Cisco Intersight Service for HashiCorp Terraform (IST) addresses the challenge of securely connecting and configuring on-premises and hybrid environments to work with Terraform Cloud Business Tier. Leveraging Intersight Assist, users can integrate Terraform Cloud Business with Cisco Intersight, enabling secure communication between on-premises data centers and edge locations with the IaC platform. This means users can spend less time managing the end-to-end lifecycle of Terraform Cloud Agents, benefiting from native integration directly within Intersight, including upgrades and the ability to scale as demand grows.
In this example, we cover a simple use case to create a new compute cluster in existing data center and assign a new host (or a list of groups) to the given cluster. This use case will walk the user thought the following steps:
The list of host is passed as a Map like in the example below:
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
To add your Terraform Cloud credentials in Intersight you will need the following:
Login to Intersight and claim your Terraform Cloud target.
Once the target is created, the agent can be added assist.
Key | Value | Type |
---|---|---|
vsphere_server | 192.168.x.x | String |
vsphere_user | administrator@vsphere.local | String |
vsphere_password | ******** | String, Sensitive |
datacenter | RMLAB | String |
dc_cluster_name | RMLAB - zTF_Test | String |
h_username | root | String |
h_password | ******* | String, Sensitive |
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
To execute the Terraform code in your datacenter click on the Queue Plan Manually button
You will see one new compute cluster created and an host as part of thre cluster
The following output will be generated:
Get hands on experience with Intersight Service for Terraform in DevNet's Sandbox environment.
Cisco Intersight Service for HashiCorp Terraform
Learn how to provision virtual machines in vSphere using Intersight Service for Terraform.
Introduction to Intersight Service for Hashicorp Terraform
Provisioning VMs using Intersight Terraform Service for Hashicorp
Cisco Intersight Service for HashiCorp Terraform (IST) addresses the challenge of securely connecting and configuring on-premises and hybrid environments to work with Terraform Cloud Business Tier. Leveraging Intersight Assist, users can integrate Terraform Cloud Business with Cisco Intersight, enabling secure communication between on-premises data centers and edge locations with the IaC platform. This means users can spend less time managing the end-to-end lifecycle of Terraform Cloud Agents, benefiting from native integration directly within Intersight, including upgrades and the ability to scale as demand grows.
In this example, we cover a simple use case to create a new compute cluster in existing data center and assign a new host (or a list of groups) to the given cluster. This use case will walk the user thought the following steps: 1. Adding your Terraform Cloud for Business Tier Credentials 2. Adding your Terraform Cloud Agent 3. Executing Terraform Code to create
The list of host is passed as a Map like in the example below:
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
Note thumbprint is optional, but you will need it in case the Certificate Authority that signed the host certificate is not trusted.
To add your Terraform Cloud credentials in Intersight you will need the following:
Login to Intersight and claim your Terraform Cloud target.
Once the target is created, the agent can be added assist.
Key | Value | Type |
---|---|---|
vsphere_server | 192.168.x.x | String |
vsphere_user | administrator@vsphere.local | String |
vsphere_password | ******** | String, Sensitive |
datacenter | RMLAB | String |
dc_cluster_name | RMLAB - zTF_Test | String |
h_username | root | String |
h_password | ******* | String, Sensitive |
Input | Type | Description |
---|---|---|
hostname | Mandatory | The FQDN or IP address of the host |
license | Optional | A valid license key. Must be present in vSphere |
thumbprint | Optional | The SHA-1 host's thumbprint. You will need to specify in case the Certificate Authority that signed the host certificate is not trusted |
maintenance_mode | Optional | Default is true. |
Sample input:
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
To execute the Terraform code in your datacenter click on the Queue Plan Manually button
You will see one new compute cluster created and an host as part of thre cluster The following output will be generated:
Get hands on experience with Intersight Service for Terraform in DevNet's Sandbox environment.
Cisco Intersight Service for HashiCorp Terraform
Learn how to provision virtual machines in vSphere using Intersight Service for Terraform.
Introduction to Intersight Service for Hashicorp Terraform Provisioning VMs using Intersight Terraform Service for Hashicorp
Cisco Intersight Service for HashiCorp Terraform (IST) addresses the challenge of securely connecting and configuring on-premises and hybrid environments to work with Terraform Cloud Business Tier. Leveraging Intersight Assist, users can integrate Terraform Cloud Business with Cisco Intersight, enabling secure communication between on-premises data centers and edge locations with the IaC platform. This means users can spend less time managing the end-to-end lifecycle of Terraform Cloud Agents, benefiting from native integration directly within Intersight, including upgrades and the ability to scale as demand grows.
In this example, we cover a simple use case to create a new compute cluster in existing data center and assign a new host (or a list of groups) to the given cluster. This use case will walk the user thought the following steps: 1. Adding your Terraform Cloud for Business Tier Credentials 2. Adding your Terraform Cloud Agent 3. Executing Terraform Code to create
The list of host is passed as a Map like in the example below:
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
Note thumbprint is optional, but you will need it in case the Certificate Authority that signed the host certificate is not trusted.
To add your Terraform Cloud credentials in Intersight you will need the following:
Login to Intersight and claim your Terraform Cloud target.
Once the target is created, the agent can be added assist.
Key | Value | Type |
---|---|---|
vsphere_server | 192.168.x.x | String |
vsphere_user | administrator@vsphere.local | String |
vsphere_password | ******** | String, Sensitive |
datacenter | RMLAB | String |
dc_cluster_name | RMLAB - zTF_Test | String |
h_username | root | String |
h_password | ******* | String, Sensitive |
Input | Type | Description |
---|---|---|
hostname | Mandatory | The FQDN or IP address of the host |
license | Optional | A valid license key. Must be present in vSphere |
thumbprint | Optional | The SHA-1 host's thumbprint. You will need to specify in case the Certificate Authority that signed the host certificate is not trusted |
maintenance_mode | Optional | Default is true. |
Sample input:
servers = {
host1 = {
hostname = "192.168.100.146"
license = "LICENSE_KEY_HER"
thumbprint = "AA:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:EE"
maintenance_mode = true
}
host2 = {
hostname = "192.168.100.8"
license = "LICENSE_KEY_HER"
thumbprint = "FF:BB:CC:CC:DD:EE:A1:A2:A3:A4:B1:B2:B3:B4:12:34:56:1D:1E:FF"
maintenance_mode = false
}
}
To execute the Terraform code in your datacenter click on the Queue Plan Manually button
You will see one new compute cluster created and an host as part of thre cluster The following output will be generated:
Get hands on experience with Intersight Service for Terraform in DevNet's Sandbox environment.
Cisco Intersight Service for HashiCorp Terraform
Learn how to provision virtual machines in vSphere using Intersight Service for Terraform.
Introduction to Intersight Service for Hashicorp Terraform Provisioning VMs using Intersight Terraform Service for Hashicorp
Owner
Contributors
Categories
Products
IntersightProgramming Languages
HCLLicense
Code Exchange Community
Get help, share code, and collaborate with other developers in the Code Exchange community.View Community