1. Packages
  2. stackit
  3. Installation & Configuration
stackit v0.0.4 published on Friday, Feb 20, 2026 by stackitcloud

stackit: Installation & Configuration

stackit logo
stackit v0.0.4 published on Friday, Feb 20, 2026 by stackitcloud

    Installation

    The STACKIT Pulumi Provider (ALPHA) is available as a package in the following Pulumi languages:

    Authentication

    To authenticate, you will need a service account. Create it in the STACKIT Portal and assign the necessary permissions to it, e.g. project.owner.

    When setting up authentication, the provider will always try to use the key flow first and search for credentials in several locations, following a specific order:

    1. Explicit configuration, e.g. by setting the field serviceAccountKeyPath in the provider block

    2. Environment variable, e.g. by setting STACKIT_SERVICE_ACCOUNT_KEY_PATH or STACKIT_SERVICE_ACCOUNT_KEY

    3. Credentials file

      The provider will check the credentials file located in the path defined by the STACKIT_CREDENTIALS_PATH env var, if specified, or in $HOME/.stackit/credentials.json as a fallback. The credentials file should be a JSON and each credential should be set using the name of the respective environment variable, as stated below in each flow. Example:

      {
        "STACKIT_SERVICE_ACCOUNT_KEY_PATH": "path/to/sa_key.json"
      }
      

    Key flow

    The following instructions assume that you have created a service account and assigned the necessary permissions to it, e.g. project.owner.

    To use the key flow, you need to have a service account key, which must have an RSA key-pair attached to it.

    When creating the service account key, a new pair can be created automatically, which will be included in the service account key.

    Optionally, you can provide your own private key when creating the service account key, which will then require you to also provide it explicitly to the STACKIT Pulumi Provider, additionally to the service account key. Check the STACKIT Knowledge Base for an example of how to create your own key-pair.

    To configure the key flow, follow this steps:

    1. Create a service account key:
    1. Save the content of the service account key by copying it and saving it in a JSON file.

      The expected format of the service account key is a JSON with the following structure:

    {
    "id": "uuid",
    "publicKey": "public key",
    "createdAt": "2023-08-24T14:15:22Z",
    "validUntil": "2023-08-24T14:15:22Z",
    "keyType": "USER_MANAGED",
    "keyOrigin": "USER_PROVIDED",
    "keyAlgorithm": "RSA_2048",
    "active": true,
    "credentials": {
        "kid": "string",
        "iss": "my-sa@sa.stackit.cloud",
        "sub": "uuid",
        "aud": "string",
        (optional) "privateKey": "private key when generated by the SA service"
    }
    }
    
    1. Configure the service account key for authentication in the provider by following one of the alternatives below:

      • setting the fields in the provider block: serviceAccountKey or serviceAccountKeyPath
      • setting the environment variable: STACKIT_SERVICE_ACCOUNT_KEY_PATH or STACKIT_SERVICE_ACCOUNT_KEY
        • ensure the set the service account key in STACKIT_SERVICE_ACCOUNT_KEY is correctly formatted. Use e.g. $ export STACKIT_SERVICE_ACCOUNT_KEY=$(cat ./service-account-key.json)
      • setting STACKIT_SERVICE_ACCOUNT_KEY_PATH in the credentials file (see above)

    Optionally, only if you have provided your own RSA key-pair when creating the service account key, you also need to configure your private key (takes precedence over the one included in the service account key, if present). The private key must be PEM encoded and can be provided using one of the options below:

    • setting the field in the provider block: privateKey or privateKeyPath
    • setting the environment variable: STACKIT_PRIVATE_KEY_PATH or STACKIT_PRIVATE_KEY
    • setting STACKIT_PRIVATE_KEY_PATH in the credentials file (see above)

    Opting into STACKIT Beta Resources

    There are STACKIT resources which are currently in beta which means the API is not stable and can change.

    To use such beta resources in the STACKIT Pulumi provider, follow these steps:

    1. Provider Configuration Option

      Set the enableBetaResources option in the provider configuration. This is a boolean attribute that can be either true or false. This can be done either in code directly or via the pulumi config command which writes this to a Pulumi.yaml file (e.g. pulumi config set stackit:enableBetaResources true).

      The examples folder provides the information how this can be done in code.

    2. Environment Variable

      Set the STACKIT_TF_ENABLE_BETA_RESOURCES environment variable to "true" or "false". Other values will be ignored and will produce a warning.

      export STACKIT_TF_ENABLE_BETA_RESOURCES=true
      

    Note: The environment variable takes precedence over the provider configuration option. This means that if the STACKIT_TF_ENABLE_BETA_RESOURCES environment variable is set to a valid value ("true" or "false"), it will override the enableBetaResources option specified in the provider configuration.

    Opting into Experiments

    Experiments are features that are even less mature and stable than Beta Resources. While there is some assumed stability in beta resources, will have to expect breaking changes while using experimental resources. Experimental Resources do not come with any support or warranty.

    To enable experiments set the experiments field in the provider definition e.g. via pulumi config set stackit:experiments [\"routing-tables\"].

