fbpx

How to Install and create AWS EC2 Instance using Terraform

How to Install and create AWS EC2 Instance using Terraform

In this article, we are going to see how to install Terraform and create an AWS EC2 machine. We will see detailed steps on how you can install Terraform on centos or RHEL Linux. You can easily get terraform binaries from the Terraform online software repository. Using a few commands you can get a fully running terraform command-line interface (CLI).

What is Terraform?

Terraform is a CLI utility application to provision, version and backup cloud infrastructure. Using Terraform modules you can create cloud services on AWS (Amazon Web Services), Microsoft Azure, Google Cloud (GCP), IBM Cloud and Alibaba Cloud. You can also call it infrastructure as Code means using code you can create and manage the entire cloud data center. I see one biggest advantage when you have to create multiple infrastructure services in different services provider platforms or in the same close platform. You can automate whole cloud implementation by Terraform and once your task or project is done you can destroy it. And again rebuilt according to the business or application need.

 

 

1#. Create a directory where you want to install the terraform

[root@thedbadmin ~]# cat /etc/redhat-release
CentOS Linux release 8.1.1911 (Core)
[root@thedbadmin ~]#

cd /opt
mkdir terraform
cd terraform/
chmod 777 terraform/

 

 

2#. Pull the terraform installation zip file from online repository. And create an environment variable file to run terraform.

wget https://releases.hashicorp.com/terraform/0.12.24/terraform_0.12.24_linux_amd64.zip

chmod 777 terraform_0.12.24_linux_amd64.zip
unzip terraform_0.12.24_linux_amd64.zip
echo "export PATH="$PATH:/opt/terraform"" >> profile_terraform.sh

chmod +x profile_terraform.sh
./profile_terraform.sh

 

 

3#. Check if its working fine using the version command

[root@thedbadmin terraform]# terraform --version
Terraform v0.12.24

 

How to create AWS Ec2 from Terraform

 

4#.  Add your AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY into environment variable file (profile_terraform.sh)

echo "export AWS_ACCESS_KEY_ID=(your access key id) " >> /opt/terraform/profile_terraform.sh
echo "export AWS_SECRET_ACCESS_KEY=(your secret access key)" >> /opt/terraform/profile_terraform.sh

 

 

5#.  Create provider.tf  which will hold provider information

vim provider.tf
#---Content of provider.tf
provider "aws" {
  profile    = "default"
  region     = "us-east-1"
}

[root@thedbadmin terraform]# cat provider.tf
provider "aws" {
  profile    = "default"
  region     = "us-east-1"
}

 

 

6#. Create a create_ec2.tf which will hold the code for EC2 machine creation in AWS cloud

#---Content of create_ec2.tf
resource "aws_instance" "thedbadmin_test" {
  ami           = "ami-0fc61db8544a617ed"
  instance_type = "t2.micro"
}

 

 

#7. Now you have to Initialize the terraform by running ‘terraform init’. It will check your provider.tf  file and based on your cloud provider it will download the modules and plugin.

[root@thedbadmin terraform]# terraform init

Initializing the backend...

Initializing provider plugins...
- Checking for available provider plugins...
- Downloading plugin for provider "aws" (hashicorp/aws) 2.55.0...

The following providers do not have any version constraints in configuration,
so the latest version was installed.

To prevent automatic upgrades to new major versions that may contain breaking
changes, it is recommended to add version = "..." constraints to the
corresponding provider blocks in configuration, with the constraint strings
suggested below.

* provider.aws: version = "~> 2.55"

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.

 

 

#8.  Now let’s run plan. In the planning phase, it is going to show you the detailed plan of execution of service creation code and their sequences. You can to review it and if all the things look good you can go for the next step.

[root@thedbadmin terraform]# terraform plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.


------------------------------------------------------------------------

An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # aws_instance.thedbadmin_test will be created
  + resource "aws_instance" "thedbadmin_test" {
      + ami                          = "ami-0fc61db8544a617ed"
      + arn                          = (known after apply)
      + associate_public_ip_address  = (known after apply)
      + availability_zone            = (known after apply)
      + cpu_core_count               = (known after apply)
      + cpu_threads_per_core         = (known after apply)
      + get_password_data            = false
      + host_id                      = (known after apply)
      + id                           = (known after apply)
      + instance_state               = (known after apply)
      + instance_type                = "t2.micro"
      + ipv6_address_count           = (known after apply)
      + ipv6_addresses               = (known after apply)
      + key_name                     = (known after apply)
      + network_interface_id         = (known after apply)
      + password_data                = (known after apply)
      + placement_group              = (known after apply)
      + primary_network_interface_id = (known after apply)
      + private_dns                  = (known after apply)
      + private_ip                   = (known after apply)
      + public_dns                   = (known after apply)
      + public_ip                    = (known after apply)
      + security_groups              = (known after apply)
      + source_dest_check            = true
      + subnet_id                    = (known after apply)
      + tenancy                      = (known after apply)
      + volume_tags                  = (known after apply)
      + vpc_security_group_ids       = (known after apply)

