-requisites
- Install and configure Terraform
- Install and log into Azure CLI (v 2.38.0+)
- Review the architecture diagram and the Azure resources you'll deploy in the Node.js or Python Terraform template.
Note
While azd doesn't rely on an Azure CLI login, Terraform requires Azure CLI. Read more about this requirement from Terraform's official documentation.
Configure Terraform as the IaC provider
Open the
azure.yamlfile found in the root of your project and make sure you have the following lines to override the default, which is Bicep:infra: provider: terraformAdd all your
.tffiles to theinfradirectory found in the root of your project.Run
azd up.
Note
Check out these two azd templates with Terraform as IaC Provider: Node.js and Terraform and Python and Terraform.
azd pipeline config for Terraform
Terraform stores state about your managed infrastructure and configuration. Because of this state file, you need to enable remote state before you run azd pipeline config to set up your deployment pipeline in GitHub.
By default, azd assumes the use of local state file. If you ran azd up before enabling remote state, you need to run azd down and switch to remote state file.
Local vs remote state
Terraform uses persisted state data to keep track of the resources it manages.
Scenarios for enabling remote state:
- To allow shared access to the state data, and allow multiple people work together on that collection of infrastructure resources
- To avoid exposing sensitive information included in state file
- To decrease the chance of inadvertent deletion because of storing state locally
Enable remote state
Make sure you configure a remote state storage account.
Add a new file called
provider.conf.jsonin theinfrafolder.{ "storage_account_name": "${RS_STORAGE_ACCOUNT}", "container_name": "${RS_CONTAINER_NAME}", "key": "azd/azdremotetest.tfstate", "resource_group_name": "${RS_RESOURCE_GROUP}" }Update
provider.tffound in theinfrafolder to set the backend to be remote# Configure the Azure Provider terraform { required_version = ">= 1.1.7, < 2.0.0" backend "azurerm" { }Run
azd env set <key> <value>to add configuration in the.envfile. For example:azd env set RS_STORAGE_ACCOUNT your_storage_account_name azd env set RS_CONTAINER_NAME your_terraform_container_name azd env set RS_RESOURCE_GROUP your_storage_account_resource_groupRun the next
azdcommand as per your usual workflow. When remote state is detected,azdinitializes Terraform with the configured backend configuration.To share the environment with teammates, make sure they run
azd env refresh -e <environmentName>to refresh environment settings in the local system, and perform Step 4 to add configuration in the.envfile.
See also
- Learn more about Terraform's dependency on Azure CLI.
- For more on remote state, see store Terraform state in Azure Storage.
- Template: React Web App with Node.js API and MongoDB (Terraform) on Azure