Cisco Intersight Service for HashiCorp Terraform (IST) addresses the challenge of securely connecting and configuring on-premises and hybrid environments to work with Terraform Cloud Business Tier. Leveraging Intersight Assist, users can integrate Terraform Cloud Business with Cisco Intersight, enabling secure communication between on-premises data centers and edge locations with the IaC platform. This means users can spend less time managing the end-to-end lifecycle of Terraform Cloud Agents, benefiting from native integration directly within Intersight, including upgrades and the ability to scale as demand grows.
In this example, we cover a simple use case to create a new compute cluster in existing data center and assign a new host (or a list of groups) to the given cluster. This use case will walk the user thought the following steps:
- Adding your Terraform Cloud for Business Tier Credentials
- Adding your Terraform Cloud Agent
- Executing Terraform Code to create
The list of host is passed as a Map like in the example below:
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
- Intersight SaaS platform account with Advantage licenses
- An Intersight Assist appliance that is connected to your Intersight environment
- Terraform Cloud Business Tier Account
- An exhisting DataCenter
- vCenter Server Access: username, password and host
- GitHub account to host your Terraform code
- A workspace in Terraform Cloud
- A valid license(s) key that will be applied to the hosts
To add your Terraform Cloud credentials in Intersight you will need the following:
- Terraform Cloud Username
- Terraform Cloud API Token
- Terraform Cloud Organization
Login to Intersight and claim your Terraform Cloud target.
Once the target is created, the agent can be added assist.
- Go to https://github.com/CiscoDevNet/ist-vmware-compute-cluster
- Fork it into your own GitHub account
- Create a new workspace and choose a version control provider (setup in the previous step) that hosts the Terraform configuration for this workspace.
- Go to the Variables section and add the following variables with the value specific to your environment (the values provided below are examples)
Key | Value | Type |
---|---|---|
vsphere_server | 192.168.x.x | String |
vsphere_user | [email protected] | String |
vsphere_password | ******** | String, Sensitive |
datacenter | RMLAB | String |
dc_cluster_name | RMLAB - zTF_Test | String |
h_username | root | String |
h_password | ******* | String, Sensitive |
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
To execute the Terraform code in your datacenter click on the Queue Plan Manually button
You will see one new compute cluster created and an host as part of thre cluster The following output will be generated:
Get hands on experience with Intersight Service for Terraform in DevNet's Sandbox environment.
Cisco Intersight Service for HashiCorp Terraform
Learn how to provision virtual machines in vSphere using Intersight Service for Terraform.
Introduction to Intersight Service for Hashicorp Terraform Provisioning VMs using Intersight Terraform Service for Hashicorp