Resourcely Documentation
LoginSign Up
  • Get Started
    • 🎱What is Resourcely?
    • 👋Why Resourcely
    • 🏃Quickstart
      • Terraform policies integrated into CI
      • Remediate policy violations in existing infrastructure
      • Templates for generating Terraform
      • Glossary
  • Concepts
    • Foundry
      • Create Blueprints with Foundry
      • Creating Guardrails with Foundry
      • lmport Terraform Modules
    • Guardrails
      • Writing your own Guardrails
      • Editing Guardrails
      • Releasing Guardrails
      • Enabling Inactive Guardrails
      • Guardrails in Action
        • 🐱GitHub Actions
        • 🦊GitLab Pipelines
    • Campaigns
      • Get started with Campaigns
      • Creating Campaigns
      • Remediate Resources
      • Campaign Agent
        • State File Support
          • Amazon Simple Storage Service (S3)
          • Google Cloud Storage (GCS)
          • HCP Terraform
          • Spacelift
        • Running Campaigns with GitHub Actions and a Repo-Hosted State File
        • Running Campaigns Locally
    • Blueprints
      • Authoring Your Own Blueprints
      • Using Built-in Resourcely Blueprints
      • Configuring Global Contexts
      • Deep Linking
    • Resources
      • Provisioning Infrastructure
      • Editing Infrastructure
      • Shopping Cart
      • Config Roots and Environments
    • Other Features and Settings
      • Global Values
      • Global Context
      • Metrics
      • Resourcely-cli
      • Resourcely.yaml
      • VCS Proxy
      • Settings
        • User management
        • Company Information
        • Notification Settings
        • Change Management
          • 🐱Connect to GitHub
          • 🦊Connect to Gitlab
        • Generate API Token
    • ✨Production Setup
      • Single Sign-On (SSO)
        • Auth0
        • AWS Single Sign-On
        • Azure AD
        • Google Workspace
        • JumpCloud
        • Okta
        • Omnissa Workspace ONE (formerly VMware)
        • OneLogin
        • Ping Identity
        • Other SAML / OIDC Providers
      • Source Code Management
        • Page
        • 🐱GitHub
        • 🦊GitLab
        • Atlassian Bitbucket
        • Azure Repos
  • Tutorials and guides
    • Remediation Use Cases
      • Apply tags to resources for automating backups
      • Implement centralized logging
    • Blueprints Use Cases
      • Automate Data Pipeline Creation
      • Encryption for GCP
      • AWS Account Factory
      • Streamline and govern AI
      • IAM Factory
      • Cost optimization for FinOps
      • Guardrails for Terraform Modules
    • Using the Resourcely Terraform Provider
      • Setup Resourcely Provider
      • Blueprints
      • Guardrails
      • Global Context
  • Integrate
    • CI/CD & Terraform Runners
      • Atlantis
      • 🐟AWS CodeBuild
      • Azure Pipelines
      • Buildkite
      • CircleCI
      • CloudBees CI
      • Codefresh
      • Digger
      • Env0
      • 🎏GitHub Actions
        • 🐱Local Plan
          • 🐹AWS with OpenID Connect
        • 🐶Terraform Cloud Integration
      • 🦊GitLab Pipelines
      • Harness
      • 🗻HashiCorp Cloud Platform (formerly Terraform Cloud)
      • Jenkins
      • Octopus Deploy
      • Scalr
      • 🌌Spacelift
      • Terramate
      • 🌎Terrateam
    • Cloud Providers
      • 🌨️Amazon Web Services (AWS)
      • 🤓Google Cloud Platform (GCP)
        • Guardrail Gaunlet at Google Cloud Next 2025
      • 💾Microsoft Azure
      • Alibaba Cloud
      • Huawei Cloud
      • IBM Cloud
      • Oracle Cloud Infrastructure (OCI)
      • Tencent Cloud
      • VMware vSphere
    • Developer Portals
      • Atlassian Compass
      • Backstage
      • Cortex
      • Harness IDP
      • Home grown internal developer portals
      • OpsLevel
      • Port
      • Roadie
    • ITSM
      • Atlassian Jira
      • FreshWorks
      • ServiceNow ITSM
      • ZenDesk
    • CSPM
      • Wiz
    • More Terraform Provider Integrations
      • 🚂ConductorOne Provider
      • Databricks Provider
      • Kubernetes Provider
      • 🐕Datadog Provider
      • ❄️Snowflake Provider
Powered by GitBook
On this page
  • Configuring Terraform Cloud for Resourcely
  • Adding External Cloud Provider Credentials
  • Creating a new Workspace (Version Control Integration)
  • Generating Team API Token
  1. Integrate
  2. CI/CD & Terraform Runners

