Terraform Setup and VPC Subnet Creation

In this Terraform and Ansible demo for AWS you can find all the code needed to create a VPC (Virtual Private Cloud) in AWS (Amazon Web Services) with an EC2 (Elastic Compute) instance connected to MariaDB database running in RDS (Relational Database Services) using a single Terraform 0.12 plan and installing and configuring an Ubuntu server with Nginx, PHP, and Let’s Encrypt to run WordPress with Ansible.
For an introduction to AWS, see AWS VPC Basic Elements.
This VPC can be used to install a simple web application like WordPress using Ansible, which will be shown in another post.
The demo follows some IT Wonder Lab best practices using only* resources included in the AWS free tier plan.
A real infrastructure should make use of some resources that are not included in the AWS free tier plan like NAT instances and IPSec VPNs. It should also have different VPCs or at least subnets for each environment, reuse Terraform modules, store the tfstate in a shared location, …
* The DNS zone is not included in AWS Free Tier.
Updates:
- 23 Jun 2020: Updated to Terraform 0.12
General Diagram
The diagram shows the main elements that will be created by Terraform:
- 1 VPC
- 4 subnets
- 4 security groups
- 3 route tables
- 1 EC2 instance
- 1 Internet Gateway
- 1 Route 53 Hosted zone
- 1 DB Subnet Group
- 1 RDS MariaDB

Apply
The following asciicast shows how Terraform creates all the resources in AWS. Applying the whole plan takes around 10 minutes * (AWS RDS MariaDb creation takes more than 7 minutes).
Click on the play button to see the execution of Terraform plan.
* The asciicast has been edited to show everything in 2 minutes.
Prerequisites
A workstation running an operating system compatible with the required software. We will use Ubuntu for the demo.
- Create a new AWS account for the demo.
- Create an AWS IAM User for Demos.
- Make sure you understand the AWS VPC Basic Elements.
- Install the required software to run the demo:
- Terraform 0.12
- GIT
- Atom, Visual Studio Code or your favorite text editor
- Read Use your public Internet IP address in Terraform.
- Read Avoiding AWS instance destroy with Terraform.
- Download the source code for the demo from IT Wonder Lab public GitHub repository.
- Make whatismyip.sh executable using:
chmod 764 whatismyip.sh
File Layout
Terraform configuration files are used to describe infrastructure and to set variables, most of the examples found on the Internet using a single file or at most some few files to configure all the infrastructure.
Best Practice: Terraform File Naming and Layout
On this example to create an AWS VPC with an EC2 Instance and a MariaDB RDS Data Base you will find a Terraform layout that follows our best practice recommendation for defining multiple environments on the same VPC using Terraform modules.
The example has the following files:
Name | Description |
---|---|
modules | Directory containing Terraform modules |
aws_ds_aws_ami.tf | Data source to get the ID of the latests AMI for selected OS |
aws_ec2_pro_wp.tf | Word Press Server, associated security groups, DNS registration |
aws_ec2_pro_wp_vars.tf | Word Press Server variables |
aws_internet_gateway.tf | Internet Gateway |
aws_internet_gateway_vars.tf | Internet Gateway variables |
aws_rds_pro_mariadb_01.tf | RDS MariaDB and associated security groups |
aws_rds_pro_mariadb_01_vars.tf | RDS MariaDB variables |
aws_rds_sn_pro.tf | RDS subnets |
aws_rds_sn_pro_vars.tf | RDS subnets variables |
aws_route53.tf | Route 53 (DNS) |
aws_route53_vars.tf | Route 53 (DNS) variables |
aws_sec_group_ec2_default.tf | Default security group to assign to all EC2 instances |
aws_sec_group_ec2_default_vars.tf | Default EC2 security group variables |
aws_sec_group_rds_mariadb_default.tf | Default security group to assign to all RDS MariaDB instances |
aws_sec_group_rds_mariadb_default_vars.tf | Default RDS security group variables |
aws_vpc_routing.tf | Routing tables for subnets |
aws_vpc_routing_vars.tf | Routing tables for subnets variables |
aws_vpc_subnets.tf | VPC subnets |
aws_vpc_subnets_vars.tf | VPC subnets variables |
aws_vpc.tf | VPC |
aws_vpc_vars.tf | VPC variables |
external_whatismyip.tf | Obtains current Public Internet IP for usage in firewall rules |
provider_aws.tf | Defines AWS provider |
provider_aws_vars.tf | Defines AWS provider variables |
terraform.tf | Defines terraform |
terraform.tfvars | Values for all the variables in the demo |
terraform_vars.tf | Defines terraform variables |
whatismyip.sh | Script to obtain current Public Internet IP |
.gitignore | Defines the file and patterns that should not be pushed to git repository |
.terraform | Working directory created by Terraform |
Configure Terraform AWS Provider
Terraform needs to have the Account Id and the credentials for the AWS account that will be used to interact with AWS API.
