Quick Start
Install Terragrunt
Section titled “Install Terragrunt”If you haven’t already installed Terragrunt, you can do so by following the instructions in the Install Terragrunt guide.
Add terragrunt.hcl to your project
Section titled “Add terragrunt.hcl to your project”If you are currently using OpenTofu or Terraform, and you want to start using Terragrunt in your project, simply run the following where your OpenTofu project is located:
touch terragrunt.hclThis creates an empty Terragrunt configuration file in the directory where you are using OpenTofu. You can now start using terragrunt instead of tofu or terraform to run your OpenTofu/Terraform commands as if you were simply using OpenTofu or Terraform.
Depending on why you’re looking to adopt Terragrunt, this may be all you need to do!
With just this empty file, you’ve already made it so that you no longer need to run tofu init or terraform init before running tofu apply or terraform apply. Terragrunt will automatically run init for you if necessary. This is a feature called Auto-init.
This might not be very impressive so far, so you may be wondering why one might want to start using Terragrunt to manage their OpenTofu/Terraform projects. The next section will give you a very gentle introduction to using Terragrunt, and show you how you can start to leverage Terragrunt to manage your OpenTofu/Terraform projects more effectively.
Tutorial
Section titled “Tutorial”What follows is a gentle step-by-step guide to integrating Terragrunt into a new (or existing) OpenTofu/Terraform project.
For the sake of this tutorial, a minimal set of OpenTofu configurations will be used so that you can follow along. Following these steps will give you an idea of how to integrate Terragrunt into an existing project, even if yours is more complex.
This tutorial will assume the following:
- You have OpenTofu or Terraform installed*.
- You have a basic understanding of what OpenTofu/Terraform do.
- You are using a Unix-like operating system.
This tutorial will not assume the following:
- You have any subscriptions to any cloud providers.
- You have any experience with Terragrunt.
- You have any existing Terragrunt, OpenTofu or Terraform projects.
* Note that if you have both OpenTofu and Terraform installed, you’ll want to read the tf-path docs to understand how Terragrunt determines which binary to use.
If you would like a less gentle introduction geared towards users with an active AWS account, familiarity with OpenTofu/Terraform, and potentially a team actively using Terragrunt, consider starting with the Overview.
If you start to feel lost, or don’t understand a concept, consider reading the Terminology page before continuing with this tutorial. It has a brief overview of most of the common terms used when discussing Terragrunt.
Finally, note that all of the files created in this tutorial can be copied directly from the code block, none of them are partial files, so you don’t have to worry about figuring out where to put the code. Just copy and paste!
You can also see what to expect in your filesystem at each step here.
-
Create a new Terragrunt project
Let’s say you have the following
main.tfin directoryfoo:foo/main.tf resource "local_file" "file" {content = "Hello, World!"filename = "${path.module}/hi.txt"}As we learned above, integrating this OpenTofu project with Terragrunt is as simple as creating a
terragrunt.hclfile in the same directory:Terminal window touch foo/terragrunt.hclYou can now run
terragruntcommands within thefoodirectory, as if you were usingtofuorterraform.Terminal window $ cd foo$ terragrunt apply -auto-approve18:44:26.066 STDOUT tofu: Initializing the backend...18:44:26.067 STDOUT tofu: Initializing provider plugins...18:44:26.067 STDOUT tofu: - Finding latest version of hashicorp/local...18:44:26.717 STDOUT tofu: - Installing hashicorp/local v2.5.2...18:44:27.033 STDOUT tofu: - Installed hashicorp/local v2.5.2 (signed, key ID 0C0AF313E5FD9F80)18:44:27.033 STDOUT tofu: Providers are signed by their developers.18:44:27.033 STDOUT tofu: If you'd like to know more about provider signing, you can read about it here:18:44:27.033 STDOUT tofu: https://opentofu.org/docs/cli/plugins/signing/18:44:27.034 