Writing reusable terraform modules to facilitate code reuse across your infrastructure
Note: all the code samples in this article are written using Terraform v0.11.7 and for an AWS based infrastructure, but these patterns can be applied to any of the cloud providers that Terraform supports.
One of the standard infrastructure architectural patterns for web applications – that we also apply here at NearForm – is to split the infrastructure into multiple logical environments. The most common ones are dev, staging and production.
They use the same type of resources (load balancers, instances, databases, etc), but they differ in scale and public accessibility: while dev will use a low number of small instances and will be password or VPN protected from the Internet, production will use a high number of instances and will be accessible by anyone.
Because we apply DevOps best practices, these types of infrastructures are deployed from the beginning as infrastructure-as-code. This gives us the ability to easily reproduce the infrastructure and version the code via Git or any other VCS. And for that, one of the tools of choice is Terraform.
We mentioned that each environment uses the same type of resources.
This means that if the application requires a new resource, for example, Redis via AWS’s Elasticache, an engineer will first introduce the resource into the dev environment, by adding the following code to environments/dev/main.tf:
What happens after the new features are introduced and tested? Before deploying the code to staging and then production, the same code will have to be copy-pasted (and modified) to both environments/staging/main.tf and environments/production/main.tf.
And this pattern will repeat itself with every new resource added, making the code-base bigger and harder to read and especially to modify because any change to how a resource is being used will mean the change has to be applied to every environment.
This also makes things prone to configuration drift: if a quick change is required to justify the production environment, a lot of times it will quickly be added to environments/production/main.tf while forgetting to add it to the other environments, thus making the dev environment more and more different to the production one, defeating the purpose of having environments like dev and staging that truly mimic production so tests can be run on them without affecting live traffic and users.
The solution: Create Reusable Terraform Modules
One of the ways to mitigate these issues is to create reusable and configurable Terraform modules. Let’s break this down and start of first with:
Reusable Terraform Modules
Using the Elasticache example from above, we will create another directory in the root of our codebase, called elasticache. The directory structure will look like this:
Terraform’s way of creating modules is very simple: create a directory that holds a bunch of .tf files. That module can be called in each of the environment modules. You can think of this module as an object in OOP, which you can instantiate in other parts of the code.
The module’s main.tf file will have the same piece of code, the Terraform resource, which we used above and in each environment:
Note that source parameter needs to call the module with its path as relative to the module it is being called from.
You can continue by adding the same piece of code to both environments/staging/main.tf and environments/production/main.tf, the only thing that you will need to modify in each file is the module name: each instance of a module needs to have a unique name (ex: instead of module dev-elasticache use module staging-elasticache).
Configurable Terraform Modules
Now that we have our reusable module in place, we will hit another problem: each environment might have its own requirement from a certain resource.
To continue to use our example, in dev we might need just one cache.m3.medium node in our Elasticache cluster, but in production, we might need 3 cache.m3.large nodes in the cluster.
The solution to this is to make the module configurable by using input parameters. These are basically variables that are available only in the module’s scope and can be passed to the module upon instantiating (calling) it.
You can add these variables directly in the module’s main.tf file, but one of the cleaner ways – especially if the number of input parameters grows – is to have a separate variables.tf file in the module’s directory.
After adding that, our final directory structure looks like this:
The variables.tf file will hold the variables that configure the module.
In our case, we want to be able to configure the number of nodes in the cluster, the type of nodes, the cluster’s description (so it is easy to know in which environment it runs) and the availability zones in which it runs:
Running terraform plan and terraform apply should bring up an Elasticache cluster in each environment, configured the way it is needed.
Conclusion: Clean, Readable, and Scalable Terraform code
With a relatively small amount of effort, Terraform code can be structured in such a way from the beginning that growing the code base won’t bring with it growing pains. Configurable, reusable modules are one of the basic building blocks of clean, readable and scalable Terraform code.
Read more about NearForm’s services and how we assist businesses to create and deploy high-performance software or contact us to discuss how we can help you accelerate your projects using modern tools, processes and platforms.