Pulumi Cloud self-hosted API
Self-hosting is only available with Pulumi Business Critical. If you would like to evaluate the Self-Hosted Pulumi Cloud, sign up for the 30 day trial or contact us.
To manage your state with a self-managed backend, such as a cloud storage bucket, see State and Backends.
The Pulumi API is one of the components required for self-hosting the Pulumi Cloud in your organization’s environment. It provides the necessary APIs for both the CLI and the Console.
Prerequisites
- Provide a server or virtual machine to install and run the Pulumi components (see Minimum System Requirements below).
- Provide a persistent volume for the service to store checkpoint objects.
- Provider a persistent volume for the MySQL data (optional if you are providing your own DB.)
- If you are providing your own DB instance, ensure that it is accessible within the same Docker network that the service and the UI containers will be running in.
- The default DB endpoint is
pulumi-db:3306
. If you wish to change this, setPULUMI_LOCAL_DATABASE_NAME
andPULUMI_LOCAL_DATABASE_PORT
accordingly (see Script Variables.) - If you do not create this network prior to running
run-ee.sh
, it will create only a bridged network on your local host. Ensure that the DB can be accessed by the API service container.
- The default DB endpoint is
- Provide an external load balancer with TLS termination.
Minimum System Requirements
Type | Properties | Notes |
---|---|---|
Compute | 2 CPU cores w/ 8 GB memory | |
Storage | 20GB SSD | For MySQL data. Note: By default, the installation uses a single data path via PULUMI_DATA_PATH to map both the SQL data volume and the object storage path. Specify a volume for the db container as required. |
Storage | 200GB SSD | For Object Storage. Note: By default, the installation uses a single data path via PULUMI_DATA_PATH to map both the SQL data volume and the object storage path. A dedicated path can be set via env var PULUMI_LOCAL_OBJECTS for the api container. |
Note: The storage recommendations for the Object Storage can be lesser than 200GB depending on your organization size and the expected usage.
What’s In The Container?
The API service is a Go-based application. This is a single binary application that has all of the dependencies it needs in order to run.
Server
This container runs an HTTP server which provides the APIs needed by the Console and the CLI. By default, this container will serve using port 8080
over standard HTTP. If TLS is configured the server will instead serve over port 8443
using HTTPS.
Function Mode
It’s possible to split apart the HTTP Server from the Background Jobs functionality to distribute responsibility across multiple instances. The function mode determines the mode in which the server runs based upon the env variable PULUMI_API_CONTAINER_MODE
. If this value is not defined, or doesn’t match a valid option, then it defaults to FULL
.
Variable Name | Description |
---|---|
FULL | Pulumi API & Background Jobs (Default) |
API | Only Pulumi API |
JOBS | Only Background Jobs |
Environment Variables for Core Infrastructure
The core infrastructure components to successfully run the API service are the database, object storage, and encryption services. Depending on your requirements, you can configure additional (optional) identity services as well as enhanced security between the API and the database. The API also supports exporting OpenTelemetry metrics and traces via the OpenTelemetry collector.
Variable Name | Description |
---|---|
PULUMI_LICENSE_KEY | The license key value. A JWT string. Note: Be sure to enclose the value in single-quotes. |
PULUMI_DATABASE_ENDPOINT | The database server endpoint in the format host:port . This should be a MySQL 8.0 server. |
PULUMI_DATABASE_NAME | The name of the database on the database server. |
PULUMI_API_DOMAIN | The internet or network-local domain using which the API service can be reached, e.g. pulumiapi.acmecorp.com . Default is localhost:8080 . |
PULUMI_CONSOLE_DOMAIN | The internet or network-local domain using which the Console can be reached, e.g. pulumiconsole.acmecorp.com . Default is localhost:3000 . |
Object storage
The service saves the state of every stack, that uses it as the backend, to a persistent object storage. If your org uses policy packs, then anytime a user publishes a policy pack, it gets uploaded to the same object storage service as well. Both the state (checkpoint) and the policy pack must use different buckets on the same object storage service.
