Turorial - Using GCP GKE with Terraform

imt

1. Objective

We are going to learn how to basically use GCP and GKE with Terraform.

Important
You need to install the Google Cloud CLI gcloud on your machine.

2. Create a project on GCP

Create a new project on the GCP web interface.

gcp1

gcp2

Give a name to the project and associate this project with your educational credits!

gcp3

2.1. Add a service account

We are going to create a "service account" to be able to interact with GCP outside the web interface. To do this go to the menu on the top left, go to IAM and then Service account.

service1

Create a new service account.

service2

Give it a name and continue.

service3

Give the service account the editor role and continue.

service4

service5

Your service account is created.

service6

2.2. Activate services

To be able to interact with GCP outside the web interface we also need to activate some services. In this tutorial we need:

  • Compute Engine API

  • Kubernetes Engine API

Go to the APIs library.

apis1

Activate the above APIs.

apis2

apis3

Tip
As the set of services offered by GCP (and AWS) is very large and sometimes difficult to understand, very often what we do in practice is trying to apply a terraform code and encounter an error indicating that a given service has to be activated.

3. GCP with Terraform

3.1. Fichier providers.tf

Create a file providers.tf in your working directory. We are going to use this file to declare the providers to use in our tutorial.

terraform {
  required_providers {
    google = {
      source = "hashicorp/google"
      version = "5.6.0"
    }
  }
}

In the above code we indicate to terraform that we want to use the provider hashicorp/google from the registry and that we want to use the version 5.6.0. Details on this provider are given at https://registry.terraform.io/providers/hashicorp/google/latest/docs

We are now going to configure the required provider. To this purpose, in the same file add the following lines:

provider "google" {
  project = "project-id"
  region  = "europe-west9"
  zone    = "europe-west9-a"
}

We create a block to configure the provider google declared as a required provider before. In this block we configure three pieces of information: the identifier of the GCP project that we have created; the region and the zone to use. GCP divide its resources in regions and each region has at least one zone: https://cloud.google.com/compute/docs/regions-zones

3.2. Credentials

We will see one way of handling credentials for the tutorial. Clearly companies probably handle in a much more complex and secure way their credentials.

3.2.1. Using a json key

In the GCP interface go to IAM then service account, click on the service account you have created before. Go to the keys tab and create a new key. Select the json format and terminate the creation. A json key file will be downloaded to your laptop. We will use this key file.

key1

key2

Modify the google provider configuration with the following information:

provider "google" {
  project = "project-id"
  region  = "europe-west9"
  zone    = "europe-west9-a"
  credentials = file("downloaded_file.json")
}

The roles granted for this key are the ones defined for the service account (editor in our case).

3.3. Using variables in the provider configuration

As the project name will be used in many different places in this tutorial, using variables is a better practice. We also apply variables for the region and the zone.

Create a terraform.tfvars file with the following content:

project_id = "project-id"
region     = "europe-west9"
zone       = "europe-west9-a"

Declare the following variables at the beginning of the file providers.tf.

variable "project_id" {
  description = "project id"
}

variable "region" {
  description = "region"
}

variable "zone" {
  description = "zone"
}

Modify the configuration of the provider as follows:

provider "google" {
  project = var.project_id
  region  = var.region
  zone = var.zone
  credentials = file("downloaded_file.json")
}

3.4. Create a VPC (virtual private cloud)

To create a VPC we have to create a terraform resource of type google_compute_network. This type is defined by the google provider (see https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/compute_network)

A virtual private cloud (VPC) is a secure, isolated private cloud hosted within a public cloud. It combines the scalability and convenience of public cloud computing with the data isolation of private cloud computing. GCP VPC provides connectivity for Compute Engine VM instances, Google Kubernetes Engine clusters, App Engine etc.

Create a new file vpc.tf and copy the following content:

resource "google_compute_network" "myvpc" {
  name                    = "${var.project_id}-vpc"
  auto_create_subnetworks = "true"
}

The name of the VPC in GCP will be project_id-vpc. The VPC will automatically create one subnetwork for all regions across a predefined address range.

