How to Install and create AWS EC2 Instance using Terraform
In this article, we are going to see how to install Terraform and create an AWS EC2 machine. We will see detailed steps on how you can install Terraform on centos or RHEL Linux. You can easily get terraform binaries from the Terraform online software repository. Using a few commands you can get a fully running terraform command-line interface (CLI).
What is Terraform?
Terraform is a CLI utility application to provision, version and backup cloud infrastructure. Using Terraform modules you can create cloud services on AWS (Amazon Web Services), Microsoft Azure, Google Cloud (GCP), IBM Cloud and Alibaba Cloud. You can also call it infrastructure as Code means using code you can create and manage the entire cloud data center. I see one biggest advantage when you have to create multiple infrastructure services in different services provider platforms or in the same close platform. You can automate whole cloud implementation by Terraform and once your task or project is done you can destroy it. And again rebuilt according to the business or application need.
1#. Create a directory where you want to install the terraform
[root@thedbadmin ~]# cat /etc/redhat-release
CentOS Linux release 8.1.1911 (Core)
[root@thedbadmin ~]#
cd /opt
mkdir terraform
cd terraform/
chmod 777 terraform/
2#. Pull the terraform installation zip file from online repository. And create an environment variable file to run terraform.
wget https://releases.hashicorp.com/terraform/0.12.24/terraform_0.12.24_linux_amd64.zip
chmod 777 terraform_0.12.24_linux_amd64.zip
unzip terraform_0.12.24_linux_amd64.zip
echo "export PATH="$PATH:/opt/terraform"" >> profile_terraform.sh
chmod +x profile_terraform.sh
./profile_terraform.sh
3#. Check if its working fine using the version command
[root@thedbadmin terraform]# terraform --version
Terraform v0.12.24
How to create AWS Ec2 from Terraform
4#. Add your AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY into environment variable file (profile_terraform.sh)
echo "export AWS_ACCESS_KEY_ID=(your access key id) " >> /opt/terraform/profile_terraform.sh
echo "export AWS_SECRET_ACCESS_KEY=(your secret access key)" >> /opt/terraform/profile_terraform.sh
5#. Create provider.tf which will hold provider information
vim provider.tf
#---Content of provider.tf
provider "aws" {
profile = "default"
region = "us-east-1"
}
[root@thedbadmin terraform]# cat provider.tf
provider "aws" {
profile = "default"
region = "us-east-1"
}
6#. Create a create_ec2.tf which will hold the code for EC2 machine creation in AWS cloud
#---Content of create_ec2.tf
resource "aws_instance" "thedbadmin_test" {
ami = "ami-0fc61db8544a617ed"
instance_type = "t2.micro"
}
#7. Now you have to Initialize the terraform by running ‘terraform init’. It will check your provider.tf file and based on your cloud provider it will download the modules and plugin.
[root@thedbadmin terraform]# terraform init
Initializing the backend...
Initializing provider plugins...
- Checking for available provider plugins...
- Downloading plugin for provider "aws" (hashicorp/aws) 2.55.0...
The following providers do not have any version constraints in configuration,
so the latest version was installed.
To prevent automatic upgrades to new major versions that may contain breaking
changes, it is recommended to add version = "..." constraints to the
corresponding provider blocks in configuration, with the constraint strings
suggested below.
* provider.aws: version = "~> 2.55"
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
#8. Now let’s run plan. In the planning phase, it is going to show you the detailed plan of execution of service creation code and their sequences. You can to review it and if all the things look good you can go for the next step.
