Terraform
- Terraform Enterprise
- v202507-1
- v202506-1
- v202505-1
- v202504-1
- v202503-1
- v202502-2
- v202502-1
- v202501-1
- v202411-2
- v202411-1
- v202410-1
- v202409-3
- v202409-2
- v202409-1
- v202408-1
- No versions of this document exist before v202408-1. Click below to redirect to the version homepage.
- v202407-1
- v202406-1
- v202405-1
- v202404-2
- v202404-1
- v202402-2
- v202402-1
- v202401-2
- v202401-1
- v202312-1
- v202311-1
- v202310-1
- v202309-1
- v202308-1
- v202307-1
- v202306-1
- v202305-2
- v202305-1
- v202304-1
- v202303-1
- v202302-1
- v202301-2
- v202301-1
- v202212-2
- v202212-1
- v202211-1
- v202210-1
- v202209-2
- v202209-1
- v202208-3
- v202208-2
- v202208-1
- v202207-2
- v202207-1
- v202206-1
Docker Engine Requirements
This topic describes the Docker engine requirements for deploy Terraform Enterprise to Replicated. For information about deploying Terraform Enterprise natively to Docker using Docker Compose, refer to Terraform Enterprise deployment overview. Deploying to Docker natively is faster than Replicated deployments and results in faster startups, reduced resource requirements, and improved security.
Terraform Enterprise requires at least one of the following Docker Engine configurations, in order of preference:
- Docker Engine 23.x - 25.x
Compatibility warning: Terraform Enterprise does not yet support the pre-installed Docker version that comes with Amazon Linux 2023. You must uninstall your Docker version and manually install Docker Engine 24.x to ensure compatibility with Terraform Enterprise.
Docker v20.10 is only supported on Amazon Linux 2. Docker v20.10 is no longer receiving updates from Docker, including security updates. Customers using Amazon Linux 2 are encouraged to move to an operating system that supports Docker 23 or 24. In order run Docker v20.10, you will need one of the following:
New online installations of Terraform Enterprise install a supported version of Docker Engine by default. Alternatively, you can install Docker Engine manually as long as you adhere to the above requirements.
Upgrades to Terraform Enterprise do not upgrade Docker Engine. It is your responsibility to keep Docker Engine up to date within these requirements to ensure stability and security.
Docker Compose Compatibility
Docker Engine comes prepackaged with Docker Compose and compatibility is assessed by meeting the Docker Engine requirements.
# Docker Engine 24.0
docker compose version
Docker Engine With a Compatible runc Version
Install a supported Docker Engine version.
Install the latest version of
containerdfor your operating system.On Debian/Ubuntu:
sudo apt install containerdOn RHEL/CentOS:
sudo yum install containerd.ioConfirm that the installed
containerdversion is 1.4.9, 1.5.5, or greater.containerd --versionConfirm that the installed
runcversion is v1.0.0-rc93 or greater:runc --versionIf your Docker Engine and
runcversions meet the requirements from previous steps, your system is properly configured. Otherwise, proceed to option 2.
Docker Engine With a Compatible libseccomp Version
-> Note: These instructions should only be used if your operating system does not meet the requirements detailed in Docker Engine With a Compatible runc Version.
Install a supported Docker Engine version.
Install the latest version of
libseccompfor your operating system.On Debian/Ubuntu:
sudo apt install libseccomp2On RHEL/CentOS:
sudo yum install libseccompConfirm that the installed
libseccompversion is 2.4.4 or greater.runc --versionIf your Docker Engine and
libseccompversions meet the requirements from previous steps, your system is properly configured. Otherwise, proceed to option 3.
Docker Engine Using a Modified libseccomp Profile
-> Note: These instructions should only be used if your operating system does not meet the requirements detailed in either Docker Engine With a Compatible runc Version or Docker Engine With a Compatible libseccomp Version.
Install a supported Docker Engine version.
Check if the file
/etc/docker/seccomp.jsonexists. If it does, proceed to step 4.Download the default moby
libseccompprofile and save it to the file/etc/docker/seccomp.json.sudo curl -L -o /etc/docker/seccomp.json \ https://raw.githubusercontent.com/moby/moby/master/profiles/seccomp/default.jsonIn the
/etc/docker/seccomp.jsonfile, change"defaultAction": "SCMP_ACT_ERRNO",to"defaultAction": "SCMP_ACT_TRACE",.sudo sed -i 's/"defaultAction":\s*"SCMP_ACT_ERRNO"/"defaultAction": "SCMP_ACT_TRACE"/1' /etc/docker/seccomp.json