We are a fairly small company (~350 employees) and a very small cloud team (myself and one other guy), so making use of automation where it’s cheap or free is imperative if we don’t want to get overwhelmed with the amount of work being thrown our way. One major challenge we faced was that for compliance reasons, we needed to have separate environments for development, QA, and production, but at the same time minimize the amount of time it takes to promote successful projects from that same development environment to QA, and then eventually from QA to prod.
This is the path we took.
First, we created Terraform workspaces for each one:
$ terraform workspace create dev
$ terraform workspace create qa
$ terraform workspace create prod
Next, we created Azure subscriptions for each environment in PowerShell:
Install-Module Az.Subscription -AllowPrerelease
Get-AzEnrollmentAccount
New-AzSubscription -OfferType MS-AZR-0148P -Name "IT.TechServices.DEV" -EnrollmentAccountObjectId <enrollmentAccountObjectId>
New-AzSubscription -OfferType MS-AZR-0148P -Name "IT.TechServices.QA" -EnrollmentAccountObjectId <enrollmentAccountObjectId>
New-AzSubscription -OfferType MS-AZR-0017P -Name "IT.TechServices.PRD" -EnrollmentAccountObjectId <enrollmentAccountObjectId>
Note: The OfferType property is different between the DEV
/QA
subscriptions and the PRD
subscription. This is because as part of our Enterprise Agreement with Microsoft, we have access to separate Dev/Test subscription pricing on the condition that we don’t run any production workloads in it. I am not sure if these values are universal, so if they don’t work for you, please check with your MS rep for the correct ones.
Then we created a sub-folder called environments
, and in that folder we created Terraform variable files for each respective environment (dev.tfvars
, qa.tfvars
, and prod.tfvars
), containing the appropriate Azure subscription ID in a variable called subscription_id
and the name of the environment in a variable called environment_name
. We then created a main.tf file with the contents variable subscription_id {}
and variable environment_name {}
. So, for example, in dev.tfvars
we would have subscription_id = "109b6c11-e163-477e-8453-7613249447c"
and environment_name = "dev"
and in qa.tfvars
we would have subscription_id = "95958666-8ab6-3980-828a-23f7382b9c5a"
and environment_name = "qa"
/terraform | +--+ /environments | | | +--+ dev.tfvars | +--+ qa.tfvars | +--+ prod.tfvars | +--+ main.tf
OK, let’s say we wanted to create some service called example-service and which required a resource group to start placing components in. If we wanted to do that in the Azure Canada Central region with some descriptive tags for sorting and billing, we would do the following:
resource "azurerm_resource_group" "example-service" { name = "example-service-${var.environment_name}" location = "canadacentral" tags = { environment = "${var.environment_name}" owner = "justin.smith" product = "example-product" department = "tech.services" } }
We’re using the ${var.environment_name}
placeholder which means that we only have to create a single .tf
file for each resource, and it will be named according to the environment we specify.
Finally, we have created a git repo for our entire Terraform collection, and have created 3 branches within it: dev
, qa
, and prod
, with each one having successively more restrictions on committing to it than the previous. We’ve also setup Azure DevOps build and release pipelines which are triggered each time code is committed to the respective branch.
For example, anyone on our team can deploy changes to the dev
branch because we don’t really care what happens in it. With the qa
branch, it requires at least one of either myself or my co-worker to approve the commit. We want to make sure that people aren’t just adding unnecessary resources to QA, but it’s still not “live” so restrictions are relaxed somewhat. The prod
branch requires the change ticket number from our ticketing system to be present in the Pull Request before being approved, ensuring that it has gone through the appropriate Change Approval Process before it becomes part of our daily operational management routine.
Now we’re ready to deploy! (Please note that the steps below simply replicate our pipelines in a manual way and will work for this demo. It is considered best practice to automate these steps once you’re comfortable with the process.)
First, we ensure we’re in the dev
workspace:
$ terraform workspace select dev
Then, to test to make sure that we’re not complete idiots, we run the Terraform plan, including the appropriate environment’s variable file:
$ terraform plan -var-file=environments/dev.tfvars
And assuming nothing is screaming, we apply it:
$ terraform apply -var-file=environments/dev.tfvars
We now have a resource group in our Azure DEV
subscription that we can use to deploy resources into, and named example-service-dev
!
Now let’s say we perform the various development tasks like creating the other resources via Terraform and we’ve applied them using the same method as above (using the ${var.environment_name}
placeholder at the end of each resource name), and we’re happy with how things look in the development environment. All we have to do is switch to the qa
workspace and plan/apply it, using the QA
variable file:
$ terraform workspace select qa
$ terraform plan -var-file=environments/qa.tfvars
$ terraform apply -var-file=environments/qa.tfvars
Now you’ve got example-service-qa
all set up and ready to go.
And finally, once your QA team has validated and tested the service, you just run it one more time, this time using the prod
environment settings:
$ terraform workspace select prod
$ terraform plan -var-file=environments/prod.tfvars
$ terraform apply -var-file=environments/prod.tfvars
And assuming that between each promotion (dev-to-qa, and qa-to-prod), the Terraform files were committed and promoted correctly, you should now have 3 fully functional environments (example-service-dev
, example-service-qa
, and example-service-prod
) with only one set of Terraform files!
In the next part, we’ll walk through building an Azure DevOps Build pipeline to begin automating the deployment so that we don’t need to be so hands-on every time a Terraform change is made!