[root@thedbadmin terraform]# terraform plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
------------------------------------------------------------------------
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# aws_instance.thedbadmin_test will be created
+ resource "aws_instance" "thedbadmin_test" {
+ ami = "ami-0fc61db8544a617ed"
+ arn = (known after apply)
+ associate_public_ip_address = (known after apply)
+ availability_zone = (known after apply)
+ cpu_core_count = (known after apply)
+ cpu_threads_per_core = (known after apply)
+ get_password_data = false
+ host_id = (known after apply)
+ id = (known after apply)
+ instance_state = (known after apply)
+ instance_type = "t2.micro"
+ ipv6_address_count = (known after apply)
+ ipv6_addresses = (known after apply)
+ key_name = (known after apply)
+ network_interface_id = (known after apply)
+ password_data = (known after apply)
+ placement_group = (known after apply)
+ primary_network_interface_id = (known after apply)
+ private_dns = (known after apply)
+ private_ip = (known after apply)
+ public_dns = (known after apply)
+ public_ip = (known after apply)
+ security_groups = (known after apply)
+ source_dest_check = true
+ subnet_id = (known after apply)
+ tenancy = (known after apply)
+ volume_tags = (known after apply)
+ vpc_security_group_ids = (known after apply)
+ ebs_block_device {
+ delete_on_termination = (known after apply)
+ device_name = (known after apply)
+ encrypted = (known after apply)
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ snapshot_id = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
+ ephemeral_block_device {
+ device_name = (known after apply)
+ no_device = (known after apply)
+ virtual_name = (known after apply)
}
+ metadata_options {
+ http_endpoint = (known after apply)
+ http_put_response_hop_limit = (known after apply)
+ http_tokens = (known after apply)
}
+ network_interface {
+ delete_on_termination = (known after apply)
+ device_index = (known after apply)
+ network_interface_id = (known after apply)
}
+ root_block_device {
+ delete_on_termination = (known after apply)
+ encrypted = (known after apply)
+ iops = (known after apply)
+ kms_key_id = (known after apply)
+ volume_id = (known after apply)
+ volume_size = (known after apply)
+ volume_type = (known after apply)
}
}
Plan: 1 to add, 0 to change, 0 to destroy.
------------------------------------------------------------------------
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
#9. Now you can apply the code and it will create the EC2 machine on AWS cloud
Once terraform apply executed successfully
You will see an AWS ec2 machine started running on the AWS console.
If you like to connect to this machine from putty see my post. in this post, you will see detailed steps for connecting AWS ec2 machine from putty or any command line a utilities.
You can also check the machine details from ‘terraform show’
[root@thedbadmin terraform]# terraform show
# aws_instance.thedbadmin_test:
resource "aws_instance" "thedbadmin_test" {
ami = "ami-0fc61db8544a617ed"
arn = "arn:aws:ec2:us-east-1:929765408842:instance/i-0c9452e4f1637222e"
associate_public_ip_address = true
availability_zone = "us-east-1a"
cpu_core_count = 1
cpu_threads_per_core = 1
disable_api_termination = false
ebs_optimized = false
get_password_data = false
hibernation = false
id = "i-0c9452e4f1637222e"
instance_state = "running"
instance_type = "t2.micro"
ipv6_address_count = 0
ipv6_addresses = []
monitoring = false
primary_network_interface_id = "eni-04e6b878e96c21811"
private_dns = "ip-172-31-34-72.ec2.internal"
private_ip = "172.31.34.72"
public_dns = "ec2-18-208-228-169.compute-1.amazonaws.com"
public_ip = "18.208.228.169"
security_groups = [
"default",
]
source_dest_check = true
subnet_id = "subnet-d6bd218a"
tenancy = "default"
volume_tags = {}
vpc_security_group_ids = [
"sg-4c77dd0c",
]
credit_specification {
cpu_credits = "standard"
}
metadata_options {
http_endpoint = "enabled"
http_put_response_hop_limit = 1
http_tokens = "optional"
}
root_block_device {
delete_on_termination = true
encrypted = false
iops = 100
volume_id = "vol-04d551e12fe408c27"
volume_size = 8
volume_type = "gp2"
}
}
How to Terminate or Delete EC2 machine from Terraform
Using terraform destroy command you can delete the AWS service or infrastructure. Be extra careful if you are deleting any realtime services or EC2 machine. Add proper snapshot or volume preserve option before deleting it.