AWS credentials will be stored outside Terraform in ~/.aws/credentials, using the Shared Credentials file option for Terraform.
Best Practice: Terraform and AWS credentials
Terraform AWS provider has other options for credential configuration, but this one is an IT Wonder Lab best practice as it stores the credentials outside the Terraform configuration, therefore reducing the risk of credential leaking and it also allows each user that checkouts the code to run the Terraform plans with its own credentials.
Create or open the credentials file and add the following content:
[ditwl_infradmin] aws_access_key_id=A1B2C3D4E5F6G7H8I9J0 aws_secret_access_key=QwertYuiopASDFGHJKL123456789sadfghjkvcbn
The profile name is surrounded by square brackets [ditwl_infradmin] and will be the name used in Terraform configuration to identify the credentials to use.
aws_access_key_id and aws_secret_access_key are the ones obtained when creating the AWS IAM User for Demos.
You will also need to set other configuration related to AWS credentials in the file terraform.tfvars located in the root directory of the checked example:
#------------------------ # PROVIDERS #------------------------ # DEFAULT AWS provider_default_aws_profile = "ditwl_infradmin" provider_default_aws_region = "us-east-1" provider_default_aws_account_id = ["134567891011"] provider_default_aws_shared_credentials_file = "~/.aws/credentials" provider_default_aws_key_file = "~/keys/ditwl_kp_infradmin.pem"
- provider_default_aws_profile: Corresponds to the profile name used in the credentials file.
- provider_default_aws_region: us-east-1 corresponds to US East (N. Virginia) and it is the cheapest region. See choosing your AWS Region wisely.
- provider_default_aws_account_id: it is the AWS account id, see Create a new AWS account for the demo.
- provider_default_aws_shared_credentials_file: the full path to the credentials file. Default path “~/.aws/credentials” is used.
- provider_default_aws_key_file: this is the full path to a private key file used for Terraform instance provisioning. It will be used by Ansible to connect to the instance to install the needed software.
The values from terraform.tfvars are used in provider_aws.tf to configure the AWS Provider.
Setting the allowed_account_ids prevents Terraform from applying changes to a different AWS account.
Best Practice: Redundancy in Configuration Files
IT Wonder Lab best practice is to specify the provider_default_aws_account_id in the terraform.tfvars and use it to fill the allowed_account_ids in the AWS provider.
The aws_access_key_id of an IAM user is used for AWS to identify the Account ID that the user belongs to, and all operations are applied to that Account, so there is technically no need to specify the Account ID again.
This is a intended redundancy, as many others that you will find in IT Wonder Lab, its a double check on the account to prevent catastrophic errors.
provider "aws" { shared_credentials_file = pathexpand(var.provider_default_aws_shared_credentials_file) profile = var.provider_default_aws_profile region = var.provider_default_aws_region allowed_account_ids = var.provider_default_aws_account_id version = "~> 2.0" }
VPC Subnet Creation
AWS creates a default VPC for each AWS Region when an account is created.
