loading…
Search for a command to run...
loading…
🎖️🏎️☁️ - The official Terraform MCP Server seamlessly integrates with the Terraform ecosystem, enabling provider discovery, module analysis, and direct Regist
🎖️🏎️☁️ - The official Terraform MCP Server seamlessly integrates with the Terraform ecosystem, enabling provider discovery, module analysis, and direct Registry API integration for advanced Infrastructure as Code workflows.
The Terraform MCP Server is a Model Context Protocol (MCP) server that provides seamless integration with Terraform Registry APIs, enabling advanced automation and interaction capabilities for Infrastructure as Code (IaC) development.
Security Note: At this stage, the MCP server is intended for local use only. If using the StreamableHTTP transport, always configure the MCP_ALLOWED_ORIGINS environment variable to restrict access to trusted origins only. This helps prevent DNS rebinding attacks and other cross-origin vulnerabilities.
Security Note: Depending on the query, the MCP server may expose certain Terraform data to the MCP client and LLM. Do not use the MCP server with untrusted MCP clients or LLMs.
Legal Note: Your use of a third party MCP Client/LLM is subject solely to the terms of use for such MCP/LLM, and IBM is not responsible for the performance of such third party tools. IBM expressly disclaims any and all warranties and liability for third party MCP Clients/LLMs, and may not be able to provide support to resolve issues which are caused by the third party tools.
Caution: The outputs and recommendations provided by the MCP server are generated dynamically and may vary based on the query, model, and the connected MCP client. Users should thoroughly review all outputs/recommendations to ensure they align with their organization’s security best practices, cost-efficiency goals, and compliance requirements before implementation.
Environment Variables:
| Variable | Description | Default |
|---|---|---|
TFE_ADDRESS |
HCP Terraform or TFE address | "https://app.terraform.io" |
TFE_TOKEN |
Terraform Enterprise API token | "" (empty) |
TFE_SKIP_TLS_VERIFY |
Skip HCP Terraform or Terraform Enterprise TLS verification | false |
LOG_LEVEL |
Logging level: trace, debug, info, warn, error, fatal, panic (overrides --log-level flag) |
info |
LOG_FORMAT |
Logging format: text or json (overrides --log-format flag) |
text |
TRANSPORT_MODE |
Set to streamable-http to enable HTTP transport (legacy http value still supported) |
stdio |
TRANSPORT_HOST |
Host to bind the HTTP server | 127.0.0.1 |
TRANSPORT_PORT |
HTTP server port | 8080 |
MCP_ENDPOINT |
HTTP server endpoint path | /mcp |
MCP_KEEP_ALIVE |
Keep-alive interval for SSE connections (e.g., 30s, 1m). 0 to disable | 0 |
MCP_SESSION_MODE |
Session mode: stateful or stateless |
stateful |
MCP_ALLOWED_ORIGINS |
Comma-separated list of allowed origins for CORS | "" (empty) |
MCP_CORS_MODE |
CORS mode: strict, development, or disabled |
strict |
MCP_TLS_CERT_FILE |
Path to TLS cert file, required for non-localhost deployment (e.g. /path/to/cert.pem) |
"" (empty) |
MCP_TLS_KEY_FILE |
Path to TLS key file, required for non-localhost deployment (e.g. /path/to/key.pem) |
"" (empty) |
MCP_RATE_LIMIT_GLOBAL |
Global rate limit (format: rps:burst) |
10:20 |
MCP_RATE_LIMIT_SESSION |
Per-session rate limit (format: rps:burst) |
5:10 |
ENABLE_TF_OPERATIONS |
Enable tools that require explicit approval | false |
OTEL_METRICS_ENABLED |
Enable tools and server metrics using otel | false |
OTEL_METRICS_SERVICE_VERSION |
Version of the terraform-mcp-server sending metrics, which is used to set metric attributes. It also helps track metrics across different deployments | latest |
OTEL_METRICS_SERVICE_NAME |
Identifies the source of the metrics (e.g., "terraform-mcp-server") | terraform-mcp-server |
OTEL_METRICS_EXPORT_INTERVAL |
Controls the frequency of metric flushes | 2 |
OTEL_METRICS_ENDPOINT |
URL of your OTel Collector or backend | localhost:4318 |
# Stdio mode
terraform-mcp-server stdio [--log-file /path/to/log] [--log-level info] [--log-format text] [--toolsets <toolsets>] [--tools <tools>]
# StreamableHTTP mode
terraform-mcp-server streamable-http [--transport-port 8080] [--transport-host 127.0.0.1] [--mcp-endpoint /mcp] [--log-file /path/to/log] [--log-level info] [--log-format text] [--toolsets <toolsets>] [--tools <tools>]
Default instructions for the MCP server is located in cmd/terraform-mcp-server/instructions.md, if those do not seem appropriate for your organization's Terraform practices or if the MCP server is producing inaccurate responses, please replace them with your own instructions and rebuild the container or binary. An example of such instruction is located in instructions/example-mcp-instructions.md
AGENTS.md essentially behaves as READMEs for coding agents: a dedicated, predictable place to provide the context and instructions to help AI coding agents work on your project. One AGENTS.md file works with different coding agents. An example of such instruction is located in instructions/example-AGENTS.md, in order to use it commit a file name AGENTS.md to the directory where your Terraform configurations reside.
Add the following JSON block to your User Settings (JSON) file in VS Code. You can do this by pressing Ctrl + Shift + P and typing Preferences: Open User Settings (JSON).
