2020-10-14 20:08:42 -04:00
---
stage: Configure
group: Configure
2020-11-26 01:09:20 -05:00
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#assignments
2020-10-14 20:08:42 -04:00
---
2021-04-21 08:09:16 -04:00
# Terraform state administration **(FREE)**
2020-03-27 08:07:43 -04:00
> [Introduced](https://gitlab.com/groups/gitlab-org/-/epics/2673) in GitLab 12.10.
GitLab can be used as a backend for [Terraform ](../user/infrastructure/index.md ) state
files. The files are encrypted before being stored. This feature is enabled by default.
The storage location of these files defaults to:
- `/var/opt/gitlab/gitlab-rails/shared/terraform_state` for Omnibus GitLab installations.
- `/home/git/gitlab/shared/terraform_state` for source installations.
These locations can be configured using the options described below.
2021-02-12 10:08:43 -05:00
Use [external object storage ](https://docs.gitlab.com/charts/advanced/external-object-storage/#lfs-artifacts-uploads-packages-external-diffs-pseudonymizer-terraform-state-dependency-proxy ) configuration for [GitLab Helm chart ](https://docs.gitlab.com/charts/ ) installations.
2021-03-08 13:09:12 -05:00
## Disabling Terraform state
To disable terraform state site-wide, follow the steps below.
2021-05-20 11:10:13 -04:00
A GitLab administrator may want to disable Terraform state to reduce disk space or if Terraform is not used in your instance.
2021-03-08 13:09:12 -05:00
To do so, follow the steps below according to your installation's type.
**In Omnibus installations:**
1. Edit `/etc/gitlab/gitlab.rb` and add the following line:
```ruby
gitlab_rails['terraform_state_enabled'] = false
```
1. Save the file and [reconfigure GitLab ](restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to take effect.
**In installations from source:**
1. Edit `/home/git/gitlab/config/gitlab.yml` and add or amend the following lines:
```yaml
terraform_state:
enabled: false
```
1. Save the file and [restart GitLab ](restart_gitlab.md#installations-from-source ) for the changes to take effect.
2020-03-27 08:07:43 -04:00
## Using local storage
2021-01-06 01:10:11 -05:00
The default configuration uses local storage. To change the location where
Terraform state files are stored locally, follow the steps below.
2020-03-27 08:07:43 -04:00
**In Omnibus installations:**
1. To change the storage path for example to `/mnt/storage/terraform_state` , edit
`/etc/gitlab/gitlab.rb` and add the following line:
```ruby
gitlab_rails['terraform_state_storage_path'] = "/mnt/storage/terraform_state"
```
2020-04-21 14:09:31 -04:00
1. Save the file and [reconfigure GitLab ](restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to take effect.
2020-03-27 08:07:43 -04:00
**In installations from source:**
1. To change the storage path for example to `/mnt/storage/terraform_state` , edit
`/home/git/gitlab/config/gitlab.yml` and add or amend the following lines:
```yaml
terraform_state:
enabled: true
storage_path: /mnt/storage/terraform_state
```
2020-04-21 14:09:31 -04:00
1. Save the file and [restart GitLab ](restart_gitlab.md#installations-from-source ) for the changes to take effect.
2020-03-27 08:07:43 -04:00
2021-01-28 01:08:59 -05:00
## Using object storage **(FREE SELF)**
2020-03-27 08:07:43 -04:00
2020-12-10 16:10:15 -05:00
Instead of storing Terraform state files on disk, we recommend the use of [one of the supported object
storage options](object_storage.md#options). This configuration relies on valid credentials to
2020-03-27 08:07:43 -04:00
be configured already.
2020-04-09 11:09:29 -04:00
[Read more about using object storage with GitLab ](object_storage.md ).
2020-03-27 08:07:43 -04:00
### Object storage settings
The following settings are:
- Nested under `terraform_state:` and then `object_store:` on source installations.