Deleting the default VPC is irreversible and that you will need to contact AWS or recreate the account if you want to have a default VPC again.
Terraform provides a data source that lets you “adopt” the default VPC but that will not be used.
Best Practice: Terraform managed AWS VPC
An IT Wonder Lab best practice is to delete the default VPC and recreate everything using Terraform.
If you are going to be responsible for the Cloud Infrastructure, better know everything about it.
You have to be in control of every piece of the infrastructure (like the chosen IP Range) and I like to be aware of all the details.
The VPC will be created using the 172.17.32.0/19 private IPv4 address range (8192 IPs) divided into many smaller subnets of 512 hosts (sub netmask /23). See ipv4 Subnet Calculator.
terraform.tfvars
#------------------------ # VPC #------------------------ aws_vpc_tag_name = "ditwl-vpc" aws_vpc_block = "172.17.32.0/19" #172.17.32.1 - 172.16.67.254
Best Practice: Multiple AWS Availability Zones
An IT Wonder Lab best practice is distribute sub nets in more than one Availability Zone and have private and public zones.
For the demo, we will only provision 4 subnets.

Instance placement has to take into account that data transfer between different Availability Zones has a cost, therefore achieving high availability by distributing infrastructure between Availability Zones has an impact on the total budget.
CIDR | Host Address Range | Terraform name | Description |
---|---|---|---|
172.17.32.0/23 | 172.17.32.1 – 172.17.33.254 | aws_sn_za_pro_pub_32 | Zone: A Env: PRO Type: PUBLIC Code: 32 |
172.17.34.0/23 | 172.17.34.1 – 172.17.35.254 | aws_sn_za_pro_pri_34 | Zone: A Env: PRO Type: PRIVATE Code: 34 |
172.17.36.0/23 | 172.17.36.1 – 172.17.37.254 | aws_sn_zb_pro_pub_36 | Zone: B Env: PRO Type: PUBLIC Code: 36 |
172.17.38.0/23 | 172.17.38.1 – 172.17.39.254 | aws_sn_zb_pro_pri_38 | Zone: B Env: PRO Type: PRIVATE Code: 38 |
172.17.40.0/23 | 172.17.40.1 – 172.17.41.254 | aws_sn_z?_pr?_p??_40 | Not in use |
172.17.42.0/23 | 172.17.42.1 – 172.17.43.254 | aws_sn_z?_pr?_p??_42 | Not in use |
172.17.44.0/23 | 172.17.44.1 – 172.17.45.254 | aws_sn_z?_pr?_p??_44 | Not in use |
172.17.46.0/23 | 172.17.46.1 – 172.17.47.254 | aws_sn_z?_pr?_p??_46 | Not in use |
172.17.48.0/23 | 172.17.48.1 – 172.17.49.254 | aws_sn_z?_pr?_p??_48 | Not in use |
172.17.50.0/23 | 172.17.50.1 – 172.17.51.254 | aws_sn_z?_pr?_p??_50 | Not in use |
172.17.52.0/23 | 172.17.52.1 – 172.17.53.254 | aws_sn_z?_pr?_p??_52 | Not in use |
172.17.54.0/23 | 172.17.54.1 – 172.17.55.254 | aws_sn_z?_pr?_p??_54 | Not in use |
172.17.56.0/23 | 172.17.56.1 – 172.17.57.254 | aws_sn_z?_pr?_p??_56 | Not in use |
172.17.58.0/23 | 172.17.58.1 – 172.17.59.254 | aws_sn_z?_pr?_p??_58 | Not in use |
172.17.60.0/23 | 172.17.60.1 – 172.17.61.254 | aws_sn_z?_pr?_p??_60 | Not in use |
172.17.62.0/23 | 172.17.62.1 – 172.17.63.254 | aws_sn_z?_pr?_p??_62 | Not in use |
Best Practice: Terraform Naming Patterns
IT Wonder Lab best practice is to name each Terraform variable following a pattern of elements that indicate the provider, resource, environment, visibility and unique ID.
