If you haven’t already installed Terragrunt, you can do so by following the instructions in the Install Terragrunt guide.
terragrunt.hcl
to your projectIf you are currently using OpenTofu or Terraform, and you want to start using Terragrunt in your project, simply run the following where your OpenTofu project is located:
touch terragrunt.hcl
This creates an empty Terragrunt configuration file in the directory where you are using OpenTofu. You can now start using terragrunt
instead of tofu
or terraform
to run your OpenTofu/Terraform commands as if you were simply using OpenTofu or Terraform.
Depending on why you’re looking to adopt Terragrunt, this may be all you need to do!
With just this empty file, you’ve already made it so that you no longer need to run tofu init
or terraform init
before running tofu apply
or terraform apply
. Terragrunt will automatically run init
for you if necessary. This is a feature called Auto-init.
This might not be very impressive so far, so you may be wondering why one might want to start using Terragrunt to manage their OpenTofu/Terraform projects. The next section will give you a very gentle introduction to using Terragrunt, and show you how you can start to leverage Terragrunt to manage your OpenTofu/Terraform projects more effectively.
What follows is a gentle step-by-step guide to integrating Terragrunt into a new (or existing) OpenTofu/Terraform project.
For the sake of this tutorial, a minimal set of OpenTofu configurations will be used so that you can follow along. Following these steps will give you an idea of how to integrate Terragrunt into an existing project, even if yours is more complex.
This tutorial will assume the following:
This tutorial will not assume the following:
* Note that if you have both OpenTofu and Terraform installed, you’ll want to read the terragrunt-tfpath docs to understand how Terragrunt determines which binary to use.
If you would like a less gentle introduction geared towards users with an active AWS account, familiarity with OpenTofu/Terraform, and potentially a team actively using Terragrunt, consider starting with the Overview.
If you start to feel lost, or don’t understand a concept, consider reading the Terminology page before continuing with this tutorial. It has a brief overview of most of the common terms used when discussing Terragrunt.
Finally, note that all of the files created in this tutorial can be copied directly from the code block, none of them are partial files, so you don’t have to worry about figuring out where to put the code. Just copy and paste!
You can also see what to expect in your filesystem at each step here.
Let’s say you have the following main.tf
in directory foo
:
# foo/main.tf
resource "local_file" "file" {
content = "Hello, World!"
filename = "${path.module}/hi.txt"
}
As we learned above, integrating this OpenTofu project with Terragrunt is as simple as creating a terragrunt.hcl
file in the same directory:
touch foo/terragrunt.hcl
You can now run terragrunt
commands within the foo
directory, as if you were using tofu
or terraform
.
$ cd foo
$ terragrunt apply -auto-approve
18:44:26.066 STDOUT tofu: Initializing the backend...
18:44:26.067 STDOUT tofu: Initializing provider plugins...
18:44:26.067 STDOUT tofu: - Finding latest version of hashicorp/local...
18:44:26.717 STDOUT tofu: - Installing hashicorp/local v2.5.2...
18:44:27.033 STDOUT tofu: - Installed hashicorp/local v2.5.2 (signed, key ID 0C0AF313E5FD9F80)
18:44:27.033 STDOUT tofu: Providers are signed by their developers.
18:44:27.033 STDOUT tofu: If you'd like to know more about provider signing, you can read about it here:
18:44:27.033 STDOUT tofu: https://opentofu.org/docs/cli/plugins/signing/
18:44:27.034 STDOUT tofu: OpenTofu has created a lock file .terraform.lock.hcl to record the provider
18:44:27.034 STDOUT tofu: selections it made above. Include this file in your version control repository
18:44:27.034 STDOUT tofu: so that OpenTofu can guarantee to make the same selections by default when
18:44:27.034 STDOUT tofu: you run "tofu init" in the future.
18:44:27.034 STDOUT tofu: OpenTofu has been successfully initialized!
18:44:27.035 STDOUT tofu:
18:44:27.035 STDOUT tofu: You may now begin working with OpenTofu. Try running "tofu plan" to see
18:44:27.035 STDOUT tofu: any changes that are required for your infrastructure. All OpenTofu commands
18:44:27.035 STDOUT tofu: should now work.
18:44:27.035 STDOUT tofu: If you ever set or change modules or backend configuration for OpenTofu,
18:44:27.035 STDOUT tofu: rerun this command to reinitialize your working directory. If you forget, other
18:44:27.035 STDOUT tofu: commands will detect it and remind you to do so if necessary.
