root@deploymentmachine:/home/terra/vcn_public# terraform init
Initializing the backend...
Initializing provider plugins...
- Finding latest version of hashicorp/oci...
- Installing hashicorp/oci v4.12.0...
- Installed hashicorp/oci v4.12.0 (signed by HashiCorp)
Terraform has created a lock file .terraform.lock.hcl to record the provider
selections it made above. Include this file in your version control repository
so that Terraform can guarantee to make the same selections by default when
you run "terraform init" in the future.
Terraform has been successfully initialized!
You may now begin working with Terraform. Try running "terraform plan" to see
any changes that are required for your infrastructure. All Terraform commands
should now work.
If you ever set or change modules or backend configuration for Terraform,
rerun this command to reinitialize your working directory. If you forget, other
commands will detect it and remind you to do so if necessary.
... then terraform plan, and if all good, "terraform apply"
root@deploymentmachine:/home/terra/vcn_public# terraform plan
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
+ create
Terraform will perform the following actions:
# oci_core_virtual_network.WildTestVCN will be created
+ resource "oci_core_virtual_network" "WildTestVCN" {
+ cidr_block = (known after apply)
+ cidr_blocks = [
+ "10.0.0.0/16",
]
[ ......... snip ............]
root@deploymentmachine:/home/terra/vcn_public#terraform apply
[ ......... snip ............]
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
oci_core_virtual_network.WildTestVCN: Creating...
oci_core_virtual_network.WildTestVCN: Creation complete after 0s [id=ocid1.vcn.oc1.eu-frankfurt-1.amaaaaaa34qs2dyae36yqymbevoeg52h7ijecnsokpft6swazq6e77fxqvlq]
Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
And let's check in the Cloud, to see if it has been created:
... still, no resources (subnets, especially) for this VCN (except a few default ones):
2. Create a Subnet
To add a subnet to a VCN, you need to use the Terraform resource oci core subnet
Time to remind ourselves once again, about what we did at "Start VCN Wizard" ... remember that we also defined the subnets CIDR:
Let's use "10.0.1.0/24" for our subnet, and define it in our "variable.tf" file:
... then, run "terraform plan" to see the changes that are about to be implemented
... and of course, make changes with "terraform apply"
root@deploymentmachine:/home/terra/vcn_public# terraform apply
[ ......... snip ............]
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
oci_core_subnet.WildTestSubnet: Creating...
oci_core_subnet.WildTestSubnet: Creation complete after 1s [id=ocid1.subnet.oc1.eu-frankfurt-1.aaaaaaaahahahahafakeid12334324342]
Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
root@deploymentmachine:/home/terra/vcn_public#
And let's check in the Cloud:
3. Public Subnet, Security List and Internet Gateway
What does a Public Subnet imply? - access the Internet, inbound and outbound. This means that my VCN requires an Internet Gateway if I want to reach directly from workstation the instances/services that I deploy inside the VCN.
What else? This "public access" comes with a high price - I can't just leave my instances/services in plain sight, therefore I need to apply Security Lists (virtual firewall) that can control the traffic.
3.1 Create the internet gateway
For internet gateway creation, we will be using the Terraform resource oci core internet gatewayFor this too, I will create another file, int_gateway.tf, under my working directory.
... and make the new changes with "terraform apply"
root@deploymentmachine:/home/terra/vcn_public# terraform apply
[ ......... snip ............]
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
oci_core_internet_gateway.WildTestInternetGateway: Creating...
oci_core_security_list.WildTestSecurityList: Creating...
oci_core_internet_gateway.WildTestInternetGateway: Creation complete after 1s [id=ocid1.internetgateway.oc1.eu-frankfurt-1.aaaaaaaaaxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx]
oci_core_security_list.WildTestSecurityList: Creation complete after 1s [id=ocid1.securitylist.oc1.eu-frankfurt-1.aaaaaaaaayyyyyyyyyyyyyyyyyyyyyyyyy]
Apply complete! Resources: 2 added, 0 changed, 0 destroyed.
And let's check again in our Cloud:
for security list (ingress and egress):
for internet gateway
4. Route table
At 'Internet Gateway', notice the "Default Route Table" is set to "Default Route Table for WildTestVCN", and there is only one resource of Route Tables:
Route tables are used to direct the traffic; not to mention that in our case we have a Public IP that needs to access directly the internet.
For the creation of the route table, we will use the Terraform resource oci core route table
Our route.tf file will have the following content:
root@deploymentmachine:/home/terra/vcn_public# terraform apply
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
oci_core_route_table.WildTestRouteTable: Creating...
oci_core_route_table.WildTestRouteTable: Creation complete after 1s [id=ocid1.routetable.oc1.eu-frankfurt-1.aaaaaaaaxyzkdfsdfsdfsdfsdfsdf123]
Apply complete! Resources: 1 added, 0 changed, 0 destroyed.
And let's check in the Cloud if it has been created:
5. DHCP Options, DNS and, once again, Subnet
You need the DHCP options to specify the DNS type of each instance.
root@deploymentmachine:/home/terra/vcn_public# terraform apply
[.................. snip ....................]
Do you want to perform these actions?
Terraform will perform the actions described above.
Only 'yes' will be accepted to approve.
Enter a value: yes
[.................. snip ....................]
Apply complete! Resources: 6 added, 0 changed, 5 destroyed.
And let's check in the Cloud
for DNS:
for DHCP
6. Test your VCN
Let's create an instance in the OCI UI that will be deployed in the VCN we just created, and see if we can access it via ssh:
Provide the ssh keys (here, providing the workstation's ssh keys):
After the creation, log in via ssh, using the public IP:
7. Destroy VCN resources
Terminate the instance you created as an example, and then, proceed to terminate the VCN and its resources with "terraform destroy":
root@deploymentmachine:/home/terra/vcn_public# terraform destroy
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
- destroy
[ ............ snip ............ ]
Destroy complete! Resources: 6 destroyed