STDOUT tofu: OpenTofu has created a lock file .terraform.lock.hcl to record the provider18:44:27.034 STDOUT tofu: selections it made above. Include this file in your version control repository18:44:27.034 STDOUT tofu: so that OpenTofu can guarantee to make the same selections by default when18:44:27.034 STDOUT tofu: you run "tofu init" in the future.18:44:27.034 STDOUT tofu: OpenTofu has been successfully initialized!18:44:27.035 STDOUT tofu:18:44:27.035 STDOUT tofu: You may now begin working with OpenTofu. Try running "tofu plan" to see18:44:27.035 STDOUT tofu: any changes that are required for your infrastructure. All OpenTofu commands18:44:27.035 STDOUT tofu: should now work.18:44:27.035 STDOUT tofu: If you ever set or change modules or backend configuration for OpenTofu,18:44:27.035 STDOUT tofu: rerun this command to reinitialize your working directory. If you forget, other18:44:27.035 STDOUT tofu: commands will detect it and remind you to do so if necessary.18:44:27.362 STDOUT tofu: OpenTofu used the selected providers to generate the following execution18:44:27.362 STDOUT tofu: plan. Resource actions are indicated with the following symbols:18:44:27.362 STDOUT tofu: + create18:44:27.362 STDOUT tofu: OpenTofu will perform the following actions:18:44:27.362 STDOUT tofu: # local_file.file will be created18:44:27.362 STDOUT tofu: + resource "local_file" "file" {18:44:27.362 STDOUT tofu: + content = "Hello, World!"18:44:27.362 STDOUT tofu: + content_base64sha256 = (known after apply)18:44:27.362 STDOUT tofu: + content_base64sha512 = (known after apply)18:44:27.362 STDOUT tofu: + content_md5 = (known after apply)18:44:27.362 STDOUT tofu: + content_sha1 = (known after apply)18:44:27.362 STDOUT tofu: + content_sha256 = (known after apply)18:44:27.362 STDOUT tofu: + content_sha512 = (known after apply)18:44:27.362 STDOUT tofu: + directory_permission = "0777"18:44:27.362 STDOUT tofu: + file_permission = "0777"18:44:27.362 STDOUT tofu: + filename = "./hi.txt"18:44:27.362 STDOUT tofu: + id = (known after apply)18:44:27.362 STDOUT tofu: }18:44:27.362 STDOUT tofu: Plan: 1 to add, 0 to change, 0 to destroy.18:44:27.362 STDOUT tofu:18:44:27.383 STDOUT tofu: local_file.file: Creating...18:44:27.384 STDOUT tofu: local_file.file: Creation complete after 0s [id=0a0a9f2a6772942557ab5355d76af442f8f65e01]18:44:27.392 STDOUT tofu:18:44:27.392 STDOUT tofu: Apply complete! Resources: 1 added, 0 changed, 0 destroyed.18:44:27.392 STDOUT tofu:You might notice that this is a little more verbose than the output you’re used to seeing from running
tofuorterraformdirectly. This is because Terragrunt does a bit of work behind the scenes to make sure that you can scale your OpenTofu/Terraform usage without running into common problems. As you get more comfortable with using Terragrunt on larger projects, you may find the extra information helpful.If you prefer that Terragrunt terminal output look more like that from
tofuorterraform, you can use the--log-format bareflag (or set the environment variableTG_LOG_FORMAT=bare) to reduce the verbosity of the output.e.g.
Terminal window $ terragrunt --log-format bare applylocal_file.file: Refreshing state... [id=0a0a9f2a6772942557ab5355d76af442f8f65e01]No changes. Your infrastructure matches the configuration.OpenTofu has compared your real infrastructure against your configuration andfound no differences, so no changes are needed.Apply complete! Resources: 0 added, 0 changed, 0 destroyed.The way dynamicity is handled in OpenTofu is via
variableconfiguration blocks. Let’s add one to ourmain.tfso that we can control the content of the file we’re creating:foo/main.tf variable "content" {}resource "local_file" "file" {content = var.contentfilename = "${path.module}/hi.txt"}Now, just like when using
tofualone, you can pass in the value for thecontentvariable using the-varflag:Terminal window terragrunt apply -auto-approve -var content='Hello, Terragrunt!'This is a common pattern when working with Infrastructure as Code (IaC). You typically create IaC that is relatively static, and then as you need to make configurations dynamic, you add variables to your configuration files to introduce dynamicity.