3.5. Init and apply

Open a terminal in your working directory and execute terraform init. You should see the following output.

Initializing the backend...

Initializing provider plugins...
- Finding hashicorp/google versions matching "5.6.0"...
- Installing hashicorp/google v5.6.0...
- Installed hashicorp/google v5.6.0 (signed by HashiCorp)

Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.

Terraform has been successfully initialized!

You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.

If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.

As indicated in the output the init command:

  • downloads the required providers,

  • creates a lock file.

Now that terraform is initialized for your project, execute the command terraform plan in the working directory. This command computes the set of actions to perform on your infrastructure and show the result. When a resource has to be deleted a - is used, when a resource has to be created a + is used. When a resource is deleted and created again -/+ is used.

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create

Terraform will perform the following actions:

  # google_compute_network.myvpc will be created
  + resource "google_compute_network" "myvpc" {
      + auto_create_subnetworks                   = true
      + delete_default_routes_on_create           = false
      + gateway_ipv4                              = (known after apply)
      + id                                        = (known after apply)
      + internal_ipv6_range                       = (known after apply)
      + mtu                                       = (known after apply)
      + name                                      = "tuto-terraform-hcoullon-vpc"
      + network_firewall_policy_enforcement_order = "AFTER_CLASSIC_FIREWALL"
      + project                                   = "tuto-terraform-hcoullon"
      + routing_mode                              = (known after apply)
      + self_link                                 = (known after apply)
    }

Plan: 1 to add, 0 to change, 0 to destroy.

In the above output Terraform shows that a VPC will be created. Note that some information will be known only after the apply.

If the plan is ok with your expectations you can run terraform apply. This command will first show you the plan again, and ask you to confirm the changes to apply. Answer yes if everything is ok.

Plan: 1 to add, 0 to change, 0 to destroy.

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

google_compute_network.myvpc: Creating...
google_compute_network.myvpc: Still creating... [10s elapsed]
google_compute_network.myvpc: Still creating... [20s elapsed]
google_compute_network.myvpc: Still creating... [30s elapsed]
google_compute_network.myvpc: Still creating... [40s elapsed]
google_compute_network.myvpc: Creation complete after 43s [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc]

3.6. State file

Now that we have applied a first Terraform code with the creation of resources in our infrastructure, the file terraform.tfstate has been created. You can open and parse this file to check the state of your infrastructure.

Important
It is important to not modify the terraform.tfstate yourself. This file is exclusively created and modified by Terraform. As it will be asked in the practical session it is recommended to store the terraform.tfstate file in a Cloud storage with a lock mechanism to ensure the safety of this file.
Tip
Also note that it may be useful to use the tfstate file to have an overview of available parameters a resource (in addition to the provider documentation).

You should see the following elements among others:

{
      "mode": "managed",
      "type": "google_compute_network",
      "name": "myvpc",
      "provider": "provider[\"registry.terraform.io/hashicorp/google\"]",
      "instances": [
        {
          "schema_version": 0,
          "attributes": {
            "auto_create_subnetworks": true,
            "delete_default_routes_on_create": false,
            "description": "",
            "enable_ula_internal_ipv6": false,
            "gateway_ipv4": "",
            "id": "projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc",
            "internal_ipv6_range": "",
            "mtu": 0,
            "name": "tuto-terraform-hcoullon-vpc",
            "network_firewall_policy_enforcement_order": "AFTER_CLASSIC_FIREWALL",
            "project": "tuto-terraform-hcoullon",
            "routing_mode": "REGIONAL",
            "self_link": "https://www.googleapis.com/compute/v1/projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc",
            "timeouts": null
          },
          "sensitive_attributes": [],
          "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjoxMjAwMDAwMDAwMDAwLCJkZWxldGUiOjEyMDAwMDAwMDAwMDAsInVwZGF0ZSI6MTIwMDAwMDAwMDAwMH19"
        }
      ]
    }

3.7. Changes

Go to the VPC interface of GCP to see the creation of the VPC. Click on the VPC to see that a subnetwork has been created on all regions. This is not adapted to our project where we want to use a single region.