- Prefixed by `terraform_state_object_store_` on Omnibus GitLab installations.
| Setting | Description | Default |
|---------|-------------|---------|
2020-05-19 17:08:05 -04:00
| `enabled` | Enable/disable object storage | `false` |
2020-11-18 19:09:41 -05:00
| `remote_directory` | The bucket name where Terraform state files are stored | |
2020-03-27 08:07:43 -04:00
| `connection` | Various connection options described below | |
2021-03-18 14:09:09 -04:00
### Migrate to object storage
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/247042) in GitLab 13.9.
To migrate Terraform state files to object storage, follow the instructions below.
- For Omnibus package installations:
```shell
gitlab-rake gitlab:terraform_states:migrate
```
- For source installations:
```shell
sudo -u git -H bundle exec rake gitlab:terraform_states:migrate RAILS_ENV=production
```
For GitLab 13.8 and earlier versions, you can use a workaround for the Rake task:
1. Open the GitLab [Rails console ](operations/rails_console.md ).
1. Run the following commands:
```ruby
Terraform::StateUploader.alias_method(:upload, :model)
Terraform::StateVersion.where(file_store: ::ObjectStorage::Store::LOCAL). find_each(batch_size: 10) do |terraform_state_version|
puts "Migrating: #{terraform_state_version.inspect}"
terraform_state_version.file.migrate!(::ObjectStorage::Store::REMOTE)
end
```
2020-03-27 08:07:43 -04:00
### S3-compatible connection settings
2020-07-12 23:09:12 -04:00
See [the available connection settings for different providers ](object_storage.md#connection-settings ).
2020-03-27 08:07:43 -04:00
**In Omnibus installations:**
1. Edit `/etc/gitlab/gitlab.rb` and add the following lines; replacing with
the values you want:
```ruby
gitlab_rails['terraform_state_object_store_enabled'] = true
2020-07-15 11:09:21 -04:00
gitlab_rails['terraform_state_object_store_remote_directory'] = "terraform"
2020-03-27 08:07:43 -04:00
gitlab_rails['terraform_state_object_store_connection'] = {
'provider' => 'AWS',
'region' => 'eu-central-1',
'aws_access_key_id' => 'AWS_ACCESS_KEY_ID',
'aws_secret_access_key' => 'AWS_SECRET_ACCESS_KEY'
}
```
2020-12-04 16:09:29 -05:00
NOTE:
2020-03-27 08:07:43 -04:00
If you are using AWS IAM profiles, be sure to omit the AWS access key and secret access key/value pairs.
```ruby
gitlab_rails['terraform_state_object_store_connection'] = {
'provider' => 'AWS',
'region' => 'eu-central-1',
'use_iam_profile' => true
}
```
2020-04-21 14:09:31 -04:00
1. Save the file and [reconfigure GitLab ](restart_gitlab.md#omnibus-gitlab-reconfigure ) for the changes to take effect.
2021-01-22 01:08:52 -05:00
1. Migrate any existing local states to the object storage (GitLab 13.9 and later):
```shell
gitlab-rake gitlab:terraform_states:migrate
```
2020-03-27 08:07:43 -04:00
**In installations from source:**
1. Edit `/home/git/gitlab/config/gitlab.yml` and add or amend the following
lines:
```yaml
terraform_state:
enabled: true
object_store:
enabled: true
2020-07-15 11:09:21 -04:00
remote_directory: "terraform" # The bucket name
2020-03-27 08:07:43 -04:00
connection:
provider: AWS # Only AWS supported at the moment
2021-03-03 07:11:16 -05:00
aws_access_key_id: AWS_ACCESS_KEY_ID
2020-03-27 08:07:43 -04:00
aws_secret_access_key: AWS_SECRET_ACCESS_KEY
region: eu-central-1
```
2020-04-21 14:09:31 -04:00
1. Save the file and [restart GitLab ](restart_gitlab.md#installations-from-source ) for the changes to take effect.
2021-01-22 01:08:52 -05:00
1. Migrate any existing local states to the object storage (GitLab 13.9 and later):
```shell
sudo -u git -H bundle exec rake gitlab:terraform_states:migrate RAILS_ENV=production
```