-
Add a new Terragrunt unit
In the context of Terragrunt, a “unit” is a directory that contains a
terragrunt.hclfile, and it represents a single piece of infrastructure. You can think of a unit as a single instance of an OpenTofu/Terraform module.Let’s create a copy of the
foodirectory and call itbar:Terminal window cd ..cp -r foo barWe now have two identical units in our project,
fooandbar. We also have identical code in each of these directories, which is not ideal if we want to be able to avoid duplicating effort when we make changes to our infrastructure. -
Create a shared module
To avoid this duplication, we can introduce a new
shareddirectory, and reference that directory from bothfooandbar. This way, we can make changes to our infrastructure in one place and have those changes apply to both units.Let’s create a new directory called
shared:Terminal window mkdir sharedNow, move the
main.tffile fromfootoshared:Terminal window mv foo/main.tf shared/main.tfFinally, let’s update the
fooandbardirectories to reference theshareddirectory. Update themain.tffiles in bothfooandbarto look like this:foo/main.tf variable "content" {}module "shared" {source = "../shared"content = var.content}bar/main.tf variable "content" {}module "shared" {source = "../shared"content = var.content}There’s now one place where the logic for the resource
local_file.fileis defined, and bothfooandbarreference that logic. You can imagine that as your infrastructure grows, it can become more and more advantageous to put repeated logic into shared modules like this.This setup does have some problems, however. While you could keep navigating to the different units and running
terragrunt applyin each one with the appropriate-varflags, this can quickly become tedious, as you have to know which units require which set of vars applied. You might decide to work around this by creating a file namedterraform.tfvarsin each unit directory, but this also comes with some limitations that Terragrunt can help you avoid. -
Use Terragrunt to manage your units
Luckily, Terragrunt has a built-in feature to control the inputs passed to your OpenTofu/Terraform configurations. This feature is called (aptly enough) inputs.
Let’s add inputs to both
terragrunt.hclfiles in thefooandbardirectories:foo/terragrunt.hcl inputs = {content = "Hello from foo, Terragrunt!"}bar/terragrunt.hcl inputs = {content = "Hello from bar, Terragrunt!"}You don’t have to maintain the extra
main.tffiles just to instantiate themoduleblocks. You can use theterraformblock to handle this for you. Update theterragrunt.hclfiles infooandbarto look like this:foo/terragrunt.hcl terraform {source = "../shared"}inputs = {content = "Hello from foo, Terragrunt!"}bar/terragrunt.hcl terraform {source = "../shared"}inputs = {content = "Hello from bar, Terragrunt!"}And you can delete the
main.tffiles from bothfooandbar:Terminal window rm foo/main.tf bar/main.tfThis saves you some duplicated content, as you no longer need to maintain that extra
contentvariable in eachmain.tffile. You can imagine that for especially large modules, the ability to define inputs in theterragrunt.hclfile can save you a lot of time and effort. The patterns for your infrastructure are exclusively defined in.tffiles now, and theterragrunt.hclfiles are used to manage the instances of those patterns as units.If you run
terragrunt apply -auto-approvein thefooandbardirectories, you’ll see that thecontentvariable is set to the value you defined in theinputsblock of theterragrunt.hclfile. You might also notice that there’s now a special.terragrunt-cachedirectory generated for you in each unit directory. This is where Terragrunt copies the contents of modules, and performs any necessary additional code generation to make sure that your OpenTofu/Terraform code is ready to be run.The
.terragrunt-cachedirectory is typically added to.gitignorefiles, similar to the.terraformdirectory that OpenTofu generates. -
Use Terragrunt to manage your stacks
In the context of Terragrunt, a “stack” is a collection of units that are managed together. You can think of a stack as a single environment, such as
dev,staging, orprod, or an entire project.One of the main reasons users adopt Terragrunt is that it can help manage the complexity of managing multiple units across multiple environments.