[root@thedbadmin terraform]# terraform destroy
aws_instance.thedbadmin_test: Refreshing state... [id=i-0c9452e4f1637222e]
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
- destroy
Terraform will perform the following actions:
# aws_instance.thedbadmin_test will be destroyed
- resource "aws_instance" "thedbadmin_test" {
- ami = "ami-0fc61db8544a617ed" -> null
- arn = "arn:aws:ec2:us-east-1:929765408842:instance/i-0c9452e4f1637222e" -> null
- associate_public_ip_address = true -> null
- availability_zone = "us-east-1a" -> null
- cpu_core_count = 1 -> null
- cpu_threads_per_core = 1 -> null
- disable_api_termination = false -> null
- ebs_optimized = false -> null
- get_password_data = false -> null
- hibernation = false -> null
- id = "i-0c9452e4f1637222e" -> null
- instance_state = "running" -> null
- instance_type = "t2.micro" -> null
- ipv6_address_count = 0 -> null
- ipv6_addresses = [] -> null
- monitoring = false -> null
- primary_network_interface_id = "eni-04e6b878e96c21811" -> null
- private_dns = "ip-172-31-34-72.ec2.internal" -> null
- private_ip = "172.31.34.72" -> null
- public_dns = "ec2-18-208-228-169.compute-1.amazonaws.com" -> null
- public_ip = "18.208.228.169" -> null
- security_groups = [
- "default",
] -> null
- source_dest_check = true -> null
- subnet_id = "subnet-d6bd218a" -> null
- tags = {} -> null
- tenancy = "default" -> null
- volume_tags = {} -> null
- vpc_security_group_ids = [
- "sg-4c77dd0c",
] -> null
- credit_specification {
- cpu_credits = "standard" -> null
}
- metadata_options {
- http_endpoint = "enabled" -> null
- http_put_response_hop_limit = 1 -> null
- http_tokens = "optional" -> null
}
- root_block_device {
- delete_on_termination = true -> null
- encrypted = false -> null
- iops = 100 -> null
- volume_id = "vol-04d551e12fe408c27" -> null
- volume_size = 8 -> null
- volume_type = "gp2" -> null
}
}
Plan: 0 to add, 0 to change, 1 to destroy.
Do you really want to destroy all resources?
Terraform will destroy all your managed infrastructure, as shown above.
There is no undo. Only 'yes' will be accepted to confirm.
Enter a value: yes
aws_instance.thedbadmin_test: Destroying... [id=i-0c9452e4f1637222e]
aws_instance.thedbadmin_test: Still destroying... [id=i-0c9452e4f1637222e, 10s elapsed]
aws_instance.thedbadmin_test: Still destroying... [id=i-0c9452e4f1637222e, 20s elapsed]
aws_instance.thedbadmin_test: Still destroying... [id=i-0c9452e4f1637222e, 30s elapsed]
aws_instance.thedbadmin_test: Destruction complete after 36s
Destroy complete! Resources: 1 destroyed.
[root@thedbadmin terraform]# terraform show
[root@thedbadmin terraform]#
Once the above command is executed successfully you will see that AWS will start terminating your EC2 instance.
Terraform Command
[root@thedbadmin terraform]# terraform
Usage: terraform [-version] [-help] <command> [args]
The available commands for execution are listed below.
The most common, useful commands are shown first, followed by
less common or more advanced commands. If you're just getting
started with Terraform, stick with the common commands. For the
other commands, please read the help and docs before usage.
Common commands:
apply Builds or changes infrastructure
console Interactive console for Terraform interpolations
destroy Destroy Terraform-managed infrastructure
env Workspace management
fmt Rewrites config files to canonical format
get Download and install modules for the configuration
graph Create a visual graph of Terraform resources
import Import existing infrastructure into Terraform
init Initialize a Terraform working directory
output Read an output from a state file
plan Generate and show an execution plan
providers Prints a tree of the providers used in the configuration
refresh Update local state file against real resources
show Inspect Terraform state or plan
taint Manually mark a resource for recreation
untaint Manually unmark a resource as tainted
validate Validates the Terraform files
version Prints the Terraform version
workspace Workspace management
All other commands:
0.12upgrade Rewrites pre-0.12 module source code for v0.12
debug Debug output management (experimental)
force-unlock Manually unlock the terraform state
push Obsolete command for Terraform Enterprise legacy (v1)
state Advanced state management
I hope this article will useful and step by step.
Please like our FaceBook page and subscribe to the newsletter for future post and updates.
Read more
AWS MySQL RDS Database Creation using AWS CLI
How to Create MySQL Database with AWS RDS
How to connect to AWS MySQL / MariaDB RDS or EC2 database from MySQL WorkBench
How to Become Oracle apps DBA?
What does DBA mean?
150 Oracle DBA Interview Questions
Top 5 Future Technologies for Database Administrators (DBA) to learn in 2020
Top 5 Software Technology Trends in 2020 List