Local storage
Variable Name | Description |
---|---|
PULUMI_LOCAL_OBJECTS | Folder path for persisting state for stacks. Ensure that this path is highly available, and backed-up regularly. Only use this if you want the service to persist objects to a local path. |
PULUMI_POLICY_PACK_LOCAL_HTTP_OBJECTS | Folder path for persisting published policy packs. Ensure that this path is highly available, and backed-up regularly. Only use this if you want the service to persist policy packs to a local path. |
AWS S3
AWS_REGION
with
any valid AWS region name. For example, us-west-2
.Variable Name | Description |
---|---|
PULUMI_CHECKPOINT_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting stack state/checkpoint. The value takes the format: s3://<bucket-name> . The s3:// scheme also supports query-params. See the GoCloud docs for an example of the query-params. |
PULUMI_POLICY_PACK_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting published policy packs. The value takes the format: s3://<bucket-name> . Similar to PULUMI_CHECKPOINT_BLOB_STORAGE_ENDPOINT , this also supports query-params. |
PULUMI_ENGINE_EVENTS_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting large engine events. We recommend configuring this value to improve performance and reduce the size of the MySQL database. The value takes the format: s3://<bucket-name> . Similar to PULUMI_CHECKPOINT_BLOB_STORAGE_ENDPOINT , this also supports query-params. |
PULUMI_SERVICE_METADATA_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting authorization policies and large config values. We recommend configuring this value to enable OIDC trust or if your programs use configuration values exceeding 64kb. The value takes the format: s3://<bucket-name. . Similar to PULUMI_CHECKPOINT_BLOB_STORAGE_ENDPOINT , this also supports query-params. |
Azure Storage
Variable Name | Description |
---|---|
PULUMI_CHECKPOINT_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting stack state/checkpoint. The value takes the format: azblob://<blob-container> . |
PULUMI_POLICY_PACK_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting published policy packs. The value takes the format: azblob://<blob-container> . |
PULUMI_ENGINE_EVENTS_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting large engine events. We recommend configuring this value to improve performance and reduce the size of the MySQL database. The value takes the format: azblob://<blob-container> . |
PULUMI_SERVICE_METADATA_BLOB_STORAGE_ENDPOINT | The storage endpoint for persisting authorization policies and large config values. We recommend configuring this value to enable OIDC trust or if your programs use configuration values exceeding 64kb. The value takes the format: azblob://<bucket-name. . |
AZURE_STORAGE_ACCOUNT | The name of the Azure storage account where the blob containers for checkpoint and policy pack have been created. See Cloud Provider Authentication for additional configuration options for Azure. |
AZURE_STORAGE_KEY | (Optional) The primary or secondary storage key for the storage account. You only need to specify this if you are not using Azure MSI. |
Encryption services
The service supports using a master key available in a local-path or in a remote key management service. You only need to configure one of the support services.
Local keys
Variable Name | Description |
---|---|
PULUMI_LOCAL_KEYS | Folder path that contains a random 32-byte key. Ensure that this path is highly available, and backed-up regularly. |
AWS KMS
Variable Name | Description |
---|---|
PULUMI_KMS_KEY | ARN for the AWS KMS customer master key resource. |
Azure KeyVault
Variable Name | Description |
---|---|
PULUMI_AZURE_KV_URI | Azure KeyVault URI. For example, https://<vault-name>.vault.azure.net . |
PULUMI_AZURE_KV_KEY_NAME | The name of the key in KeyVault. The key must be an RSA key type. We recommend a key size of 2048 for most cases. The key operations must support Encrypt and Decrypt . Otherwise, the service will fail to start. |
PULUMI_AZURE_KV_KEY_VERSION | The version of the key that the service should use. Note: All previous versions of the key must remain enabled. |
Cloud Provider Authentication
These settings are required if you are running the Pulumi Cloud on one of these clouds or using one of their services.
