A solution accelerator to manage your Temporal resources in Terraform. This solution contains 3 flavors of Temporal Cloud configurations: starter and Google Cloud.
- Starter: uses Terraform to create and store mTLS certificates.
- Google Cloud: uses Google Cloud Secret Manager to store mTLS certificates.
- Azure: uses Azure Key Vault to store mTLS certificates.
- Terraform
Terraform v1.12.0was used to develop this solution.
- direnv
- Temporal Cloud API key
- uv
-
Copy the
.envrc.templatefile.cp .envrc.template .envrc
-
Populate the values in the
.envrcfile. -
Allow
direnvto source.envrcfile.direnv allow
There are 2 Terraform workspaces in this solution. To get started with running the Terraform workspace, see:
-
Sync Python dependencies with Python virtual environment.
uv sync
For each Terraform workspace, the Temporal hello workflow
would require different arguments to connect to Temporal Cloud. See below for commands
to run the hello workflow:
- Starter: Connect to Temporal Cloud
- Google Cloud: Connect to Temporal Cloud
- Azure: Connect to Temporal Cloud
- This project is provided "as is," without any warranties or guarantees, express or implied.
- Use of this project is at your own risk. It is your responsibility to validate its suitability for your specific use case.
- This project is authored and maintained by me in my personal capacity and is not associated with my employer. My employer assumes no liability for the use of this project and will not provide support for it.
- Any opinions expressed in this project are my own and do not reflect the views of my employer.
Unless otherwise stated, all contributions are my own. You are welcome to examine, learn from, and reuse the code and other assets in this project without intellectual property restrictions, subject to the above disclaimer. Attribution is appreciated if you find this project helpful.