
If you're using Terraform to manage your infrastructure on Google Cloud, you'll inevitably need to configure a remote backend. The GCS backend block is the standard solution for storing your Terraform state files in a Google Cloud Storage bucket. This is an essential practice for team collaboration, state locking, and maintaining the integrity of your infrastructure as code.
The Terraform state file is a JSON file that acts as a record of your deployed resources. It maps your Terraform configuration to the actual resources in your Google Cloud project. Storing this file remotely with the GCS backend provides several key benefits:
terraform apply operations, which can lead to state file corruption and resource conflicts. Google Cloud Storage handles this locking automatically.To use the GCS backend, you need a pre-existing Google Cloud Storage bucket. It is a best practice to create a dedicated bucket for your Terraform state files.
Here's a basic GCS backend block configuration:
terraform {
backend "gcs" {
bucket = "my-terraform-state-bucket"
prefix = "my-app"
}
}
bucket: The globally unique name of your GCS bucket.prefix: The path within the bucket where the state file will be stored. The state file will be named <prefix>/terraform.tfstate.After adding this block to your main Terraform configuration file, you must run terraform init. This command initializes the backend and prompts you to migrate any existing local state to the remote GCS bucket.
The GCS backend is essential for any serious Terraform project.
Best Practices:
You should never hardcode credentials like service account keys directly in your configuration. Instead, use one of the supported authentication methods:
gcloud CLI, Terraform can use those credentials automatically.GOOGLE_APPLICATION_CREDENTIALS which points to a service account key file.This is the easiest way to get started with local development. When you authenticate with the gcloud CLI, it sets up Application Default Credentials (ADC) which Terraform uses automatically.
Run Terraform commands without any extra authentication configuration:
terraform init
Set your project (if you have multiple):
gcloud config set project <your-project-id>
Log in to GCP:
gcloud auth application-default login
This approach keeps sensitive information out of your code. You can download a service account key file and point to it using an environment variable.
export GOOGLE_APPLICATION_CREDENTIALS="/path/to/your/keyfile.json"
terraform init
This is the most secure method for authenticating resources running inside GCP, such as a Compute Engine instance or Cloud Build job. You attach a service account to the resource, and Terraform assumes that service account's permissions automatically.
Storage Object Admin role is a common choice.Terraform's design prevents you from using variables directly inside the backend block. However, you can leave out sensitive or environment-specific information and supply it at runtime using a backend configuration file or command-line flags with terraform init.
Example using a file:
Run terraform init:
terraform init -backend-config="backend.conf"
backend.conf (sensitive info):
bucket = "my-terraform-state-bucket"
main.tf (partial config):
terraform {
backend "gcs" {
prefix = "my-app"
}
}
This method prevents sensitive information from being committed to source control.
For a single configuration that deploys to multiple environments, Terraform workspaces can be used to manage different state files within the same bucket.
Example:
# Create and switch to a development workspace
terraform workspace new dev
# Create and switch to a production workspace
terraform workspace new prod
When you switch between workspaces, Terraform automatically changes the prefix to include the workspace name (e.g., my-app/env:/dev/terraform.tfstate), ensuring each environment has its own isolated state file.
While the classic Terraform CLI maintains its strict rule against dynamic backend blocks, the OpenTofu project, a fork of Terraform, has broken with this convention.
OpenTofu, starting with version 1.8, introduced the ability to use variables and local values within the backend block. This is a significant feature that addresses one of the most long-standing user requests in the Terraform community.
With OpenTofu, you can now write a more flexible and DRY (Don't Repeat Yourself) backend configuration, particularly useful for multi-environment setups.
Here's how a dynamic gcs backend block could look in OpenTofu:
variable "env" {
type = string
default = "dev"
}
terraform {
backend "gcs" {
bucket = "my-terraform-state-${var.env}-bucket"
prefix = "my-app-${var.env}"
}
}
This simple configuration allows you to switch between environments by simply changing the env variable. You can pass the variable at the command line:
tofu init -backend-config="env=prod"
This removes the need for separate backend configuration files or complex scripts to handle different environments, making your codebase cleaner and less prone to manual errors. For teams managing many similar environments, or for those who simply prefer a more concise and variable-driven configuration, OpenTofu's support for dynamic backend blocks is a game-changer.
This blog has been verified for Terraform and OpenTofu