    Configuration

    The following configuration points are available for the stackit provider:

    Configuration VariableEnvironment VariableDescription
    stackit:authorizationCustomEndpointSTACKIT_AUTHORIZATION_CUSTOM_ENDPOINTCustom endpoint for the Membership service
    stackit:cdnCustomEndpointSTACKIT_CDN_CUSTOM_ENDPOINTCustom endpoint for the CDN service
    stackit:credentialsPathSTACKIT_CREDENTIALS_PATHPath of JSON from where the credentials are read. Default value is ~/.stackit/credentials.json
    stackit:defaultRegionSTACKIT_DEFAULT_REGIONRegion will be used as the default location for regional services. Not all services require a region, some are global
    stackit:dnsCustomEndpointSTACKIT_DNS_CUSTOM_ENDPOINTCustom endpoint for the DNS service
    stackit:enableBetaResourcesSTACKIT_ENABLE_BETA_RESOURCESEnable beta resources. Default is false
    stackit:experimentsSTACKIT_EXPERIMENTSEnables experiments. These are unstable features without official support. Available Experiments: [iam]
    stackit:gitCustomEndpointSTACKIT_GIT_CUSTOM_ENDPOINTCustom endpoint for the Git service
    stackit:iaasCustomEndpointSTACKIT_IAAS_CUSTOM_ENDPOINTCustom endpoint for the IaaS service
    stackit:loadbalancerCustomEndpointSTACKIT_LOADBALANCER_CUSTOM_ENDPOINTCustom endpoint for the Load Balancer service
    stackit:logmeCustomEndpointSTACKIT_LOGME_CUSTOM_ENDPOINTCustom endpoint for the LogMe service
    stackit:mariadbCustomEndpointSTACKIT_MARIADB_CUSTOM_ENDPOINTCustom endpoint for the MariaDB service
    stackit:modelservingCustomEndpointSTACKIT_MODELSERVING_CUSTOM_ENDPOINTCustom endpoint for the AI Model Serving service
    stackit:mongodbflexCustomEndpointSTACKIT_MONGODBFLEX_CUSTOM_ENDPOINTCustom endpoint for the MongoDB Flex service
    stackit:objectstorageCustomEndpointSTACKIT_OBJECTSTORAGE_CUSTOM_ENDPOINTCustom endpoint for the Object Storage service
    stackit:observabilityCustomEndpointSTACKIT_OBSERVABILITY_CUSTOM_ENDPOINTCustom endpoint for the Observability service
    stackit:opensearchCustomEndpointSTACKIT_OPENSEARCH_CUSTOM_ENDPOINTCustom endpoint for the OpenSearch service
    stackit:postgresflexCustomEndpointSTACKIT_POSTGRESFLEX_CUSTOM_ENDPOINTCustom endpoint for the PostgresFlex service
    stackit:privateKeySTACKIT_PRIVATE_KEYPrivate RSA key used for authentication, relevant for the key flow. It takes precedence over the private key that is included in the service account key
    stackit:privateKeyPathSTACKIT_PRIVATE_KEY_PATHPath for the private RSA key used for authentication, relevant for the key flow. It takes precedence over the private key that is included in the service account key
    stackit:rabbitmqCustomEndpointSTACKIT_RABBITMQ_CUSTOM_ENDPOINTCustom endpoint for the RabbitMQ service
    stackit:redisCustomEndpointSTACKIT_REDIS_CUSTOM_ENDPOINTCustom endpoint for the Redis service
    stackit:regionSTACKIT_REGIONRegion will be used as the default location for regional services. Not all services require a region, some are global ⚠️ Deprecated: This attribute is deprecated. Use ‘default_region’ instead
    stackit:resourcemanagerCustomEndpointSTACKIT_RESOURCEMANAGER_CUSTOM_ENDPOINTCustom endpoint for the Resource Manager service
    stackit:secretsmanagerCustomEndpointSTACKIT_SECRETSMANAGER_CUSTOM_ENDPOINTCustom endpoint for the Secrets Manager service
    stackit:serverBackupCustomEndpointSTACKIT_SERVER_BACKUP_CUSTOM_ENDPOINTCustom endpoint for the Server Backup service
    stackit:serverUpdateCustomEndpointSTACKIT_SERVER_UPDATE_CUSTOM_ENDPOINTCustom endpoint for the Server Update service
    stackit:serviceAccountCustomEndpointSTACKIT_SERVICE_ACCOUNT_CUSTOM_ENDPOINTCustom endpoint for the Service Account service
    stackit:serviceAccountEmailSTACKIT_SERVICE_ACCOUNT_EMAILService account email. It is required if you want to use the resource manager project resource ⚠️ Deprecated: The service_account_email field has been deprecated because it is not required. Will be removed after June 12th 2025
    stackit:serviceAccountKeySTACKIT_SERVICE_ACCOUNT_KEYService account key used for authentication. If set, the key flow will be used to authenticate all operations
    stackit:serviceAccountKeyPathSTACKIT_SERVICE_ACCOUNT_KEY_PATHPath for the service account key used for authentication. If set, the key flow will be used to authenticate all operations
    stackit:serviceAccountTokenSTACKIT_SERVICE_ACCOUNT_TOKENToken used for authentication. If set, the token flow will be used to authenticate all operations
    stackit:serviceEnablementCustomEndpointSTACKIT_SERVICE_ENABLEMENT_CUSTOM_ENDPOINTCustom endpoint for the Service Enablement API
    stackit:skeCustomEndpointSTACKIT_SKE_CUSTOM_ENDPOINTCustom endpoint for the Kubernetes Engine (SKE) service
    stackit:sqlserverflexCustomEndpointSTACKIT_SQLSERVERFLEX_CUSTOM_ENDPOINTCustom endpoint for the SQL Server Flex service
    stackit:tokenCustomEndpointSTACKIT_TOKEN_CUSTOM_ENDPOINTCustom endpoint for the token API, which is used to request access tokens when using the key flow
    stackit logo
    stackit v0.0.4 published on Friday, Feb 20, 2026 by stackitcloud
      Meet Neo: Your AI Platform Teammate