Consider the following file structure in a typical OpenTofu/Terraform project, which defines three environments (prod, qa, stage) with the same infrastructure in each one (an app, a MySQL database, and a VPC):
└── live
├── prod
│ ├── app
│ │ └── main.tf
│ ├── mysql
│ │ └── main.tf
│ └── vpc
│ └── main.tf
├── qa
│ ├── app
│ │ └── main.tf
│ ├── mysql
│ │ └── main.tf
│ └── vpc
│ └── main.tf
└── stage
├── app
│ └── main.tf
├── mysql
│ └── main.tf
└── vpc
└── main.tf
The contents of each environment could be more or less identical, except perhaps for a few settings (e.g. the prod environment may run bigger or more servers). As the size of the infrastructure grows, having to maintain all of this duplicated code between environments becomes more error prone. You can reduce the amount of copy paste using OpenTofu/Terraform modules, but even the code to instantiate a module and set up input variables, output variables, providers, and remote state can still create a lot of maintenance overhead.
How can you keep your OpenTofu/Terraform code DRY so that you can maximize code reuse and minimize maintenance overhead?
Moreover, how can you ensure that you are reproducing as close to the same infrastructure as possible across environments, so that you can be confident that what you test in qa will work when you deploy to prod?
A unit in Terragrunt is a directory containing a terragrunt.hcl
file. This hermetic unit of infrastructure is the smallest deployable entity in Terragrunt. It’s also the most important feature Terragrunt has.
Units are designed to be contained, and can be operated on independently of other units. Infrastructure changes to units are also meant to be atomic. The interface you have with a unit is a single terragrunt.hcl
file, and any change you make to it should result in one reproducible change to a limited subset of your infrastructure.
Units are designed to work with immutable OpenTofu/Terraform modules. The OpenTofu/Terraform code referenced by a unit should be versioned, and that version of the module should be immutable. This ensures that the infrastructure you deploy is consistent across environments, and that you are confident you can reproduce the same pattern of infrastructure as many times as you need.
Terragrunt has the ability to download remote OpenTofu/Terraform configurations. The idea is that you define the OpenTofu/Terraform code for your infrastructure just once, in a single repo, called, for example, modules
:
└── modules
├── app
│ └── main.tf
├── mysql
│ └── main.tf
└── vpc
└── main.tf
This repo contains typical OpenTofu/Terraform code, with one difference: anything in your code that should be different between environments should be exposed as an input variable. For example, the app
module might expose the following variables:
variable "instance_count" {
description = "How many servers to run"
}
variable "instance_type" {
description = "What kind of servers to run (e.g. t3.large)"
}
These variables allow you to run smaller/fewer servers in qa and stage to save money and larger/more servers in prod to ensure availability and scalability. They also define the variability of this infrastructure pattern. When instantiating the app
module as a Terragrunt unit, you can be fairly confident that the only variance you are likely to see between environments is in the values of these variables.
In a separate repo, called, for example, live
, you define the code for all of your environments, which now consists of just one terragrunt.hcl
file per unit (e.g. app/terragrunt.hcl
, mysql/terragrunt.hcl
, etc). This gives you the following file layout:
└── live
├── prod
│ ├── app
│ │ └── terragrunt.hcl
│ ├── mysql
│ │ └── terragrunt.hcl
│ └── vpc
│ └── terragrunt.hcl
├── qa
│ ├── app
│ │ └── terragrunt.hcl
│ ├── mysql
│ │ └── terragrunt.hcl
│ └── vpc
│ └── terragrunt.hcl
└── stage
├── app
│ └── terragrunt.hcl
├── mysql
│ └── terragrunt.hcl
└── vpc
└── terragrunt.hcl
Notice how there are no OpenTofu/Terraform configurations (.tf
files) in any of the folders. Instead, each terragrunt.hcl
file specifies a terraform { … }
block that specifies from where to download the OpenTofu/Terraform code, as well as the environment-specific values for the input variables in that OpenTofu/Terraform code. For example, stage/app/terragrunt.hcl
may look like this:
terraform {
# Deploy version v0.0.3 in stage
source = "git::git@github.com:foo/modules.git//app?ref=v0.0.3"
}
inputs = {
instance_count = 3
instance_type = "t4g.micro"
}
(Note: the double slash (//
) in the source
parameter is intentional and required. It’s part of OpenTofu/Terraform’s Git syntax for module sources. OpenTofu/Terraform may display a “OpenTofu/Terraform initialized in an empty directory” warning, but you can safely ignore it.)