e.g. Let’s say we wanted to update both our
fooandbarenvironments simultaneously.In the directory above
fooandbar, run the following:Terminal window $ terragrunt run --all apply08:42:00.150 INFO The stack at . will be processed in the following order for command apply:Group 1- Module ./bar- Module ./fooAre you sure you want to run 'terragrunt apply' in each folder of the stack described above? (y/n) y08:43:10.702 STDOUT [foo] tofu: local_file.file: Refreshing state... [id=c4ae21736a6297f44ea86791e528338e9d14a0e9]08:43:10.702 STDOUT [bar] tofu: local_file.file: Refreshing state... [id=f855394a0316da09618c8b1fde7b91e00e759f80]08:43:10.708 STDOUT [bar] tofu: No changes. Your infrastructure matches the configuration.08:43:10.708 STDOUT [bar] tofu: OpenTofu has compared your real infrastructure against your configuration and08:43:10.708 STDOUT [bar] tofu: found no differences, so no changes are needed.08:43:10.708 STDOUT [foo] tofu: No changes. Your infrastructure matches the configuration.08:43:10.708 STDOUT [foo] tofu: OpenTofu has compared your real infrastructure against your configuration and08:43:10.708 STDOUT [foo] tofu: found no differences, so no changes are needed.08:43:10.716 STDOUT [foo] tofu:08:43:10.716 STDOUT [foo] tofu: Apply complete! Resources: 0 added, 0 changed, 0 destroyed.08:43:10.716 STDOUT [foo] tofu:08:43:10.720 STDOUT [bar] tofu:08:43:10.720 STDOUT [bar] tofu: Apply complete! Resources: 0 added, 0 changed, 0 destroyed.08:43:10.720 STDOUT [bar] tofu:This is where that additional verbosity in Terragrunt logging is really handy. You can see that Terragrunt concurrently ran
apply -auto-approvein both thefooandbarunits. The extra logging for Terragrunt also included information on the names of the units that were processed, and disambiguated the output from each unit.When Terragrunt runs these commands, it creates a
.terragrunt-cachedirectory in each unit’s directory. This cache directory serves as Terragrunt’s scratch directory where it:- Downloads your remote OpenTofu/Terraform configurations
- Runs your OpenTofu/Terraform commands
- Stores downloaded modules and providers
- Stores generated files (in this case, the
hi.txtfile will be created under.terragrunt-cache/[HASH]/[HASH]/hi.txtrather than directly in thefooorbardirectories)
The
.terragrunt-cachedirectory is typically added to.gitignorefiles, similar to the.terraformdirectory that OpenTofu generates. You can safely delete this folder at any time, and Terragrunt will recreate it as necessary.If you want to control where the files are created, you can modify the module to accept an output directory parameter. For example, you can update the
shared/main.tffile to:variable "content" {}variable "output_dir" {}resource "local_file" "file" {content = var.contentfilename = "${var.output_dir}/hi.txt"}Then in your
foo/terragrunt.hclandbar/terragrunt.hclfiles, you can use theget_terragrunt_dir()built-in function to get the directory where theterragrunt.hclfile is located:terraform {source = "../shared"}inputs = {output_dir = get_terragrunt_dir()content = "Hello from bar, Terragrunt!"}With this configuration, the
hi.txtfiles will be created directly in thefooandbardirectories instead of the.terragrunt-cachedirectory.Similar to the
tofuCLI, there is a prompt to confirm that you are sure you want to run the command in each unit when performing a command that’s potentially destructive. You can skip this prompt by using the--non-interactiveflag, just as you would with-auto-approvein OpenTofu.Terminal window terragrunt run --all --non-interactive apply -
Use Terragrunt to manage your DAG
In the context of Terragrunt, a Directed Acyclic Graph (DAG) is a data structure that represents the relationship between units in your stack, as determined by their dependencies.
