Did you know that there are over 3000 jobs on LinkedIn that require Terraform expertise? Terraform is the first multi-cloud immutable infrastructure tool for developing, changing and versioning infrastructure safely and efficiently. Terraform can also manage existing service providers and custom in-house solutions.
Qwiklabs can help you learn how to take advantage of what Terraform has to offer. Enroll in the Managing Cloud Infrastructure with Terraform Quest by Thursday, August 30th and you’ll get 40 credits. Use these credits to launch a range of configurations, from simple servers to full load-balanced applications.
If you’re new to GCP, consider tackling the Baseline: Deploy & Develop Quest first. Are you an experienced Google Cloud user? Here’s how the Managing Cloud Infrastructure with Terraform Quest can help you get more comfortable with Terraform:
- Using a NAT Gateway with Kubernetes Engine: This lab gives you practice with creating a Kubernetes Engine cluster and configuring a Compute Engine route for your cluster.
After creating a Kubernetes engine cluster, you’ll extract the Kubernetes engine master IP and network tag name using the gcloud command-line tool:
And then deploy the NAT gateway instance using Terraform commands.
- Modular Load Balancing with Terraform – Regional Load Balancer: GCP uses forwarding rules to construct a load balancer across multiple regions and instance groups. Since these forwarding rules are combined with backend services, target pools, URL maps and target proxies, Terraform uses modules to simplify the provisioning of load balancers.
In this lab, you’ll work with different modules to create various load balancers. For example, in the terraform-google-lb-http (global HTTP(S) forwarding rule) module, you’ll provide a reference to the managed instance group and certificates for SSL termination. Then the module creates a global HTTP load balancer for multi-regional content.
Do you know what happens behind the scenes? The module creates the http backend service, URL map, HTTP(S) target proxy, and the global http forwarding rule to route traffic based on HTTP paths to healthy instances:
- Using Vault on Compute Engine for Secret Management: Terraform stores encrypted keys and authentication tokens in Cloud Storage buckets for Vault assets. In this lab, you’ll use Terraform to deploy Vault to GCP Compute Engine. See the Cloud KMS documentation for details on storing secrets in Cloud Storage.
You’ll then unseal the Vault after getting the decrypted keys from Cloud Storage:
Are your results similar to the example output? Share your results @Qwiklabs.
- Cloud SQL with Terraform: In this lab you’ll create Cloud SQL instances with Terraform, set up the Cloud SQL Proxy and test the database connection with both MySQL and PostgreSQL clients.
Enroll now to either build career opportunities or to boost your team’s efficiency.