18:44:27.362 STDOUT tofu: OpenTofu used the selected providers to generate the following execution
18:44:27.362 STDOUT tofu: plan. Resource actions are indicated with the following symbols:
18:44:27.362 STDOUT tofu: + create
18:44:27.362 STDOUT tofu: OpenTofu will perform the following actions:
18:44:27.362 STDOUT tofu: # local_file.file will be created
18:44:27.362 STDOUT tofu: + resource "local_file" "file" {
18:44:27.362 STDOUT tofu: + content = "Hello, World!"
18:44:27.362 STDOUT tofu: + content_base64sha256 = (known after apply)
18:44:27.362 STDOUT tofu: + content_base64sha512 = (known after apply)
18:44:27.362 STDOUT tofu: + content_md5 = (known after apply)
18:44:27.362 STDOUT tofu: + content_sha1 = (known after apply)
18:44:27.362 STDOUT tofu: + content_sha256 = (known after apply)
18:44:27.362 STDOUT tofu: + content_sha512 = (known after apply)
18:44:27.362 STDOUT tofu: + directory_permission = "0777"
18:44:27.362 STDOUT tofu: + file_permission = "0777"
18:44:27.362 STDOUT tofu: + filename = "./hi.txt"
18:44:27.362 STDOUT tofu: + id = (known after apply)
18:44:27.362 STDOUT tofu: }
18:44:27.362 STDOUT tofu: Plan: 1 to add, 0 to change, 0 to destroy.
18:44:27.362 STDOUT tofu:
18:44:27.383 STDOUT tofu: local_file.file: Creating...
18:44:27.384 STDOUT tofu: local_file.file: Creation complete after 0s [id=0a0a9f2a6772942557ab5355d76af442f8f65e01]
18:44:27.392 STDOUT tofu:
18:44:27.392 STDOUT tofu: Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
18:44:27.392 STDOUT tofu:
You might notice that this is a little more verbose than the output you’re used to seeing from running tofu
or terraform
directly. This is because Terragrunt does a bit of work behind the scenes to make sure that you can scale your OpenTofu/Terraform usage without running into common problems. As you get more comfortable with using Terragrunt on larger projects, you may find the extra information helpful.
If you would prefer that Terragrunt output look more like the output from tofu
or terraform
, you can use the --terragrunt-log-format bare
flag (or set the environment variable TERRAGRUNT_LOG_FORMAT=bare
) to reduce the verbosity of the output.
e.g.
$ terragrunt --terragrunt-log-format bare apply
local_file.file: Refreshing state... [id=0a0a9f2a6772942557ab5355d76af442f8f65e01]
No changes. Your infrastructure matches the configuration.
OpenTofu has compared your real infrastructure against your configuration and
found no differences, so no changes are needed.
Apply complete! Resources: 0 added, 0 changed, 0 destroyed.
The way dynamicity is handled in OpenTofu is via variable
configuration blocks. Let’s add one to our main.tf
so that we can control the content of the file we’re creating:
# foo/main.tf
variable "content" {}
resource "local_file" "file" {
content = var.content
filename = "${path.module}/hi.txt"
}
Now, just like when using tofu
alone, you can pass in the value for the content
variable using the -var
flag:
terragrunt apply -auto-approve -var content='Hello, Terragrunt!'
This is a common pattern when working with Infrastructure as Code (IaC). You typically create IaC that is relatively static, and then as you need to make configurations dynamic, you add variables to your configuration files to introduce dynamicity.
In the context of Terragrunt, a “unit” is a directory that contains a terragrunt.hcl
file, and it represents a single piece of infrastructure. You can think of a unit as a single instance of an OpenTofu/Terraform module.
Let’s create a copy of the foo
directory and call it bar
:
cd ..
cp -r foo bar
We now have two identical units in our project, foo
and bar
. We also have identical code in each of these directories, which is not ideal if we want to be able to avoid duplicating effort when we make changes to our infrastructure.
To avoid this duplication, we can introduce a new shared
directory, and reference that directory from both foo
and bar
. This way, we can make changes to our infrastructure in one place and have those changes apply to both units.