Don’t worry if that doesn’t make sense right now. The important thing to know is that Terragrunt uses the DAG to determine the order in which it performs runs across your stack. Once you see how Terragrunt uses the DAG to determine the order in which to run commands across your stack, you’ll understand why this is important.
For example, let’s say that the
contentof thebarunit depended on thecontentof thefoounit. You can express this dependency first by adding anoutputblock to thesharedmodule:shared/output.tf output "content" {value = local_file.file.content}Then, you can update the
barunit to depend on thefoounit by using thedependenciesblock in theterragrunt.hclfile:bar/terragrunt.hcl terraform {source = "../shared"}dependency "foo" {config_path = "../foo"}inputs = {content = "Foo content: ${dependency.foo.outputs.content}"}Being good citizens of the IaC world, we should run a
planbefore anapplyto see what changes Terragrunt will make to our infrastructure (note that you will get an error here. This is expected, and we’ll fix it in the next step):Terminal window $ terragrunt run --all plan08:57:09.271 INFO The stack at . will be processed in the following order for command plan:Group 1- Module ./fooGroup 2- Module ./bar...08:57:09.936 ERROR [bar] Module ./bar has finished with an error08:57:09.936 ERROR error occurred:* ./foo/terragrunt.hcl is a dependency of ./bar/terragrunt.hcl but detected no outputs. Either the target module has not been applied yet, or the module has no outputs.If this dependency is accessed before the outputs are ready (which can happen during the planning phase of an unapplied stack), consider using mock_outputs:dependency "foo" {config_path = "../foo"mock_outputs = {foo_output = "mock-foo-output"}}For more info, see:https://terragrunt.gruntwork.io/docs/features/stacks/#unapplied-dependency-and-mock-outputsIf you do not require outputs from your dependency, consider using the dependencies block instead:https://terragrunt.gruntwork.io/docs/reference/config-blocks-and-attributes/#dependenciesOh no! We got an error. This happens because the way in which dependencies are resolved by default in Terragrunt is to run
terragrunt outputwithin the dependency for use in the dependent unit. In this case, thefoounit has not been applied yet, so there are no outputs to fetch.You should notice, however, that Terragrunt has already figured out the order in which to run the
plancommand across the units in your stack. This is what we mean when we say that Terragrunt uses a DAG to determine the order of runs in your stack. Terragrunt analyzes the dependencies in your stack, and determines an order for runs so that outputs are ready to be used as inputs in dependent units.If you decided to run
terragrunt run --all applyinstead, you would instead see Terragrunt complete theapplyin thefoounit first, and then complete theapplyin thebarunit, as it’s aware that thebarunit might need some outputs from thefoounit. -
Use mocks to handle unavailable outputs
In this scenario, most Terragrunt users leverage
mock_outputsto handle unavailable outputs (see limitations on accessing exposed config). Given that it’s expected that thefoounit won’t be able to provide outputs until it’s applied, you can use themock_outputsblock to provide a placeholder value for thecontentoutput during theplanphase.bar/terragrunt.hcl terraform {source = "../shared"}dependency "foo" {config_path = "../foo"mock_outputs = {content = "Mocked content from foo"}}inputs = {content = "Foo content: ${dependency.foo.outputs.content}"}Re-running the