AWS
For more information about authenticating with AWS services, see the AWS SDK docs.
Variable Name | Description |
---|---|
AWS_REGION | The region where the dependent AWS services used by Pulumi Cloud have been created. For example, the KMS key must exist in this region. Similarly, if you are using RDS, then there must be a writable cluster in this region. |
AWS_ACCESS_KEY_ID | The AWS access key ID. |
AWS_SECRET_ACCESS_KEY | The AWS secret key. |
AWS_PROFILE | The AWS profile. |
AWS_ROLE_ARN | The AWS role ARN to assume using the base access keys. |
Azure
AZURE_STORAGE_KEY
env var.Variable Name | Description |
---|---|
AZURE_CLIENT_ID | Client ID of the Azure Managed System Identity or the self-managed Service Principal (SP) that should be used for both Azure KeyVault and Storage. The MSI or the SP must have access to Key Management operations (Get , Encrypt and Decrypt ) of the KeyVault you plan to use. |
AZURE_CLIENT_SECRET | (Optional) Client secret of the Azure SP. |
AZURE_TENANT_ID | (Optional) Tenant ID of the Azure SP. |
AZURE_SUBSCRIPTION_ID | (Optional) Subscription ID of the Azure AP. |
AZURE_STORAGE_DOMAIN | (Optional) The custom domain for your storage domain, if any. If this is not provided, the default Azure public domain “blob.core.windows.net” will be used. |
GitLab OAuth
Only required if using GitLab as the backing identity provider for your organization.
Variable Name | Description |
---|---|
GITLAB_OAUTH_ID | GitLab OAuth app client ID. It is used for GitLab OAuth sign in. Create a new GitLab OAuth app. |
GITLAB_OAUTH_SECRET | GitLab OAuth app client secret. See above to create a new GitLab OAuth app. |
GITLAB_OAUTH_ENDPOINT | The domain for your GitLab instance. It defaults to https://gitlab.com , which should be used unless you are running GitLab on a custom domain. |
Sending Emails
Variable Name | Description |
---|---|
SMTP_SERVER | Location of the SMTP server to use for sending notification emails. (must be in <host>:<port> format, e.g. smtp.domain.com:465 ) |
SMTP_USERNAME | Name of the SMTP user the Pulumi Cloud connects as. |
SMTP_PASSWORD | Password of the SMTP user the Pulumi Cloud connects as. |
SMTP_GENERIC_SENDER | Sender information used as FROM: for outgoing emails. |
Other Environment Variables
Variable Name | Description |
---|---|
GITHUB_OAUTH_ENDPOINT | Used for GitHub API calls. |
PULUMI_DATABASE_USER_NAME | Name of the database user the Pulumi Cloud connects as. Leave default unless you are having trouble connecting to your database. |
PULUMI_DATABASE_USER_PASSWORD | Password of the database user the Pulumi Cloud connects as. Leave default unless you are having trouble connecting to your database. |
PULUMI_DISABLE_EMAIL_LOGIN | When true the API will disallow logins using the email/password identity. To hide the email login option from the Console refer to the email identity configuration for the Console. |
PULUMI_DISABLE_EMAIL_SIGNUP | When true the API will disallow signups using the email/password identity. To hide the email signup option from the Console refer to the email identity configuration for the Console. |
RECAPTCHA_SECRET_KEY | reCAPTCHA secret key for self-service password reset. Create a site key and a secret key from Google. |
SAML_CERTIFICATE_PUBLIC_KEY | Public key used by the IdP to sign SAML assertions. Learn how to set SAML_CERTIFICATE_PUBLIC_KEY. |
SAML_CERTIFICATE_PRIVATE_KEY | Private key used by Pulumi to validate the SAML assertions sent by the IdP. Learn how to set SAML_CERTIFICATE_PRIVATE_KEY. |
TLS Environment Variables
API Service
The service is configurable to serve the API using TLS. The following environment variables are all required in order to enable TLS. The values of the environment variables may either be a filepath or the actual value of the entity. If these variables are set, the service will be served over HTTPS (i.e using TLS) using port 8443
. If the following variables are not set the service will default to serving over HTTP using port 8080
.