And prod/app/terragrunt.hcl
may look like this:
terraform {
# Deploy version v0.0.1 in prod
source = "git::git@github.com:foo/modules.git//app?ref=v0.0.1"
}
inputs = {
instance_count = 10
instance_type = "m8g.large"
}
You can now deploy the modules in your live
repo. For example, to deploy the app
module in stage, you would do the following:
cd live/stage/app
terragrunt apply
When Terragrunt finds the terraform
block with a source
parameter in live/stage/app/terragrunt.hcl
file, it will:
Download the configurations specified via the source
parameter into the --terragrunt-download-dir
folder (by default .terragrunt-cache
in the working directory, which we recommend adding to .gitignore
). This downloading is done by using the same go-getter library OpenTofu/Terraform uses, so the source
parameter supports the exact same syntax as the module source parameter, including local file paths, Git URLs, and Git URLs with ref
parameters (useful for checking out a specific tag, commit, or branch of Git repo). Terragrunt will download all the code in the repo (i.e. the part before the double-slash //
) so that relative paths work correctly between modules in that repo.
Copy all files from the current working directory into the temporary folder.
Execute whatever OpenTofu/Terraform command you specified in that temporary folder (assuming you are performing a run).
Set any variables defined in the inputs = { … }
block as environment variables (prefixed with TF_VAR_
) before running your OpenTofu/Terraform code. Notice how the inputs
block in stage/app/terragrunt.hcl
deploys fewer and smaller instances than prod.
Check out the terragrunt-infrastructure-modules-example and terragrunt-infrastructure-live-example repos for fully-working sample code that demonstrates our recommended folder structure for successful infrastructure management.
With this approach, copy/paste between environments is minimized. The terragrunt.hcl
files contain solely the source
URL of the module to deploy and the inputs
to set for that module in the current environment. To create a new unit, you copy an old one and update just the environment-specific inputs
in the terragrunt.hcl
files, which is about as close to the “essential complexity” of the problem as you can get.
Just as importantly, since the OpenTofu/Terraform module code is now defined in a single repo, you can version it (e.g., using Git tags and referencing them using the ref
parameter in the source
URL, as in the stage/app/terragrunt.hcl
and prod/app/terragrunt.hcl
examples above), and promote a single, immutable version through each environment (e.g., qa → stage → prod).
This is especially powerful when thinking about how the pattern is deployed. Because all of the configuration for a unit is defined using a versioned URL and a set of inputs, it’s easy to reliably promote an infrastructure change across environments as one atomic change. It’s also easy to roll back to a previous version of the infrastructure by changing the ref
parameter in the source
URL.
This idea is inspired by Kief Morris’ blog post Using Pipelines to Manage Environments with Infrastructure as Code.
If you’re testing changes to a local copy of the modules
repo, you can use the --terragrunt-source
command-line option or the TERRAGRUNT_SOURCE
environment variable to override the source
parameter. This is useful to point Terragrunt at a local checkout of your code so you can do rapid, iterative, make-a-change-and-rerun development:
cd live/stage/app
terragrunt apply --terragrunt-source ../../../modules//app
(Note: the double slash (//
) here too is intentional and required. Terragrunt downloads all the code in the folder before the double-slash into the temporary folder so that relative paths between modules work correctly. OpenTofu/Terraform may display a “OpenTofu/Terraform initialized in an empty directory” warning, but you can safely ignore it.)
Terraform 0.14 introduced lock files. These should mostly “just work” with Terragrunt version v0.27.0 and above: that
is, the lock file (.terraform.lock.hcl
) will be generated next to your terragrunt.hcl
, and you should check it into
version control.
See the Lock File Handling docs for more details.
The first time you set the source
parameter to a remote URL, Terragrunt will download the code from that URL into a tmp folder. It will NOT download it again afterwards unless you change that URL. That’s because downloading code—and more importantly, reinitializing remote state, redownloading provider plugins, and redownloading modules—can take a long time. To avoid adding 10-90 seconds of overhead to every Terragrunt command, Terragrunt assumes all remote URLs are immutable, and only downloads them once.
Therefore, when working locally, you should use the --terragrunt-source
parameter and point it at a local file path as described in the previous section. Terragrunt will copy the local files every time you run it, which is nearly instantaneous, and doesn’t require reinitializing everything, so you’ll be able to iterate quickly.
If you need to force Terragrunt to redownload something from a remote URL, run Terragrunt with the --terragrunt-source-update
flag and it’ll delete the tmp folder, download the files from scratch, and reinitialize everything. This can take a while, so avoid it and use --terragrunt-source
when you can!
One of the gotchas with downloading OpenTofu/Terraform configurations is that when you run terragrunt apply
in folder foo
, OpenTofu/Terraform will actually run in some temporary folder such as .terragrunt-cache/foo
. That means you have to be especially careful with relative file paths, as they will be relative to that temporary folder and not the folder where you ran Terragrunt!