plancommand should now complete successfully:Terminal window $ terragrunt run --all plan09:29:03.461 INFO The stack at . will be processed in the following order for command plan:Group 1- Module ./fooGroup 2- Module ./bar...09:29:03.644 WARN [bar] Config ./foo/terragrunt.hcl is a dependency of ./bar/terragrunt.hcl that has no outputs, but mock outputs provided and returning those in dependency output....09:29:03.898 STDOUT [bar] tofu: + resource "local_file" "file" {09:29:03.898 STDOUT [bar] tofu: + content = "Foo content: Mocked content from foo"09:29:03.898 STDOUT [bar] tofu: + content_base64sha256 = (known after apply)09:29:03.898 STDOUT [bar] tofu: + content_base64sha512 = (known after apply)09:29:03.898 STDOUT [bar] tofu: + content_md5 = (known after apply)09:29:03.898 STDOUT [bar] tofu: + content_sha1 = (known after apply)09:29:03.898 STDOUT [bar] tofu: + content_sha256 = (known after apply)09:29:03.898 STDOUT [bar] tofu: + content_sha512 = (known after apply)09:29:03.898 STDOUT [bar] tofu: + directory_permission = "0777"09:29:03.898 STDOUT [bar] tofu: + file_permission = "0777"09:29:03.898 STDOUT [bar] tofu: + filename = "./hi.txt"09:29:03.898 STDOUT [bar] tofu: + id = (known after apply)09:29:03.898 STDOUT [bar] tofu: }If you’re concerned about the
mock_outputsattribute resulting in invalid configurations, note that during an apply, the outputs offoowill be known, and Terragrunt won’t usemock_outputsto resolve the outputs offoo.Terminal window $ terragrunt run --all --non-interactive apply...09:31:21.587 STDOUT [bar] tofu: + resource "local_file" "file" {09:31:21.587 STDOUT [bar] tofu: + content = "Foo content: Hello from foo, Terragrunt!"09:31:21.587 STDOUT [bar] tofu: + content_base64sha256 = (known after apply)09:31:21.587 STDOUT [bar] tofu: + content_base64sha512 = (known after apply)09:31:21.587 STDOUT [bar] tofu: + content_md5 = (known after apply)09:31:21.587 STDOUT [bar] tofu: + content_sha1 = (known after apply)09:31:21.587 STDOUT [bar] tofu: + content_sha256 = (known after apply)09:31:21.587 STDOUT [bar] tofu: + content_sha512 = (known after apply)09:31:21.587 STDOUT [bar] tofu: + directory_permission = "0777"09:31:21.587 STDOUT [bar] tofu: + file_permission = "0777"09:31:21.587 STDOUT [bar] tofu: + filename = "./hi.txt"09:31:21.587 STDOUT [bar] tofu: + id = (known after apply)09:31:21.587 STDOUT [bar] tofu: }...You can also be explicit about the fact that you only want to use
mock_outputsduring theplanphase by specifying that in yourdependencyconfiguration:bar/terragrunt.hcl terraform {source = "../shared"}dependency "foo" {config_path = "../foo"mock_outputs = {content = "Mocked content from foo"}mock_outputs_allowed_terraform_commands = ["plan"]}inputs = {content = "Foo content: ${dependency.foo.outputs.content}"}Something a little subtle just happened there. Note that the
inputsattribute is dynamic. This addresses some of the limitations mentioned earlier about usingterraform.tfvarsfiles to manage inputs for units. Given that thebarunit is dependent on output values from thefoounit, you wouldn’t be able to use aterraform.tfvarsfile to populate this variable without some additional tooling to populate it dynamically.Terragrunt was spawned organically out of supporting Gruntwork customers using Terraform at scale, and features in the product are designed to address common problems like these that arise when managing OpenTofu/Terraform projects at scale in production.
-
Continue learning and exploring
Hopefully, following this simple tutorial has given you confidence in integrating Terragrunt into your existing OpenTofu/Terraform projects. Starting small, and gradually introducing more complex Terragrunt features is a great way to learn how Terragrunt can help you manage your infrastructure more effectively.
The next step of the Getting Started guide is to follow the Overview guide. This guide will introduce you to more advanced Terragrunt features, and show you how to use Terragrunt to manage your infrastructure across multiple environments in a real-world AWS account.
If you’re ready to get your hands dirty with more advanced Terragrunt features yourself, you can skip ahead to the Features section of the documentation.
If you ever need help with a particular problem, take a look at the resources available to you in the Support section. You are especially encouraged to join the Terragrunt Discord server, and become part of the Terragrunt community.