In this tutorial, you learn how to store Terraform state in a Cloud Storage bucket.
By default, Terraform stores state
locally in a file named terraform.tfstate. This default configuration can
make Terraform usage difficult for teams when multiple users run Terraform at
the same time and each machine has its own understanding of the current
infrastructure.
To help you avoid such issues, this page shows you how to configure a remote state that points to a Cloud Storage bucket. Remote state is a feature of Terraform backends.
Objectives
This tutorial shows you how to do the following:
- Use Terraform to provision a Cloud Storage bucket to store Terraform state.
- Add templating in the Terraform configuration file to migrate the state from the local backend to the Cloud Storage bucket.
Costs
In this document, you use the following billable components of Google Cloud:
To generate a cost estimate based on your projected usage,
use the pricing calculator.
When you finish the tasks that are described in this document, you can avoid continued billing by deleting the resources that you created. For more information, see Clean up.
Cloud Storage incurs costs for storage, read and write operations, network egress, and replication.
The Cloud Storage bucket in this tutorial has Object Versioning enabled to keep the history of your deployments. Enabling Object Versioning increases storage costs, which you can mitigate by configuring Object Lifecycle Management to delete old state versions.
Before you begin
-
In the Google Cloud console, activate Cloud Shell.
Cloud Shell is preinstalled with Terraform.
If you're using a local shell, perform the following steps:
- Install Terraform.
-
Create local authentication credentials for your user account:
gcloud auth application-default login
If an authentication error is returned, and you are using an external identity provider (IdP), confirm that you have signed in to the gcloud CLI with your federated identity.
-
Create or select a Google Cloud project.
Roles required to select or create a project
- Select a project: Selecting a project doesn't require a specific IAM role—you can select any project that you've been granted a role on.
-
Create a project: To create a project, you need the Project Creator
(
roles/resourcemanager.projectCreator), which contains theresourcemanager.projects.createpermission. Learn how to grant roles.
-
Create a Google Cloud project:
gcloud projects create PROJECT_ID
Replace
PROJECT_IDwith a name for the Google Cloud project you are creating. -
Select the Google Cloud project that you created:
gcloud config set project PROJECT_ID
Replace
PROJECT_IDwith your Google Cloud project name.
-
Verify that billing is enabled for your Google Cloud project.
-
Enable the Cloud Storage API:
Roles required to enable APIs
To enable APIs, you need the Service Usage Admin IAM role (
roles/serviceusage.serviceUsageAdmin), which contains theserviceusage.services.enablepermission. Learn how to grant roles.gcloud services enable storage.googleapis.com
-
Grant roles to your user account. Run the following command once for each of the following IAM roles:
roles/storage.admingcloud projects add-iam-policy-binding PROJECT_ID --member="user:USER_IDENTIFIER" --role=ROLE
Replace the following:
PROJECT_ID: Your project ID.USER_IDENTIFIER: The identifier for your user account. For examples, see Represent workforce pool users in IAM policies.ROLE: The IAM role that you grant to your user account.
Alternately, you can create a custom IAM role that contains the following permissions:
storage.buckets.createstorage.buckets.liststorage.objects.getstorage.objects.createstorage.objects.deletestorage.objects.update
As a best practice, we recommend that access to the bucket and the state files stored there is controlled. Only a small set of users (for example, the main cloud administrator and the person acting as the alternative or backup administrator) should have admin permissions for the bucket. The other developers should have permissions to only write and read objects in the bucket.
Prepare the environment
Clone the GitHub repository containing Terraform samples:
git clone https://github.com/terraform-google-modules/terraform-docs-samples.git --single-branchChange to the working directory:
cd terraform-docs-samples/storage/remote_terraform_backend_template
Review the Terraform files
Review the
main.tffile:cat main.tfThe output is similar to the following
This file describes the following resources:
random_id: This is appended to the Cloud Storage bucket name to ensure a unique name for the Cloud Storage bucket.google_storage_bucket: The Cloud Storage bucket to store the state file. This bucket is configured to have the following properties:force_destroyis set tofalseto ensure that the bucket is not deleted if there are objects in it. This ensures that the state information in the bucket isn't accidentally deleted.public_access_preventionis set toenforcedto make sure the bucket contents aren't accidentally exposed to the public.uniform_bucket_level_accessis set totrueto allow controlling access to the bucket and its contents using IAM permissions instead of access control lists.versioningis enabled to ensure that earlier versions of the state are preserved in the bucket.
local_file: A local file. The contents of this file instructs Terraform to use Cloud Storage bucket as the remote backend once the bucket is created.
Provision the Cloud Storage bucket
Initialize Terraform:
terraform initWhen you run
terraform initfor the first time, the Cloud Storage bucket that you specified in themain.tffile doesn't exist yet, so Terraform initializes a local backend to store state in the local file system.Apply the configuration to provision resources described in the
main.tffile:terraform applyWhen prompted, enter
yes.When you run
terraform applyfor the first time, Terraform provisions the Cloud Storage bucket for storing the state. It also creates a local file; the contents of this file instruct Terraform to use the Cloud Storage bucket as the remote backend to store state.
Migrate state to Cloud Storage bucket
Migrate Terraform state to the remote Cloud Storage backend:
terraform init -migrate-stateTerraform detects that you already have a state file locally and prompts you to migrate the state to the new Cloud Storage bucket. When prompted, enter
yes.
After running this command, your Terraform state is stored in the Cloud Storage bucket. Terraform pulls the latest state from this bucket before running a command, and pushes the latest state to the bucket after running a command.
Clean up
To avoid incurring charges to your Google Cloud account for the resources used in this tutorial, either delete the project that contains the resources, or keep the project and delete the individual resources.
Delete the project
To avoid incurring charges to your Google Cloud account for the resources used on this page, follow these steps.
Open the
main.tffile.In the
google_storage_bucket.defaultresource, update the value offorce_destroytotrue.Apply the updated configuration:
terraform applyWhen prompted, enter
yes.Delete the state file:
rm backend.tfReconfigure the backend to be local:
terraform init -migrate-stateWhen prompted, enter
yes.Run the following command to delete the Terraform resources:
terraform destroyWhen prompted, enter
yes.