Terraform variable naming patterns
For subnets variables the pattern used is, lowercase with the following elements separated by underscores:
- Provider: a prefix specifying the name of the provider, in this case aws
- Resource: a short name identifying the resource, in this case sn stands for subnet
- Environment: for resources that are not to be shared between environments, a 3 letter acronym for the environment:
- pro: production
- pre: preproduction
- dev: development
- Visibility: for resources that can be either public or private, a 3 letter acronym for the visibility:
- pub: for public resources
- pri: for private resources
- Unique ID: a unique number related to resource. In this case the third octet in the IP address (172.17.NN.0) is used because it is different in all the subnets. The idea behind having a unique ID on the names is to be able to see errors from copy/paste easily by detecting anti patterns.
Example:
aws_sn_za_pro_pub_32 = { …}
Terraform value naming patterns
The name of the resource follows almost the same pattern as the variable but replaces the provider with a prefix and uses a dash as separator:
- Cloud: a prefix specifying the unique name of this cloud across all available clouds and providers.
In this case the prefix will be: ditwl that stands for Demo IT Wonder Lab in lowercase.
It is important to have this unique prefix as external elements (like Monitoring System) will have to be able to differentiate between many clouds.
Example:
name =”ditwl-sn-za-pro-pub-32″
Using a consistent pattern allows the variable name to have all needed information to understand its purpose making the description almost unnecessary.
Terraform Subnet Definition
terraform.tfvars
#------------------------ # SUBNETS #------------------------ #------------------------ # For EC2 instances #------------------------ #Zone: A, Env: PRO, Type: PUBLIC, Code: 32 aws_sn_za_pro_pub_32={ cidr ="172.17.32.0/23" #172.17.32.1 - 172.17.33.254 name ="ditwl-sn-za-pro-pub-32" az ="us-east-1a" public = "true" } #Zone: A, Env: PRO, Type: PRIVATE, Code: 34 aws_sn_za_pro_pri_34={ cidr = "172.17.34.0/23" #172.17.34.1 - 172.17.35.254 name = "ditwl-sn-za-pro-pri-34" az = "us-east-1a" public = "false" } #Zone: B, Env: PRO, Type: PUBLIC, Code: 36 aws_sn_zb_pro_pub_36={ cidr = "172.17.36.0/23" #172.17.36.1 - 172.17.37.254 name = "ditwl-sn-zb-pro-pub-36" az = "us-east-1b" public = "false" } #Zone: B, Env: PRO, Type: PRIVATE, Code: 38 aws_sn_zb_pro_pri_38={ cidr = "172.17.38.0/23" #172.17.38.1 - 172.17.39.254 name = "ditwl-sn-zb-pro-pri-38" az = "us-east-1b" public = "false" }
Plan
Run the Terraform plan command often as it is the best way to check that everything is correct. Some errors are difficult to identify, our recommendation is to make changes to the Terraform configuration in small doses and test the plan.
The following asciicast shows the elements that Terraform will create in AWS.
Click on the play button to see the execution of Terraform plan.
How To Debug Terraform
Terraform uses the value from environment variable TF_LOG to define the LOG level. Available values are TRACE, DEBUG, INFO, WARN o ERROR. Additionally you can specify a destination file for the log by setting the environment variable TF_LOG_PATH to the full path of the desired destination.