We apply the following changes to our infrastructure.

resource "google_compute_network" "myvpc" {
  name                    = "${var.project_id}-vpc"
  auto_create_subnetworks = "false"
}
resource "google_compute_subnetwork" "mysubnet" {
  name          = "${var.project_id}-subnet"
  region        = var.region
  network       = google_compute_network.myvpc.name
  ip_cidr_range = "10.10.0.0/24"
}

We set the auto-create-subnetworks to false and explicitly create a subnetwork by creating a resource of type google_compute_subnetwork to which we give a name (in GCP), a region, our myvpc resource and the address range to apply.

Execute the command terraform plan:

Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols:
  + create
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # google_compute_network.myvpc must be replaced
-/+ resource "google_compute_network" "myvpc" {
      ~ auto_create_subnetworks                   = true -> false # forces replacement
      - enable_ula_internal_ipv6                  = false -> null
      + gateway_ipv4                              = (known after apply)
      ~ id                                        = "projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc" -> (known after apply)
      + internal_ipv6_range                       = (known after apply)
      ~ mtu                                       = 0 -> (known after apply)
        name                                      = "tuto-terraform-hcoullon-vpc"
      ~ routing_mode                              = "REGIONAL" -> (known after apply)
      ~ self_link                                 = "https://www.googleapis.com/compute/v1/projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc" -> (known after apply)
        # (3 unchanged attributes hidden)
    }

  # google_compute_subnetwork.mysubnet will be created
  + resource "google_compute_subnetwork" "mysubnet" {
      + creation_timestamp         = (known after apply)
      + external_ipv6_prefix       = (known after apply)
      + fingerprint                = (known after apply)
      + gateway_address            = (known after apply)
      + id                         = (known after apply)
      + internal_ipv6_prefix       = (known after apply)
      + ip_cidr_range              = "10.10.0.0/24"
      + ipv6_cidr_range            = (known after apply)
      + name                       = "tuto-terraform-hcoullon-subnet"
      + network                    = "tuto-terraform-hcoullon-vpc"
      + private_ip_google_access   = (known after apply)
      + private_ipv6_google_access = (known after apply)
      + project                    = "tuto-terraform-hcoullon"
      + purpose                    = (known after apply)
      + region                     = "europe-west9"
      + secondary_ip_range         = (known after apply)
      + self_link                  = (known after apply)
      + stack_type                 = (known after apply)
    }

Plan: 2 to add, 0 to change, 1 to destroy.

Now execute the command terraform apply and confirm the changes.

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: yes

google_compute_network.myvpc: Destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc]
google_compute_network.myvpc: Still destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc, 10s elapsed]
google_compute_network.myvpc: Still destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc, 20s elapsed]
google_compute_network.myvpc: Still destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc, 30s elapsed]
google_compute_network.myvpc: Still destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc, 40s elapsed]
google_compute_network.myvpc: Still destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc, 50s elapsed]
google_compute_network.myvpc: Still destroying... [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc, 1m0s elapsed]
google_compute_network.myvpc: Destruction complete after 1m3s
google_compute_network.myvpc: Creating...
google_compute_network.myvpc: Still creating... [10s elapsed]
google_compute_network.myvpc: Still creating... [20s elapsed]
google_compute_network.myvpc: Creation complete after 22s [id=projects/tuto-terraform-hcoullon/global/networks/tuto-terraform-hcoullon-vpc]
google_compute_subnetwork.mysubnet: Creating...
google_compute_subnetwork.mysubnet: Still creating... [10s elapsed]
google_compute_subnetwork.mysubnet: Still creating... [20s elapsed]
google_compute_subnetwork.mysubnet: Creation complete after 22s [id=projects/tuto-terraform-hcoullon/regions/europe-west9/subnetworks/tuto-terraform-hcoullon-subnet]

Apply complete! Resources: 2 added, 0 changed, 1 destroyed.

Now if you click on the new VPC you will see that the subnetwork is applied to a single region.