Variable Name | Description |
---|---|
API_TLS_CERTIFICATE | The TLS certificate. The certificate must be supplied in X.509 format and must be PEM encoded. |
API_TLS_PRIVATE_KEY | The private key associated with the TLS certificate. The private key must be PEM encoded. |
API_MIN_TLS_VERSION | The minimum version of TLS to use when serving the API (must be in <major>.<minor> format, e.g. 1.2 ). |
Note: Self-signed certificates may be used to configure TLS in the event the need for a trusted entity is not necessary. A self-signed cert and private key may be generated using OpenSSL. The following command uses OpenSSL to generate a self-signed certificate. This example will output two files, the certificate (cert.pem) and the private key (key.pem) used to sign it.
openssl \
req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem \
-days { days_unitl_expiration } -nodes -subj "/CN={ common_name }"
Database Connections
API Service
The service is configurable to enable connections to the backend SQL database over TLS. The following environment variables are all required to connect to the database using TLS. If these variables are set the service will establish connections to the database using TLS, otherwise the service will default to connecting without TLS. The same ports will be used for communication to the database regardless of whether TLS is configured or not.
Variable Name | Description |
---|---|
DATABASE_CA_CERTIFICATE | The CA certificate used to establish TLS connections with the database. This certificate must be PEM encoded. This must be set to the value of the certificate itself and not a filepath to the location of the certificate file. |
DATABASE_MIN_TLS_VERSION | The minimum TLS version to use for database connections (must be in <major>.<minor> format, e.g. 1.2 ). |
Migrations
The database migrations container is configurable to enable connections to the database over TLS. To use TLS, the following environment variable must be set. The default is to not use TLS.
Variable Name | Description |
---|---|
DATABASE_CA_CERTIFICATE | The CA certificate used to establish TLS connections with the database. This certificate must be PEM encoded. This must be set to the value of the certificate itself and not a filepath to the location of the certificate file. |
MYSQL_ROOT_USERNAME | The root username to log in to the MySQL database. Defaults to root . |
MYSQL_ROOT_PASSWORD | The root user password to log in to the MySQL database. |
MYSQL_ALLOW_EMPTY_PASSWORD | Set to true to allow the container to be started with a blank password for the root user. |
PULUMI_DATABASE_ENDPOINT | The database server endpoint in the format host:port . This should be a MySQL 8.0 server. |
PULUMI_DATABASE_PING_ENDPOINT | The database server endpoint to ping for availability before login. |
RUN_MIGRATIONS_EXTERNALLY | Request for migrations to be run against an external database. |
Audit Logs
Audit Logs are persisted in MySQL by default. Alternative backends can be configured to support a higher volume of writes without scaling out MySQL.
DynamoDB
To use AWS DynamoDB to persist Audit Logs, specify the name of the table in the environment variable PULUMI_AUDIT_LOGS_DYNAMO_TABLE
. The table provided must be configured with following attributes:
hashKey: "org_id",
rangeKey: "timestamp_id",
globalSecondaryIndexes: [
{
hashKey: "org_user_id",
projectionType: "ALL",
name: "org_user",
rangeKey: "timestamp_id",
},
],
attributes: [
{
name: "org_id",
type: "S",
},
{
name: "org_user_id",
type: "S",
},
{
name: "timestamp_id",
type: "S",
},
],
OpenTelemetry
The API service is configured to export OpenTelemetry metrics and traces to the vendor of your choice via the OpenTelemetry collector. You will need to manage your own OpenTelemetry collector.