Set the debug variables and execute Terraform plan to see the output:
$export TF_LOG=DEBUG $# Optional export TF_LOG_PATH=~/debug.txt $terraform plan 2020/07/31 20:19:01 [WARN] Log levels other than TRACE are currently unreliable, and are supported only for backward compatibility. Use TF_LOG=TRACE to see Terraform's internal logs. ---- 2020/07/31 20:19:01 [INFO] Terraform version: 0.12.26 2020/07/31 20:19:01 [INFO] Go runtime version: go1.12.13 2020/07/31 20:19:01 [INFO] CLI args: []string{"/usr/bin/terraform", "plan"} 2020/07/31 20:19:01 [DEBUG] Attempting to open CLI config file: /home/jruiz/.terraformrc 2020/07/31 20:19:01 [DEBUG] File doesn't exist, but doesn't need to. Ignoring. 2020/07/31 20:19:01 [INFO] CLI command args: []string{"plan"} 2020/07/31 20:19:01 [WARN] Log levels other than TRACE are currently unreliable, and are supported only for backward compatibility. Use TF_LOG=TRACE to see Terraform's internal logs. ---- 2020/07/31 20:19:01 [DEBUG] New state was assigned lineage "cc420085-6d12-cb64-c041-a0ed135c58ed" 2020/07/31 20:19:01 [DEBUG] checking for provider in "." 2020/07/31 20:19:01 [DEBUG] checking for provider in "/usr/bin" 2020/07/31 20:19:01 [DEBUG] checking for provider in ".terraform/plugins/linux_amd64" 2020/07/31 20:19:01 [DEBUG] found provider "terraform-provider-aws_v2.67.0_x4" 2020/07/31 20:19:01 [DEBUG] found provider "terraform-provider-external_v1.2.0_x4" 2020/07/31 20:19:01 [DEBUG] found valid plugin: "aws", "2.67.0", "/home/jruiz/git/github/terraform-aws-ec2-rds-basic-free/.terraform/plugins/linux_amd64/terraform-provider-aws_v2.67.0_x4" 2020/07/31 20:19:01 [DEBUG] found valid plugin: "external", "1.2.0", "/home/jruiz/git/github/terraform-aws-ec2-rds-basic-free/.terraform/plugins/linux_amd64/terraform-provider-external_v1.2.0_x4" 2020/07/31 20:19:01 [DEBUG] checking for provisioner in "." 2020/07/31 20:19:01 [DEBUG] checking for provisioner in "/usr/bin" 2020/07/31 20:19:01 [DEBUG] checking for provisioner in ".terraform/plugins/linux_amd64" 2020/07/31 20:19:01 [INFO] backend/local: starting Plan operation ... 2020/07/31 20:19:30 [DEBUG] ProviderTransformer: "module.aws_sg_rds_mariadb_pro_pub_01.aws_security_group.default" (*terraform.NodeValidatableResource) needs provider.aws 6.aws_subnet.default - *terraform.NodeValidatableResource provider.aws - *terraform.NodeApplyableProvider module.aws_sn_zb_pro_pub_36.output.id - *terraform.NodeApplyableOutput module.aws_sn_zb_pro_pub_36.var.az - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.cidr - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.description - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.name - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.public - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.vpc_id - *terraform.NodeApplyableModuleVariable module.aws_sr_ec2_default_internet_to_ssh.aws_security_group_rule.default - *terraform.NodeValidatableResource .... 2020/07/31 20:19:30 [DEBUG] ProviderTransformer: "module.aws_sg_rds_mariadb_pro_pub_01.aws_security_group.default" (*terraform.NodeValidatableResource) needs provider.aws 6.aws_subnet.default - *terraform.NodeValidatableResource provider.aws - *terraform.NodeApplyableProvider module.aws_sn_zb_pro_pub_36.output.id - *terraform.NodeApplyableOutput module.aws_sn_zb_pro_pub_36.var.az - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.cidr - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.description - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.name - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.public - *terraform.NodeApplyableModuleVariable module.aws_sn_zb_pro_pub_36.var.vpc_id - *terraform.NodeApplyableModuleVariable module.aws_sr_ec2_default_internet_to_ssh.aws_security_group_rule.default - *terraform.NodeValidatableResource ...
Continue the Terraform and Ansible howto, see:
- Terraform AWS Tutorials
- Ansible Tutorials
2 Responses
Hey,
thanks for the tutorials.
what’s the reason for the “za” in the naming?
aws_sn_za_pro_pub_32 = { …}
Thanks Martin
ZA corresponds to Availability Zone A in the AWS region.