      + ebs_block_device {
          + delete_on_termination = (known after apply)
          + device_name           = (known after apply)
          + encrypted             = (known after apply)
          + iops                  = (known after apply)
          + kms_key_id            = (known after apply)
          + snapshot_id           = (known after apply)
          + volume_id             = (known after apply)
          + volume_size           = (known after apply)
          + volume_type           = (known after apply)
        }

      + ephemeral_block_device {
          + device_name  = (known after apply)
          + no_device    = (known after apply)
          + virtual_name = (known after apply)
        }

      + metadata_options {
          + http_endpoint               = (known after apply)
          + http_put_response_hop_limit = (known after apply)
          + http_tokens                 = (known after apply)
        }

      + network_interface {
          + delete_on_termination = (known after apply)
          + device_index          = (known after apply)
          + network_interface_id  = (known after apply)
        }

      + root_block_device {
          + delete_on_termination = (known after apply)
          + encrypted             = (known after apply)
          + iops                  = (known after apply)
          + kms_key_id            = (known after apply)
          + volume_id             = (known after apply)
          + volume_size           = (known after apply)
          + volume_type           = (known after apply)
        }
    }

Plan: 1 to add, 0 to change, 0 to destroy.

------------------------------------------------------------------------

Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.

 

#9. Now you can apply the code and it will create the EC2 machine on AWS cloud

terraform apply

 

Once terraform apply executed successfully

You will see an AWS ec2 machine started running on the AWS console.

 

 

If you like to connect to this machine from putty see my post. in this post, you will see detailed steps for connecting AWS ec2 machine from putty or any command line a utilities.

 

You can also check the machine details from ‘terraform show’

 

[root@thedbadmin terraform]# terraform show
# aws_instance.thedbadmin_test:
resource "aws_instance" "thedbadmin_test" {
    ami                          = "ami-0fc61db8544a617ed"
    arn                          = "arn:aws:ec2:us-east-1:929765408842:instance/i-0c9452e4f1637222e"
    associate_public_ip_address  = true
    availability_zone            = "us-east-1a"
    cpu_core_count               = 1
    cpu_threads_per_core         = 1
    disable_api_termination      = false
    ebs_optimized                = false
    get_password_data            = false
    hibernation                  = false
    id                           = "i-0c9452e4f1637222e"
    instance_state               = "running"
    instance_type                = "t2.micro"
    ipv6_address_count           = 0
    ipv6_addresses               = []
    monitoring                   = false
    primary_network_interface_id = "eni-04e6b878e96c21811"
    private_dns                  = "ip-172-31-34-72.ec2.internal"
    private_ip                   = "172.31.34.72"
    public_dns                   = "ec2-18-208-228-169.compute-1.amazonaws.com"
    public_ip                    = "18.208.228.169"
    security_groups              = [
        "default",
    ]
    source_dest_check            = true
    subnet_id                    = "subnet-d6bd218a"
    tenancy                      = "default"
    volume_tags                  = {}
    vpc_security_group_ids       = [
        "sg-4c77dd0c",
    ]

    credit_specification {
        cpu_credits = "standard"
    }

    metadata_options {
        http_endpoint               = "enabled"
        http_put_response_hop_limit = 1
        http_tokens                 = "optional"
    }

    root_block_device {
        delete_on_termination = true
        encrypted             = false
        iops                  = 100
        volume_id             = "vol-04d551e12fe408c27"
        volume_size           = 8
        volume_type           = "gp2"
    }
}

 

 

 

How to Terminate or Delete EC2 machine from Terraform

 

Using terraform destroy command you can delete the AWS service or infrastructure. Be extra careful if you are deleting any realtime services or EC2 machine. Add proper snapshot or volume preserve option before deleting it.