HashiCorp Cloud Platform (formerly Terraform Cloud)

Setting up Terraform Cloud VCS Integration

PreviousHarnessNextJenkins

Last updated 1 year ago

allows you to manage runs in a consistent and reliable environment instead of on your local machine.

Resourcely supports all Terraform Cloud pricing tiers. For more information see the .

Resourcely leverages Terraform Cloud in order to:

  • Use Terraform in a consistent and reliable environment

  • Easily access shared state and secret data

  • Run Terraform within a repository using CI/CD

If you don't currently have a Terraform Cloud account, you can set one up using the following tutorial:

Once you have access to Terraform Cloud you must configure as stated below.

Configuring Terraform Cloud for Resourcely

Once you have a Terraform Cloud account you must configure it for use with Resourcely by performing the following:

  • Adding External Cloud Provider Credentials

  • Creating a new Workspace

  • Generating a Team Token

Adding External Cloud Provider Credentials

In order to provision resources using Resourcely, you must have permission to actually generate cloud resources using Terraform. This requires access to a cloud provider such as Amazon Web Services (AWS), Google Cloud Platform (GCP), or Microsoft Azure.

You can create a credential variable set by going through the following guide:

Creating a new Workspace (Version Control Integration)

Workspaces determine how Terraform Cloud organizes infrastructure. A workspace contains your Terraform configuration (infrastructure as code), shared variable values, your current and historical Terraform state, and run logs.

Adding the Version control workflow will enable Terraform plans to run whenever a code change is made within a branch. Resourcely will use that plan in order to validate guardrails before the infrastructure can be provisioned.

Generating Team API Token

Team API tokens are used by services, for example, a CI/CD pipeline, to perform plans and apply them on a workspace. Resourcely uses the token in order to verify the Terraform plan.

See the following documentation to learn how to generate a Team API Token:

An organization token is not valid and cannot be used to access a terraform plan which will cause a plan detection error when using the Resourcely CI/CD Job.

Be sure to save your token in a safe place, you will need to refer to it when setting up the Resourcely CI/CD job.

The team token you generate should have access to the workspace you will be using with Resourcely.

You must create a that stores your Terraform configuration in your git repos and triggers run based on pull requests and merges. See the following documentation to learn more:

🗻
Version control workflow
Terraform Cloud
Terraform
Terraform Pricing page
LogoWhat is Terraform Cloud - intro and sign up | Terraform | HashiCorp DeveloperWhat is Terraform Cloud - intro and sign up | Terraform | HashiCorp Developer
Introduction to Terraform Cloud
LogoCreate a credentials variable set | Terraform | HashiCorp DeveloperCreate a credentials variable set | Terraform | HashiCorp Developer
Tutorial on adding Cloud Provider Credentials
LogoCreating Workspaces - Workspaces - Terraform Cloud | Terraform | HashiCorp DeveloperCreating Workspaces - Workspaces - Terraform Cloud | Terraform | HashiCorp Developer
Creating Workspaces Documentation
LogoAPI Tokens - Terraform Cloud | Terraform | HashiCorp DeveloperAPI Tokens - Terraform Cloud | Terraform | HashiCorp Developer
API Token Documentation
API tokens may belong to a specific team