Let’s create a new directory called shared
:
mkdir shared
Now, move the main.tf
file from foo
to shared
:
mv foo/main.tf shared/main.tf
Finally, let’s update the foo
and bar
directories to reference the shared
directory. Update the main.tf
files in both foo
and bar
to look like this:
# foo/main.tf and bar/main.tf
variable "content" {}
module "shared" {
source = "../shared"
content = var.content
}
There’s now one place where the logic for the resource local_file.file
is defined, and both foo
and bar
reference that logic. You can imagine that as your infrastructure grows, it can become more and more advantageous to put repeated logic into shared modules like this.
This setup does have some problems, however. While you could keep navigating to the different units and running terragrunt apply
in each one with the appropriate -var
flags, this can quickly become tedious, as you have to know which units require which set of vars applied. You might decide to work around this by creating a file named terraform.tfvars
in each unit directory, but this also comes with some limitations that Terragrunt can help you avoid.
Luckily, Terragrunt has a built-in feature to control the inputs passed to your OpenTofu/Terraform configurations. This feature is called (aptly enough) inputs.
Let’s add inputs to both terragrunt.hcl
files in the foo
and bar
directories:
# foo/terragrunt.hcl
inputs = {
content = "Hello from foo, Terragrunt!"
}
# bar/terragrunt.hcl
inputs = {
content = "Hello from bar, Terragrunt!"
}
You don’t have to maintain the extra main.tf
files just to instantiate the module
blocks. You can use the terraform
block to handle this for you. Update the terragrunt.hcl
files in foo
and bar
to look like this:
# foo/terragrunt.hcl
terraform {
source = "../shared"
}
inputs = {
content = "Hello from foo, Terragrunt!"
}
# bar/terragrunt.hcl
terraform {
source = "../shared"
}
inputs = {
content = "Hello from bar, Terragrunt!"
}
And you can delete the main.tf
files from both foo
and bar
:
rm foo/main.tf bar/main.tf
This saves you some duplicated content, as you no longer need to maintain that extra content
variable in each main.tf
file. You can imagine that for especially large modules, the ability to define inputs in the terragrunt.hcl
file can save you a lot of time and effort. The patterns for your infrastructure are exclusively defined in .tf
files now, and the terragrunt.hcl
files are used to manage the instances of those patterns as units.
If you run terragrunt apply -auto-approve
in the foo
and bar
directories, you’ll see that the content
variable is set to the value you defined in the inputs
block of the terragrunt.hcl
file. You might also notice that there’s now a special .terragrunt-cache
directory generated for you in each unit directory. This is where Terragrunt copies the contents of modules, and performs any necessary additional code generation to make sure that your OpenTofu/Terraform code is ready to be run.
The .terragrunt-cache
directory is typically added to .gitignore
files, similar to the .terraform
directory that OpenTofu generates.
In the context of Terragrunt, a “stack” is a collection of units that are managed together. You can think of a stack as a single environment, such as dev
, staging
, or prod
, or an entire project.
One of the main reasons users adopt Terragrunt is how it can help manage the complexity of managing multiple units across multiple environments.
e.g. Let’s say we wanted to update both our foo
and bar
environments simultaneously.
In the directory above foo
and bar
, run the following:
$ terragrunt run-all apply -auto-approve
08:42:00.150 INFO The stack at . will be processed in the following order for command apply:
Group 1
- Module ./bar
- Module ./foo
Are you sure you want to run 'terragrunt apply' in each folder of the stack described above? (y/n) y
08:43:10.702 STDOUT [foo] tofu: local_file.file: Refreshing state... [id=c4ae21736a6297f44ea86791e528338e9d14a0e9]
08:43:10.702 STDOUT [bar] tofu: local_file.file: Refreshing state... [id=f855394a0316da09618c8b1fde7b91e00e759f80]
08:43:10.708 STDOUT [bar] tofu: No changes. Your infrastructure matches the configuration.
08:43:10.708 STDOUT [bar] tofu: OpenTofu has compared your real infrastructure against your configuration and
08:43:10.708 STDOUT [bar] tofu: found no differences, so no changes are needed.
08:43:10.708 STDOUT [foo] tofu: No changes. Your infrastructure matches the configuration.
08:43:10.708 STDOUT [foo] tofu: OpenTofu has compared your real infrastructure against your configuration and
08:43:10.708 STDOUT [foo] tofu: found no differences, so no changes are needed.
