Install Consul-Terraform-Sync

Refer to the introduction tutorial for details about installing, configuring, and running Consul-Terraform-Sync (CTS) on your local machine with the Terraform driver.

Install Consul-Terraform-Sync

To install CTS, find the appropriate package for your system and download it as a zip archive. For the CTS Enterprise binary, download a zip archive with the +ent metadata. CTS Enterprise requires a Consul Enterprise license to run.

Unzip the package to extract the binary named consul-terraform-sync. Move the consul-terraform-sync binary to a location available on your PATH.

Example:

  1. $ echo $PATH
  2. /usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin
  3. $ mv ./consul-terraform-sync /usr/local/bin/consul-terraform-sync

Once installed, verify the installation works by prompting the -version or -help option. The version outputted for the CTS Enterprise binary includes the +ent metadata.

  1. $ consul-terraform-sync -version

Install and run CTS as a Docker container.

For the CTS Enterprise, use the Docker image hashicorp/consul-terraform-sync-enterprise.

  1. $ docker pull hashicorp/consul-terraform-sync

Once installed, verify the installation works by prompting the -version or -help option. The version outputted for the CTS Enterprise image includes the +ent metadata.

  1. $ docker run --rm hashicorp/consul-terraform-sync -version

The CTS OSS binary is available in the HashiCorp tap, which is a repository of all our Homebrew packages.

  1. $ brew tap hashicorp/tap
  2. $ brew install hashicorp/tap/consul-terraform-sync

Run the following command to update to the latest version:

  1. $ brew upgrade hashicorp/tap/consul-terraform-sync

Once installed, verify the installation works by prompting the -version or -help option.

  1. $ consul-terraform-sync -version

Clone the repository from GitHub hashicorp/consul-terraform-sync to build and install the CTS OSS binary in your path $GOPATH/bin. Building from source requires git and Golang.

  1. $ git clone https://github.com/hashicorp/consul-terraform-sync.git
  2. $ cd consul-terraform-sync
  3. $ git checkout tags/<vX.Y.Z>
  4. $ go install

Once installed, verify the installation works by prompting the -version or -help option.

  1. $ consul-terraform-sync -version

Connect your Consul Cluster

CTS connects with your Consul cluster in order to monitor the Consul catalog for service changes. These service changes lead to downstream updates to your network devices. You can configure your Consul cluster in CTS with the Consul block. Below is an example:

  1. consul {
  2. address = "localhost:8500"
  3. token = "my-consul-acl-token"
  4. }

Connect your Network Device

CTS interacts with your network device through a network driver. For the Terraform network driver, CTS uses Terraform providers to make changes to your network infrastructure resources. You can reference existing provider docs on the Terraform Registry to configure each provider or create a new Terraform provider.

Once you have identified a Terraform provider for all of your network devices, you can configure them in CTS with a terraform_provider block for each network device. Below is an example:

  1. terraform_provider "fake-firewall" {
  2. address = "10.10.10.10"
  3. username = "admin"
  4. password = "password123"
  5. }

This provider is then used by task(s) to execute a Terraform module that will update the related network device.

Multiple Instances per Provider

You might have multiple instances of the same type of network device; for example, multiple instances of a firewall or load balancer. You can configure each instance with its own provider block and distinguish it by the alias meta-argument. See multiple provider configurations for more details and an example of the configuration.