How To Create SSH keypair on OpenStack using Terraform

Depending on the cloud image from which the instance is provisioned, an instance on any cloud platform comes with a virtual server running a base operating system such as CentOS, Ubuntu, Debian, FreeBSD, etc.

Secure Shell (SSH) keys are essential to utilize in order to authenticate and access OpenStack instances securely. Although OpenStack provides the ability to manually create the keys, this makes it efficient and standard by creating them automatically with Terraform. We will use an ssh_keypair terraform module to accomplish this.

How To Create SSH keypair on OpenStack using Terraform

In this guide, we’ll explore how to automate the creation of an SSH keypair in OpenStack using Terraform, leveraging the ssh_keypair module from the cloudspinx/terraform-openstack repository.

Prerequisites

Before you can proceed, ensure you have the following:

  • An active OpenStack environment
  • Terraformed installed on local environment
  • OpenStack credentials

Step 1: Install Terraform

If you don’t have terraform installed, run one of the following commands that match your working environment:

# Ubuntu/Debian
wget -O - https://apt.releases.hashicorp.com/gpg | sudo gpg --dearmor -o /usr/share/keyrings/hashicorp-archive-keyring.gpg
echo "deb [arch=$(dpkg --print-architecture) signed-by=/usr/share/keyrings/hashicorp-archive-keyring.gpg] https://apt.releases.hashicorp.com $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/hashicorp.list
sudo apt update && sudo apt install terraform

# CentOS/RHEL
sudo yum install -y yum-utils
sudo yum-config-manager --add-repo https://rpm.releases.hashicorp.com/RHEL/hashicorp.repo
sudo yum -y install terraform

# Fedora
sudo dnf install -y dnf-plugins-core
sudo dnf config-manager addrepo --from-repofile=https://rpm.releases.hashicorp.com/fedora/hashicorp.repo
sudo dnf -y install terraform

# Amazon Linux
sudo yum install -y yum-utils shadow-utils
sudo yum-config-manager --add-repo https://rpm.releases.hashicorp.com/AmazonLinux/hashicorp.repo
sudo yum -y install terraform

# macOS Homebrew
brew tap hashicorp/tap
brew install hashicorp/tap/terraform

Step 2: Create Terraform Working Directory

You can structure your directory as follows:

terraform-openstack/
├── main.tf               # Provider and resource definitions                    
├── modules               # Modules, including kepair
│   ├── keypair/          # The module you're using
│   │   ├── main.tf       
│   │   ├── variables.tf  # Define any variables
│   │   ├── outputs.tf    # Optional outputs 
│   └── other_modules/
└── terraform.tfvars      # (Optional) Declare variable values

Create the directory and subdirectoy:

mkdir terraform-openstack && cd terraform-openstack
mkdir modules && cd modules
mkdir keypair 

Step 3: Keypair Module Overview

The keypair module creates and manages keypairs using the openstack_compute_keypair_v2 resource. This module takes parameters like the name of the keypair and the content or file location of the public key.

Here’s how the module is configured:

main.tf:

Here’s where the SSH Keypair Resource is defined:

# Define the OpenStack key pair resource
resource "openstack_compute_keypair_v2" "keypair" {
  name       = var.keypair_name
  public_key = var.public_key
}

# Optionally, you can also define a resource to delete the keypair (if desired)
resource "openstack_compute_keypair_v2" "keypair_delete" {
  count = var.delete_keypair ? 1 : 0
  name  = var.keypair_name
}

The module also defines a resource for deleting an SSH keypair if you desire.

variables.tf:

Now, since the module takes in the kepair name and public_key itself as variables, you definitely need a variables.tf file.

variable "keypair_name" {
  description = "The name of the OpenStack key pair"
  type        = string
}

variable "public_key" {
  description = "The public key to be used for the key pair"
  type        = string
}

variable "delete_keypair" {
  description = "Whether to delete the key pair. Set to true to delete."
  type        = bool
  default     = false
}

outputs.tf:

output "keypair_name" {
  description = "The name of the created OpenStack key pair"
  value       = openstack_compute_keypair_v2.keypair.name
}

Step 4: Using the keypair module

To use the module, begin by defining the OpenStack provider in your terraform setup to authenticate the with your OpenStack environment:

# Define required providers
terraform {
  required_version = ">= 0.14.0"
  required_providers {
    openstack = {
      source = "terraform-provider-openstack/openstack"
      version = "~> 2.1.0"
    }
  }
}

# Configure the OpenStack Provider
provider "openstack" {
  user_name   = "admin"
  tenant_name = "admin"
  password    = "pwd"
  auth_url    = "http://myauthurl:5000/v3"
  region      = "RegionOne"
}

To use the module, reference it in your terraform configuration as follows:

module "keypair" {

  source       = "git::https://github.com/cloudspinx/terraform-openstack.git//modules/keypair?ref=main"
  # To use your local module: source "./modules/keypair"
  keypair_name = "my-keypair"
  public_key   = file("path/to/your/public/key.pub")
}

With the provider and module configurations done, intialize terraform and then apply:

terraform init
terraform plan 
terraform apply

Verify the creation of the SSH Keypair on OpenStack.

openstack keypair list

Conclusion

This article is a comprehensive guide to automating the creation of SSH keypairs in OpenStack using Terraform. We leverage a terraform module to integrate keypair management into your IaC. We previously did an article on Uploading VM images to OpenStack using terraform.

Check it out:

More articles on the same:

Your IT Journey Starts Here!

Ready to level up your IT skills? Our new eLearning platform is coming soon to help you master the latest technologies.

Be the first to know when we launch! Join our waitlist now.

Join our Linux and open source community. Subscribe to our newsletter for tips, tricks, and collaboration opportunities!

Recent Post

Leave a Comment

Your email address will not be published. Required fields are marked *

Related Post

Most Ubuntu installations will have systemd-resolved service enabled to provide network name resolution to the local applications running on the […]

Kitty is a cross-platform GPU-based terminal emulator. It is feature-rich, written in Python and Objective C. It can easily be […]

Alacritty is the fastest available Linux terminal emulator. It makes use of GPU (Graphical Processing Unit) for rendering ensuring optimization […]

Let's Connect

Unleash the full potential of your business with CloudSpinx. Our expert solutions specialists are standing by to answer your questions and tailor a plan that perfectly aligns with your unique needs.
You will get a response from our solutions specialist within 12 hours
We understand emergencies can be stressful. For immediate assistance, chat with us now

Contact CloudSpinx today!

Download CloudSpinx Profile

Discover the full spectrum of our expertise and services by downloading our detailed Company Profile. Simply enter your first name, last name, and email address.