The following environment variables are needed to configure OpenTelemetry in the service:
Variable name | Description |
---|---|
OTEL_EXPORTER_OTLP_ENDPOINT | (Required) Used to configure the OTLP exporter. The base URL to which all telemetry will be sent. If not set, the API service will use no-op metrics and traces. |
OTEL_EXPORTER_OTLP_PROTOCOL | (Optional) Used to configure the OTLP exporter. Valid values are http or grpc . Defaults to grpc . |
PULUMI_ENABLE_DEPRECATED_METRICS | (Optional) Whether to continue emitting API service metrics in a log-based format. Defaults to true . |
METRICS_WEBHOOK_SECRET | Required to successfully authenticate to the /metrics endpoint. The Authorization header should be set as follows: Authorization: webhook-token <METRICS_WEBHOOK_SECRET> . |
OpenTelemetry is not yet available for the console service.
Metrics endpoint
The API service exposes a metrics endpoint (https://api.pulumi.com/metrics
) that is secured by a bearer token. This token is configured using the environment variable METRICS_WEBHOOK_SECRET
.
webhook-token
, not Bearer
.curl -s GET https://api.pulumi.com/metrics -H 'Authorization: webhook-token <METRICS_WEBHOOK_SECRET>
Prometheus
The API service provides two options to get metrics into Prometheus:
- From the OpenTelemetry collector via a Prometheus remote write exporter. This is a push-based exporter.
- From a Prometheus exporter by scraping the
/metrics
endpoint. This is a pull-based exporter.
Prometheus remote write exporter
This option does not use the /metrics
endpoint. Instead, it exports metrics from the collector to a Prometheus remote write compatible backend.
Example OpenTelemetry collector configuration for a service using AWS and the AWS Distro for OpenTelemetry Collector:
extensions:
sigv4auth:
receivers:
otlp:
protocols:
grpc:
endpoint: localhost:4317
processors:
memory_limiter:
batch:
exporters:
logging:
prometheusremotewrite:
endpoint: https://aws-managed-prometheus-endpoint/v1/api/remote_write
auth:
authenticator: sigv4auth
service:
telemetry:
logs:
pipelines:
traces:
receivers: [otlp]
processors: [memory_limiter, batch]
exporters: [logging]
metrics:
receivers: [otlp]
processors: [memory_limiter, batch]
exporters: [prometheusremotewrite]
extensions: [sigv4auth]
Prometheus exporter
This option requires configuring the environment variable METRICS_WEBHOOK_SECRET
to successfully authenticate to the /metrics
endpoint.
Example OpenTelemetry collector configuration:
extensions:
bearertokenauth:
scheme: webhook-token
token: ${env:METRICS_WEBHOOK_SECRET}
receivers:
otlp:
protocols:
grpc:
endpoint: localhost:4317
processors:
memory_limiter:
batch:
exporters:
debug:
prometheus:
endpoint: api.pulumi.com:443
auth:
authenticator: bearertokenauth
namespace: pulumi
resource_to_telemetry_conversion:
enabled: true
service:
telemetry:
logs:
pipelines:
traces:
receivers: [otlp]
processors: [memory_limiter, batch]
exporters: [debug]
metrics:
receivers: [otlp]
processors: [memory_limiter, batch]
exporters: [prometheus]
extensions: [bearertokenauth]
The bearer token also needs to be included in the Prometheus server configuration:
scrape_configs:
- job_name: pulumi
scrape_interval: 15s
authorization:
type: webhook-token
credentials: <METRICS_WEBHOOK_SECRET>
scheme: https
static_configs:
- targets: ["api.pulumi.com"]
Pulumi Deployments
In order to enable Pulumi Deployments, the following must be configured:
PULUMI_SERVICE_METADATA_BLOB_STORAGE_ENDPOINT
orPULUMI_LOCAL_OBJECTS
object storageCustomer-Managed Agents - You also need to update the
pulumi-deployment-agent.yaml
configuration file by settingservice_url
to<PULUMI_API_DOMAIN>
. Example:token: pul-d2d2…. version: v0.0.5 service_url: https://pulumiapi.acmecorp.com
Thank you for your feedback!
If you have a question about how to use Pulumi, reach out in Community Slack.
Open an issue on GitHub to report a problem or suggest an improvement.