In particular:
Command line: When using file paths on the command line, such as passing an extra -var-file
argument, you should use absolute paths:
# Use absolute file paths on the CLI!
terragrunt apply -var-file /foo/bar/extra.tfvars
# Or use the PWD environment variable to construct
# an absolute path before passing it to Terragrunt
# $ terragrunt apply -var-file "$PWD/extra.tfvars"
Terragrunt configuration: When using file paths directly in your Terragrunt configuration (terragrunt.hcl
), such as in an extra_arguments
block, you can’t use hard-coded absolute file paths, or it won’t work on your teammates’ computers. Therefore, you should utilize the Terragrunt built-in function get_terragrunt_dir()
to use a relative file path:
terraform {
source = "git::git@github.com:foo/modules.git//frontend-app?ref=v0.0.3"
extra_arguments "custom_vars" {
commands = [
"apply",
"plan",
"import",
"push",
"refresh"
]
# With the get_terragrunt_dir() function, you can use relative paths!
arguments = [
"-var-file=${get_terragrunt_dir()}/../common.tfvars",
"-var-file=example.tfvars"
]
}
}
See the get_terragrunt_dir() documentation for more details.
The easiest way to use Terragrunt with private Git repos is to use SSH authentication. Configure your Git account so you can use it with SSH (see the guide for GitHub here) and use the SSH URL for your repo:
terraform {
source = "git@github.com:foo/modules.git//path/to/module?ref=v0.0.1"
}
Look up the Git repo for your repository to find the proper format.
Note: In automated pipelines, you may need to run the following command for your Git repository prior to calling terragrunt
to ensure that the ssh host is registered locally, e.g.:
ssh -T -oStrictHostKeyChecking=accept-new git@github.com || true
In an ideal world, all that units do would be to run versioned, immutable OpenTofu/Terraform modules with environment-specific inputs. In the real world, however, certain scenarios arise when you have to inject additional configurations to the immutable OpenTofu/Terraform modules you use. This is where generate blocks come in handy.
When you define a generate
block, Terragrunt will do the following before any run:
terraform
block into the .terragrunt-cache
folder (if there is none, it will run in the current working directory).generate
block into the directory where Terragrunt will run OpenTofu/Terraform.The most common example of this is to dynamically generate a provider.tf
file that includes provider configurations.
Most OpenTofu/Terraform modules are authored in such a way that defining a provider is an exercise left to the consumer of the module.
This is a good practice, as it allows the consumer to define the provider configuration in a way that suits their needs, and
it may not make sense for a nested module to define a provider configuration that is not used by the consumer.
Consider a setup where you want to always assume a specific role when calling out to a given OpenTofu/Terraform module.
Not all modules expose the right variables for configuring the aws
provider so that you can assume the role through OpenTofu/Terraform.
In this situation, you can use Terragrunt generate
blocks to generate a tf file called provider.tf
that includes the
provider configuration. Add an env.hcl
file for each of the environments in the file layout for the live
repo:
└── live
├── prod
│ ├── env.hcl
│ ├── app
│ │ └── terragrunt.hcl
│ ├── mysql
│ │ └── terragrunt.hcl
│ └── vpc
│ └── terragrunt.hcl
├── qa
│ ├── env.hcl
│ ├── app
│ │ └── terragrunt.hcl
│ ├── mysql
│ │ └── terragrunt.hcl
│ └── vpc
│ └── terragrunt.hcl
└── stage
├── env.hcl
├── app
│ └── terragrunt.hcl
├── mysql
│ └── terragrunt.hcl
└── vpc
└── terragrunt.hcl
Each env.hcl
file (the one at the environment level, e.g prod/env.hcl
) should define a
generate
block to generate the AWS provider configuration to assume the role for that environment. For example,
if you wanted to assume the role arn:aws:iam::0123456789:role/terragrunt
in all the modules for the prod account, you
would put the following in prod/terragrunt.hcl
:
generate "provider" {
path = "provider.tf"
if_exists = "overwrite_terragrunt"
contents = <<EOF
provider "aws" {
assume_role {
role_arn = "arn:aws:iam::0123456789:role/terragrunt"
}
}
EOF
}
This instructs Terragrunt to create the file provider.tf
in the working directory where Terragrunt calls tofu
/terraform
before it runs any of the OpenTofu/Terraform commands (e.g plan
, apply
, validate
, etc). This allows you to inject this
provider configuration for any unit that includes the env.hcl
file.
To include this in the child configurations (e.g mysql/terragrunt.hcl
), you would update all the units to
include this configuration using the include
block:
include "env" {
path = find_in_parent_folders("env.hcl")
}
The include
block tells Terragrunt to use the exact same Terragrunt configuration from the env.hcl
file
specified via the path
parameter. It behaves exactly as if you had copy/pasted the OpenTofu/Terraform configuration from the
included file generate
configuration into the child, but this approach is much easier to maintain!
Note that if you’re considering this solution because you’re struggling with dynamic provider authentication in AWS, you may be interested in the dedicated documentation on working with multiple AWS accounts.