You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/continuous-delivery/cd-infrastructure/terraform-infra/run-a-terraform-plan-with-the-terraform-apply-step.md
+54-1Lines changed: 54 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -269,7 +269,13 @@ This allows you to specify a different workspace name each time the Pipeline is
269
269
270
270
You can even set a Harness Trigger where you can set the workspace name used in **Workspace**.
271
271
272
-
## AWS Connector Provider Credential Authentication for Terraform Plan and Apply Steps
272
+
## Connector Credentials
273
+
274
+
You can use a connector to authenticate with the target cloud provider. This is an optional configuration that takes the connector reference. The Terraform step uses this connector to authenticate with the cloud provider targeted for infrastructure provisioning.
275
+
276
+
This connector configuration is available in the **Terraform Apply** step when the **Configuration Type** is set to **Inline**.
277
+
278
+
### AWS Connector
273
279
274
280
:::note
275
281
This feature requires Harness Delegate version 81202. This feature is available only to paid customers. Contact [Harness Support](mailto:[email protected]) to enable the feature.
@@ -281,6 +287,9 @@ By default, AWS assumes the role session duration as 900 seconds. To increase th
281
287
282
288
When configured the optional configuration for AWS Connector these fields can be passed as a fixed value, runtime input, or an expression
283
289
290
+
<details>
291
+
<summary>Sample YAML</summary>
292
+
284
293
```YAML
285
294
- step:
286
295
type: TerraformApply
@@ -301,6 +310,7 @@ When configured the optional configuration for AWS Connector these fields can be
301
310
roleArn: <+input>
302
311
timeout: 10m
303
312
```
313
+
</details>
304
314
305
315
#### Terraform variable files
306
316
@@ -338,6 +348,49 @@ In **File Paths**, add one or more file paths from the root of the bucket to the
338
348
339
349
Click **Submit**. The remote file(s) are added.
340
350
351
+
### Azure Connector
352
+
353
+
Harness Terraform steps now support authenticating with Azure using Azure connectors for target provisioning. This enables seamless integration with Azure infrastructure when running Terraform Plan, Apply, and Destroy steps with inline Terraform configuration.
354
+
355
+
#### Key Features
356
+
357
+
- **Azure Connector support:** Authenticate Terraform operations using Azure connectors configured in Harness.
358
+
- **Authentication methods:** Manual credentials, Delegate-based credentials, OIDC token-based authentication are supported. Certificate-based authentication is **not supported** yet.
359
+
- **Additional options:** Default configuration can be overridden with environment variables like ARM_TENANT_ID and ARM_MSI_ENDPOINT for advanced scenarios.
360
+
361
+
For more information on how to setup an Azure connector, go to [Azure Connector Settings Reference](/docs/platform/connectors/cloud-providers/add-a-microsoft-azure-connector).
Copy file name to clipboardExpand all lines: docs/continuous-delivery/cd-infrastructure/terraform-infra/run-a-terraform-plan-with-the-terraform-plan-step.md
+60-4Lines changed: 60 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -272,20 +272,32 @@ This allows you to specify a different workspace name each time the Pipeline is
272
272
273
273
You can even set a Harness Trigger where you can set the workspace name used in **Workspace**.
274
274
275
-
## AWS Connector Provider Credential Authentication for Terraform Plan and Apply Steps
275
+
## Connector Credentials
276
+
277
+
You can use a connector to authenticate with the target cloud provider. This is an optional configuration that takes the connector reference. The Terraform step uses this connector to authenticate with the cloud provider targeted for infrastructure provisioning.
278
+
279
+
This connector configuration is available in the **Terraform Plan** step. It also appears in the **Terraform Apply** and **Terraform Destroy** steps when the **Configuration Type** is set to **Inline**.
280
+
281
+
<divalign="center">
282
+
<DocImage path={require('./static/connector-credentials.png')} width="60%" height="60%" title="Click to view full size image" />
283
+
</div>
284
+
285
+
### AWS Connector
276
286
277
287
:::note
278
288
This feature requires Harness Delegate version 81202. This feature is available only to paid customers. Contact [Harness Support](mailto:[email protected]) to enable the feature.
279
289
:::
280
290
281
-
282
291
You can use an AWS connector to have the Terraform Plan and Apply step assume a role to perform infrastructure provisioning. It's an optional configuration that takes the AWS connector, a region and Role ARN. The Terraform step uses these parameters to authenticate the AWS account targeted for infrastructure provisioning.
283
292
284
293
By default, AWS assumes the role session duration as 900 seconds. To increase the AWS role session duration, a built-in environment variable, `HARNESS_AWS_ASSUME_ROLE_DURATION` is introduced, which can be used to override the assume role session duration. `HARNESS_AWS_ASSUME_ROLE_DURATION` is designed for use in Terraform steps in the environment variable section. The value must be set in seconds. This new environment variable requires Harness Delegate version 82700.
285
294
286
-
When configured the optional configuration for AWS Connector these fields can be passed as a fixed value, runtime input, or an expression
295
+
When configured the optional configuration for AWS Connector these fields can be passed as a fixed value, runtime input, or an expression.
296
+
297
+
<details>
298
+
<summary>Sample YAML</summary>
287
299
288
-
```YAML
300
+
```yaml
289
301
- step:
290
302
type: TerraformApply
291
303
name: Apply
@@ -305,6 +317,7 @@ When configured the optional configuration for AWS Connector these fields can be
305
317
roleArn: <+input>
306
318
timeout: 10m
307
319
```
320
+
</details>
308
321
309
322
#### Terraform variable files
310
323
@@ -325,6 +338,49 @@ See [Artifactory Connector Settings Reference](/docs/platform/connectors/cloud-p
325
338
326
339
Click **Submit**. The remote file(s) are added.
327
340
341
+
### Azure Connector
342
+
343
+
Harness Terraform steps now support authenticating with Azure using Azure connectors for target provisioning. This enables seamless integration with Azure infrastructure when running Terraform Plan, Apply, and Destroy steps with inline Terraform configuration.
344
+
345
+
#### Key Features
346
+
347
+
- **Azure Connector support:** Authenticate Terraform operations using Azure connectors configured in Harness.
348
+
- **Authentication methods:** Manual credentials, Delegate-based credentials, OIDC token-based authentication are supported. Certificate-based authentication is **not supported** yet.
349
+
- **Additional options:** Default configuration can be overridden with environment variables like ARM_TENANT_ID and ARM_MSI_ENDPOINT for advanced scenarios.
350
+
351
+
For more information on how to setup an Azure connector, go to [Azure Connector Settings Reference](/docs/platform/connectors/cloud-providers/add-a-microsoft-azure-connector).
0 commit comments