 

[root@thedbadmin terraform]# terraform destroy
aws_instance.thedbadmin_test: Refreshing state... [id=i-0c9452e4f1637222e]

An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
  - destroy

Terraform will perform the following actions:

  # aws_instance.thedbadmin_test will be destroyed
  - resource "aws_instance" "thedbadmin_test" {
      - ami                          = "ami-0fc61db8544a617ed" -> null
      - arn                          = "arn:aws:ec2:us-east-1:929765408842:instance/i-0c9452e4f1637222e" -> null
      - associate_public_ip_address  = true -> null
      - availability_zone            = "us-east-1a" -> null
      - cpu_core_count               = 1 -> null
      - cpu_threads_per_core         = 1 -> null
      - disable_api_termination      = false -> null
      - ebs_optimized                = false -> null
      - get_password_data            = false -> null
      - hibernation                  = false -> null
      - id                           = "i-0c9452e4f1637222e" -> null
      - instance_state               = "running" -> null
      - instance_type                = "t2.micro" -> null
      - ipv6_address_count           = 0 -> null
      - ipv6_addresses               = [] -> null
      - monitoring                   = false -> null
      - primary_network_interface_id = "eni-04e6b878e96c21811" -> null
      - private_dns                  = "ip-172-31-34-72.ec2.internal" -> null
      - private_ip                   = "172.31.34.72" -> null
      - public_dns                   = "ec2-18-208-228-169.compute-1.amazonaws.com" -> null
      - public_ip                    = "18.208.228.169" -> null
      - security_groups              = [
          - "default",
        ] -> null
      - source_dest_check            = true -> null
      - subnet_id                    = "subnet-d6bd218a" -> null
      - tags                         = {} -> null
      - tenancy                      = "default" -> null
      - volume_tags                  = {} -> null
      - vpc_security_group_ids       = [
          - "sg-4c77dd0c",
        ] -> null

      - credit_specification {
          - cpu_credits = "standard" -> null
        }

      - metadata_options {
          - http_endpoint               = "enabled" -> null
          - http_put_response_hop_limit = 1 -> null
          - http_tokens                 = "optional" -> null
        }

      - root_block_device {
          - delete_on_termination = true -> null
          - encrypted             = false -> null
          - iops                  = 100 -> null
          - volume_id             = "vol-04d551e12fe408c27" -> null
          - volume_size           = 8 -> null
          - volume_type           = "gp2" -> null
        }
    }

Plan: 0 to add, 0 to change, 1 to destroy.

Do you really want to destroy all resources?
  Terraform will destroy all your managed infrastructure, as shown above.
  There is no undo. Only 'yes' will be accepted to confirm.

  Enter a value: yes

aws_instance.thedbadmin_test: Destroying... [id=i-0c9452e4f1637222e]
aws_instance.thedbadmin_test: Still destroying... [id=i-0c9452e4f1637222e, 10s elapsed]
aws_instance.thedbadmin_test: Still destroying... [id=i-0c9452e4f1637222e, 20s elapsed]
aws_instance.thedbadmin_test: Still destroying... [id=i-0c9452e4f1637222e, 30s elapsed]
aws_instance.thedbadmin_test: Destruction complete after 36s

Destroy complete! Resources: 1 destroyed.
[root@thedbadmin terraform]# terraform show

[root@thedbadmin terraform]#

 

 

Once the above command is executed successfully you will see that AWS will start terminating your EC2 instance.

 

Terraform Command

 

[root@thedbadmin terraform]# terraform
Usage: terraform [-version] [-help] <command> [args]

The available commands for execution are listed below.
The most common, useful commands are shown first, followed by
less common or more advanced commands. If you're just getting
started with Terraform, stick with the common commands. For the
other commands, please read the help and docs before usage.

Common commands:
    apply              Builds or changes infrastructure
    console            Interactive console for Terraform interpolations
    destroy            Destroy Terraform-managed infrastructure
    env                Workspace management
    fmt                Rewrites config files to canonical format
    get                Download and install modules for the configuration
    graph              Create a visual graph of Terraform resources
    import             Import existing infrastructure into Terraform
    init               Initialize a Terraform working directory
    output             Read an output from a state file
    plan               Generate and show an execution plan
    providers          Prints a tree of the providers used in the configuration
    refresh            Update local state file against real resources
    show               Inspect Terraform state or plan
    taint              Manually mark a resource for recreation
    untaint            Manually unmark a resource as tainted
    validate           Validates the Terraform files
    version            Prints the Terraform version
    workspace          Workspace management

All other commands:
    0.12upgrade        Rewrites pre-0.12 module source code for v0.12
    debug              Debug output management (experimental)
    force-unlock       Manually unlock the terraform state
    push               Obsolete command for Terraform Enterprise legacy (v1)
    state              Advanced state management

 

I hope this article will useful and step by step.

Please like our FaceBook page and subscribe to the newsletter for future post and updates.

 

Read more

AWS MySQL RDS Database Creation using AWS CLI
How to Create MySQL Database with AWS RDS
How to connect to AWS MySQL / MariaDB RDS or EC2 database from MySQL WorkBench

How to Become Oracle apps DBA?
What does DBA mean?
150 Oracle DBA Interview Questions
Top 5 Future Technologies for Database Administrators (DBA) to learn in 2020
Top 5 Software Technology Trends in 2020 List