08:43:10.716 STDOUT [foo] tofu:
08:43:10.716 STDOUT [foo] tofu: Apply complete! Resources: 0 added, 0 changed, 0 destroyed.
08:43:10.716 STDOUT [foo] tofu:
08:43:10.720 STDOUT [bar] tofu:
08:43:10.720 STDOUT [bar] tofu: Apply complete! Resources: 0 added, 0 changed, 0 destroyed.
08:43:10.720 STDOUT [bar] tofu:
This is where that additional verbosity in Terragrunt logging is really handy. You can see that Terragrunt concurrently ran apply -auto-approve
in both the foo
and bar
units. The extra logging for Terragrunt also included information on the names of the units that were processed, and disambiguated the output from each unit.
Similar to the tofu
CLI, there is a prompt to confirm that you are sure you want to run the command in each unit when performing a command that’s potentially destructive. You can skip this prompt by using the --terragrunt-non-interactive
flag, just as you would with -auto-approve
in OpenTofu.
terragrunt run-all --terragrunt-non-interactive apply -auto-approve
In the context of Terragrunt, a Directed Acyclic Graph (DAG) that represents the graph units in your stack, determined by their dependencies. Terragrunt uses the DAG to determine the order in which it performs runs across your stack.
For example, let’s say that the content
of the bar
unit depended on the content
of the foo
unit. You can express this dependency first by adding an output
block to the shared
module:
# shared/output.tf
output "content" {
value = local_file.file.content
}
Then, you can update the bar
unit to depend on the foo
unit by using the dependencies
block in the terragrunt.hcl
file:
# bar/terragrunt.hcl
terraform {
source = "../shared"
}
dependency "foo" {
config_path = "../foo"
}
inputs = {
content = "Foo content: ${dependency.foo.outputs.content}"
}
Being good citizens of the IaC world, we should run a plan
before an apply
to see what changes Terragrunt will make to our infrastructure (note that you will get an error here. This is expected, and we’ll fix it in the next step):
$ terragrunt run-all plan
08:57:09.271 INFO The stack at . will be processed in the following order for command plan:
Group 1
- Module ./foo
Group 2
- Module ./bar
...
08:57:09.936 ERROR [bar] Module ./bar has finished with an error
08:57:09.936 ERROR error occurred:
* ./foo/terragrunt.hcl is a dependency of ./bar/terragrunt.hcl but detected no outputs. Either the target module has not been applied yet, or the module has no outputs. If this is expected, set the skip_outputs flag to true on the dependency block.
08:57:09.936 ERROR Unable to determine underlying exit code, so Terragrunt will exit with error code 1
Oh no! We got an error. This happens because the way in which dependencies are resolved by default in Terragrunt is to run terragrunt output
within the dependency for use in the dependent unit. In this case, the foo
unit has not been applied yet, so there are no outputs to fetch.
You should notice, however, that Terragrunt has already figured out the order in which to run the plan
command across the units in your stack. This is what we mean when we say that Terragrunt uses a DAG to determine the order in which to run commands across your stack. Terragrunt analyzes the dependencies across your units, and determines the order for runs so that outputs are ready to be used as inputs in dependent units.
If you instead decided to run terragrunt run-all apply -auto-approve
, you would instead see Terragrunt complete the apply
in the foo
unit first, and then complete the apply
in the bar
unit, as it’s aware that the bar
unit might need some outputs from the foo
unit.
In this scenario, most Terragrunt users leverage mock_outputs
to handle unavailable outputs (see limitations on accessing exposed config). Given that it’s expected that the foo
unit won’t be able to provide outputs until it’s applied, you can use the mock_outputs
block to provide a placeholder value for the content
output during the plan
phase.
# bar/terragrunt.hcl
terraform {
source = "../shared"
}
dependency "foo" {
config_path = "../foo"
mock_outputs = {
content = "Mocked content from foo"
}
}
inputs = {
content = "Foo content: ${dependency.foo.outputs.content}"
}
Re-running the plan
command should now complete successfully:
$ terragrunt run-all plan
09:29:03.461 INFO The stack at . will be processed in the following order for command plan:
Group 1
- Module ./foo
Group 2
- Module ./bar
...
09:29:03.644 WARN [bar] Config ./foo/terragrunt.hcl is a dependency of ./bar/terragrunt.hcl that has no outputs, but mock outputs provided and returning those in dependency output.
