Skip to main content

Proxmox VM Creation using Terraform and Gitlab Pipelines

Overview

This documentation describes how to build and manage virtual machines (VMs) on a Proxmox Virtual Environment (PVE) cluster using Terraform and GitLab CI/CD pipelines. The goal is to provide a reusable, cloud-agnostic, and environment-independent approach suitable for organizations who want to automate VM provisioning and lifecycle management.

This guide explains:

  • The key concepts behind Terraform-based VM automation
  • The goal and architecture of a GitOps-style workflow
  • How to structure your Terraform project
  • How to run and automate provisioning using GitLab pipelines
  • How to adapt the solution to your own infrastructure

Prerequisites

Before implementing this Terraform–Proxmox automation stack, ensure the following requirements are met:

1. Proxmox Environment

    A running Proxmox VE node or cluster (version 6.4 or later recommended) A cloud-init enabled VM template (e.g., Ubuntu 22.04/24.04) A configured network bridge (e.g., vmbr0) and optional VLAN setup Storage available for VM disks (local-lvm, ZFS, Ceph, NFS, etc.) A Proxmox API token with permissions to clone templates and manage VMs

    2. Terraform Requirements

      Terraform v0.13+ (v1.0+ recommended) Installed locally or executed through GitLab CI/CD Access to the required Terraform provider (Telmate/proxmox)

      3. GitLab Requirements

        A GitLab project to host:
          Terraform code CI/CD pipeline (.gitlab-ci.yml) HTTP backend Terraform state (GitLab Terraform state storage) A GitLab

          Goals

          The solution aims to:

          • Provide Infrastructure-as-Code (IaC) for consistent, repeatable Proxmox VM creation.
          • Enable GitOps workflows, where all VM configurations live in git and are changed via merge requests.
          • Support environment-independent reuse, allowing teams to manage Proxmox VMs in test, staging, or production environments.
          • Automate cloud-init based VM provisioning using Proxmox templates.
          • Use GitLab CI/CD to plan, review, and apply changes with auditability and access control.

          Key Concepts

          1. Proxmox Provider for Terraform

          The Terraform provider (commonly Telmate/proxmox) communicates with the PVE API using an API token. Terraform can then create, update, or destroy VMs.

          2. Cloud-Init Templates

          VMs are provisioned by cloning from a cloud-init enabled template. This ensures:

          • Automated initial user creation
          • SSH key injection
          • Network configuration
          • Custom startup scripts

          3. Remote State Backend

          Storing Terraform state in a GitLab HTTP backend ensures:

          • Shared state across the team
          • State locking (prevents concurrent apply operations)
          • Secure storage

          4. GitOps Workflow

          Using GitLab pipelines adds structure:

          • Create MR → Run validation → Review plan → Apply after approval
          • Automated, controlled infrastructure changes

          Architecture

          Local Machine / GitLab Runner
                |
                | Terraform Commands
                v
          GitLab CI/CD Pipeline
                |
                | uses HTTP Remote State
                v
             GitLab Terraform State Storage
                |
                | PVE API Calls
                v
          Proxmox Cluster → Clone cloud-init template → Provision VM → Configure network/user
          

          Components

          • Terraform project: Holds the VM definitions, provider config, variables, and modules.
          • Cloud-init VM template: Pre-created in Proxmox, used as master image.
          • GitLab CI pipeline: Runs validate, plan, and apply steps.
          • HTTP backend: Stores Terraform state in GitLab.
          • Secret management: API tokens and SSH keys are stored as secure CI/CD variables.

          Project Layout

          A typical structure:

          proxmox-terraform/
          │
          ├── provider.tf              # Provider configuration and backend
          ├── variables.tf             # Input variables
          ├── vm-ubuntu01.tf           # VM definition (example)
          ├── vm-ubuntu02.tf           # Additional VM(s)
          ├── gitops-prod.yml          # GitLab CI pipeline
          └── .terraform.lock.hcl      # Provider lock file
          

          What belongs where?

          • provider.tf: Sets Proxmox provider and remote state backend.
          • vm-*.tf files: Define CPU, RAM, disk, network, and cloud-init settings per VM.
          • gitops-prod.yml: Automation pipeline for GitOps workflow.
          • variables.tf: Define required variables such as API tokens, SSH keys, VM sizes, etc.

          Example provider.tf

          Below is a generalized example of a provider.tf that configures:

          • Terraform version
          • HTTP backend (e.g., GitLab Terraform state)
          • Proxmox provider
          • Variables for API access and VM credentials
          terraform {
          
            required_version = ">= 0.13.0"
          
            backend "http" {
            }
          
            required_providers {
              proxmox = {
                source  = "Telmate/proxmox"
                version = "3.0.2-rc04"
              }
            }
          }
          
          variable "PROXMOX_API_URL" {
            type = string
          }
          
          variable "PROXMOX_API_TOKEN_ID" {
            type = string
          }
          
          variable "PROXMOX_API_TOKEN_SECRET" {
            type = string
          }
          
          variable "VM_USER_PASSWORD" {
            type = string
          }
          
          variable "VM_USER_SSHKEY" {
            type = string
          }
          
          provider "proxmox" {
            pm_api_url          = var.PROXMOX_API_URL
            pm_api_token_id     = var.PROXMOX_API_TOKEN_ID
            pm_api_token_secret = var.PROXMOX_API_TOKEN_SECRET
            pm_tls_insecure     = false
          }
          

          You can supply the variables either via terraform.tfvars, environment variables (TF_VAR_*), or your CI/CD system. In this example we use the Gitlab CI/CD variables for centralized secret management capability.


