Reading time: 2 minutes
Before using Scalr to run Terraform there are typically a few quick things that need to be set up.
Cloud Credentials - Add authentication for the cloud Terraform providers which will be injected as shell variables into workspaces.
VCS Providers - Connect Scalr to VCS for automated runs (we support all the most commonly used ones)
Grant Access - Invite users, create teams and grant access through IAM.
Environments - Create environments to host workspaces in logically related groups.
Workspaces - This is where Terraform runs. Connect a workspace linked to VCS for automated runs, or use them as a remote backend for the CLI.
Managed in the account.
Cloud credentials can be linked to environments so that the appropriate environment variables are injected into the workspaces for the associated provider. For example, if credentials are added for AWS these variables will be exported in the workspaces.
Multiple sets of credentials are permitted with different ones linked to different environments.
See Provider Credentials for details of setting up credentials for the major cloud providers.
In the account or any environment VCS provider connections can be created.
See VCS Providers for full details of configuring each type of VCS provider.
Managed in the account.
Users and teams are assigned access policies to give them permissions to access environments and workspaces.
Invite additional users
Create teams to enable collaboration
Grant access via access policies.
See Identity and Access Management for full details on granting access to Scalr.
Environments are collections of related workspaces that correspond to functional areas, SDLC stages, projects, or any grouping that is required.
The environment is where policies, credentials, registry modules, registry templates, and VCS providers can be created that will then be available or enforced on every workspace in that environment.
All objects managed in the account can be optionally shared across all environments.
Workspaces within an environment are where Terraform configurations are run to deploy infrastructure, and where state files are stored.
In the account.
Create environments as required.
Grant access policies to enable user and team access.
Link any cloud credentials that are required.
Create the workspaces for specific use cases.
Click the relevant link below for full details.