...
09:29:03.898 STDOUT [bar] tofu: + resource "local_file" "file" {
09:29:03.898 STDOUT [bar] tofu: + content = "Foo content: Mocked content from foo"
09:29:03.898 STDOUT [bar] tofu: + content_base64sha256 = (known after apply)
09:29:03.898 STDOUT [bar] tofu: + content_base64sha512 = (known after apply)
09:29:03.898 STDOUT [bar] tofu: + content_md5 = (known after apply)
09:29:03.898 STDOUT [bar] tofu: + content_sha1 = (known after apply)
09:29:03.898 STDOUT [bar] tofu: + content_sha256 = (known after apply)
09:29:03.898 STDOUT [bar] tofu: + content_sha512 = (known after apply)
09:29:03.898 STDOUT [bar] tofu: + directory_permission = "0777"
09:29:03.898 STDOUT [bar] tofu: + file_permission = "0777"
09:29:03.898 STDOUT [bar] tofu: + filename = "./hi.txt"
09:29:03.898 STDOUT [bar] tofu: + id = (known after apply)
09:29:03.898 STDOUT [bar] tofu: }
If you’re concerned about the mock_outputs
attribute resulting in invalid configurations, note that during an apply, the outputs of foo
will be known, and Terragrunt won’t use mock_outputs
to resolve the outputs of foo
.
$ terragrunt run-all --terragrunt-non-interactive apply -auto-approve
...
09:31:21.587 STDOUT [bar] tofu: + resource "local_file" "file" {
09:31:21.587 STDOUT [bar] tofu: + content = "Foo content: Hello from foo, Terragrunt!"
09:31:21.587 STDOUT [bar] tofu: + content_base64sha256 = (known after apply)
09:31:21.587 STDOUT [bar] tofu: + content_base64sha512 = (known after apply)
09:31:21.587 STDOUT [bar] tofu: + content_md5 = (known after apply)
09:31:21.587 STDOUT [bar] tofu: + content_sha1 = (known after apply)
09:31:21.587 STDOUT [bar] tofu: + content_sha256 = (known after apply)
09:31:21.587 STDOUT [bar] tofu: + content_sha512 = (known after apply)
09:31:21.587 STDOUT [bar] tofu: + directory_permission = "0777"
09:31:21.587 STDOUT [bar] tofu: + file_permission = "0777"
09:31:21.587 STDOUT [bar] tofu: + filename = "./hi.txt"
09:31:21.587 STDOUT [bar] tofu: + id = (known after apply)
09:31:21.587 STDOUT [bar] tofu: }
...
You can also be explicit about the fact that you only want to use mock_outputs
during the plan
phase by specifying that in your mock_outputs
configuration:
# bar/terragrunt.hcl
terraform {
source = "../shared"
}
dependency "foo" {
config_path = "../foo"
mock_outputs = {
content = "Mocked content from foo"
}
mock_outputs_allowed_terraform_commands = ["plan"]
}
inputs = {
content = "Foo content: ${dependency.foo.outputs.content}"
}
Something a little subtle just happened there. Note that the inputs
attribute is dynamic. This addresses some of the limitations mentioned earlier about using terraform.tfvars
files to manage inputs for units. Given that the bar
unit is dependent on output values from the foo
unit, you wouldn’t be able to use a terraform.tfvars
file to populate this variable without some additional tooling to populate it dynamically.
Terragrunt was spawned organically out of supporting Gruntwork customers using Terraform at scale, and features in the product are designed to address common problems like these that arise when managing OpenTofu/Terraform projects at scale in production.
Hopefully, following this simple tutorial has given you confidence in integrating Terragrunt into your existing OpenTofu/Terraform projects. Starting small, and gradually introducing more complex Terragrunt features is a great way to learn how Terragrunt can help you manage your infrastructure more effectively.
The next step of the Getting Started guide is to follow the Overview guide. This guide will introduce you to more advanced Terragrunt features, and show you how to use Terragrunt to manage your infrastructure across multiple environments in a real-world AWS account.
If you’re ready to get your hands dirty with more advanced Terragrunt features yourself, you can skip ahead to the Features section of the documentation.
If you ever need help with a particular problem, take a look at the resources available to you in the Support section. You are especially encouraged to join the Terragrunt Discord server, and become part of the Terragrunt community.