          Defining VMs with Terraform

          A generalized VM definition looks like this:

          resource "proxmox_vm_qemu" "example" {
            name        = var.vm_name
            target_node = var.proxmox_node
          
            clone       = var.template
            full_clone  = false
            onboot      = true
          
            cores       = var.cpu
            memory      = var.memory
          
            disks {
              scsi { scsi0 = "local-lvm:${var.disk_size}G" }
            }
          
            network {
              model  = "virtio"
              bridge = "vmbr0"
            }
          
            ipconfig0 = "ip=${var.ip}/24,gw=${var.gateway}"
          
            ciuser     = var.vm_user
            cipassword = var.vm_user_password
            sshkeys    = var.vm_user_sshkey
          }
          

          Running Terraform Locally

          export TF_VAR_PROXMOX_API_URL="https://proxmox.example.com:8006/api2/json"
          export TF_VAR_PROXMOX_API_TOKEN_ID="user@pve!token-name"
          export TF_VAR_PROXMOX_API_TOKEN_SECRET="***"
          export TF_VAR_VM_USER_PASSWORD="***"
          export TF_VAR_VM_USER_SSHKEY="$(cat ~/.ssh/id_rsa.pub)"
          
          terraform init -reconfigure
          terraform plan -out plan.tfplan
          terraform apply plan.tfplan
          

          GitLab CI/CD Pipeline

          Below is an example GitLab pipeline (.gitlab-ci.yml or gitops-prod.yml) that:

          • Validates the Terraform configuration
          • Creates a plan and publishes it as an artifact
          • Applies the plan manually on merge-request or main branch
          Make sure to set the variables inside these brackets ${} for it to work properly
          stages:
            - validate
            - plan
            - apply
            - deploy
          
          image:
            name: hashicorp/terraform:latest
            entrypoint:
              - "/usr/bin/env"
              - "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
          
          variables:
            # prevent interactive prompts
            TF_INPUT: "false"
          
          before_script:
            # pass provider / VM variables from CI/CD settings
            - export TF_VAR_PROXMOX_API_URL="${PROXMOX_API_URL}"
            - export TF_VAR_PROXMOX_API_TOKEN_ID="${PROXMOX_API_TOKEN_ID}"
            - export TF_VAR_PROXMOX_API_TOKEN_SECRET="${PROXMOX_API_TOKEN_SECRET}"
            - export TF_VAR_VM_USER_PASSWORD="${VM_USER_PASSWORD}"
            - export TF_VAR_VM_USER_SSHKEY="${VM_USER_SSHKEY}"
          
            # configure Terraform HTTP backend via TF_HTTP_* env vars (use GITLAB_TERRAFORM_TOKEN)
            - export TF_HTTP_ADDRESS="https://gitlab.example.com/api/v4/projects/xx/terraform/state/default"
            - export TF_HTTP_LOCK_ADDRESS="https://gitlab.example.com/api/v4/projects/xx/terraform/state/default/lock"
            - export TF_HTTP_UNLOCK_ADDRESS="https://gitlab.example.com/api/v4/projects/xx/terraform/state/default/lock"
            - export TF_HTTP_USERNAME="luca"
            - export TF_HTTP_PASSWORD="${GITLAB_TERRAFORM_TOKEN}"
            - export TF_HTTP_LOCK_METHOD="POST"
            - export TF_HTTP_UNLOCK_METHOD="DELETE"
            - export TF_HTTP_RETRY_WAIT_MIN="5"
          
            - export TF_LOG=TRACE
          
          validate:
            stage: validate
            rules:
              - changes:
                  - "**/*.tf"
                when: always
            script:
              - terraform --version
              - terraform init -input=false -reconfigure
              - terraform validate
          
          plan:
            stage: plan
            rules:
              - changes:
                  - "**/*.tf"
                when: always
            needs: [validate]
            script:
              - terraform init -input=false -reconfigure
              - terraform plan -input=false -out=plan.tfplan
              - terraform show -no-color plan.tfplan > plan.txt
            artifacts:
              paths:
                - plan.tfplan
                - plan.txt
              expire_in: 1 hour
              when: always
            cache:
              key: "${CI_COMMIT_REF_SLUG}"
              paths:
                - .terraform/
          
          apply:
            stage: apply
            needs:
              - job: plan
                optional: true
            rules:
              - if: '$CI_PIPELINE_SOURCE == "merge_request_event"'
                when: manual
              - if: '$CI_COMMIT_BRANCH == "main"'
                when: manual
              - when: never
            script:
              - terraform init -input=false -reconfigure
              - terraform apply -input=false -auto-approve plan.tfplan
            allow_failure: false
          

          Replace gitlab.example.com, project xx, and the TF_HTTP_USERNAME value with your own GitLab instance, project ID, and service user.


          Best Practices

          • Never commit secrets into git; always use CI/CD variables or a secure secret store.
          • Use one .tf file per VM or per logical group of VMs for clarity.
          • Review every Terraform plan before applying it (either manually or via MR approvals).
          • Protect the branch and/or apply job so only authorized operators can run it.
          • Keep your cloud-init base templates regularly updated with OS patches.

          Conclusion

          This blueprint can be adapted to any Proxmox infrastructure for reliable, automated VM provisioning. Combine the provider.tf, VM definitions, and GitLab pipeline to achieve a full GitOps workflow for your Proxmox-based virtual machines.