More about using MCP server tools in VS Code's agent mode documentation.
| Version 0.3.0+ or greater | Version 0.2.3 or lower |
|---|---|
|
|
Optionally, you can add a similar example (i.e. without the mcp key) to a file called .vscode/mcp.json in your workspace. This will allow you to share the configuration with others.
| Version 0.3.0+ or greater | Version 0.2.3 or lower |
|---|---|
|
|
Add this to your Cursor config (~/.cursor/mcp.json) or via Settings → Cursor Settings → MCP:
| Version 0.3.0+ or greater | Version 0.2.3 or lower |
|---|---|
|
|
More about using MCP server tools in Claude Desktop user documentation. Read more about using MCP server in Amazon Q Developer and Kiro CLI.
| Version 0.3.0+ or greater | Version 0.2.3 or lower |
|---|---|
|
|
More about using and adding MCP server tools in Claude Code user documentation
stdio) Transportclaude mcp add terraform -s user -t stdio -- docker run -i --rm hashicorp/terraform-mcp-server
streamable-http) Transport# Run server (example)
docker run -p 8080:8080 --rm -e TRANSPORT_MODE=streamable-http -e TRANSPORT_HOST=0.0.0.0 hashicorp/terraform-mcp-server
# Add to Claude Code
claude mcp add --transport http terraform http://localhost:8080/mcp
For security, avoid hardcoding your credentials, create or update ~/.gemini/.env (where ~ is your home or project directory) for storing HCP Terraform or Terraform Enterprise credentials
# ~/.gemini/.env
TFE_ADDRESS=your_tfe_address_here
TFE_TOKEN=your_tfe_token_here
Install the extension & run Gemini
gemini extensions install https://github.com/hashicorp/terraform-mcp-server
gemini
More about using and adding MCP servers tools in Bob IDE or Shell Using MCP in Bob.
| Version 0.3.0+ or greater | Version 0.2.3 or lower |
|---|---|
|
|
Use the latest release version:
go install github.com/hashicorp/terraform-mcp-server/cmd/terraform-mcp-server@latest
Use the main branch:
go install github.com/hashicorp/terraform-mcp-server/cmd/terraform-mcp-server@main
| Version 0.3.0+ or greater | Version 0.2.3 or lower |
|---|---|
|
|
Before using the server, you need to build the Docker image locally:
git clone https://github.com/hashicorp/terraform-mcp-server.git
cd terraform-mcp-server
make docker-build
# Run in stdio mode
docker run -i --rm terraform-mcp-server:dev
# Run in streamable-http mode
docker run -p 8080:8080 --rm -e TRANSPORT_MODE=streamable-http -e TRANSPORT_HOST=0.0.0.0 terraform-mcp-server:dev
# Filter tools (optional)
docker run -i --rm terraform-mcp-server:dev --toolsets=registry,terraform
docker run -i --rm terraform-mcp-server:dev --tools=search_providers,get_provider_details
Note: When running in Docker, you should set
TRANSPORT_HOST=0.0.0.0to allow connections from outside the container.
# Test the connection
curl http://localhost:8080/health
{
"mcpServers": {
"terraform": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"terraform-mcp-server:dev"
]
}
}
}
Check out available tools here :link:
Check out available resources here :link:
Control which tools are available using --toolsets (groups) or --tools (individual):
# Enable tool groups (default: registry)
terraform-mcp-server --toolsets=registry,terraform
# Enable specific tools only
terraform-mcp-server --tools=search_providers,get_provider_details,list_workspaces
Available toolsets: registry, registry-private, terraform, all, default. See pkg/toolsets/mapping.go for individual tool names. Cannot use both flags together.
The Terraform MCP Server supports multiple transport protocols:
Standard input/output communication using JSON-RPC messages. Ideal for local development and direct integration with MCP clients.
Modern HTTP-based transport supporting both direct HTTP requests and Server-Sent Events (SSE) streams. This is the recommended transport for remote/distributed setups.
Features:
http://{hostname}:8080/mcphttp://{hostname}:8080/healthTRANSPORT_MODE=http or TRANSPORT_PORT=8080 to enableThe Terraform MCP Server supports two session modes when using the StreamableHTTP transport:
To enable stateless mode, set the environment variable:
export MCP_SESSION_MODE=stateless
If you're behind a corporate proxy that performs TLS inspection (like Zscaler Internet Access), you may see certificate errors:
tls: failed to verify certificate: x509: certificate signed by unknown authority
Solution: Mount your corporate CA certificate into the container:
docker run -i --rm \
-v /path/to/corporate-ca.pem:/etc/ssl/certs/corporate-ca.pem \
-e SSL_CERT_FILE=/etc/ssl/certs/corporate-ca.pem \
hashicorp/terraform-mcp-server:0.5.1
For MCP client configurations:
{
"mcpServers": {
"terraform": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"-v", "/path/to/corporate-ca.pem:/etc/ssl/certs/corporate-ca.pem",
"-e", "SSL_CERT_FILE=/etc/ssl/certs/corporate-ca.pem",
"-e", "TFE_TOKEN=<>",
"hashicorp/terraform-mcp-server:0.5.1"
]
}
}
}
Alternative: Run the binary directly
If Docker is not permitted in your environment, you can install and run the server binary directly, which will use your system's certificate store:
go install github.com/hashicorp/terraform-mcp-server/cmd/terraform-mcp-server@latest
terraform-mcp-server stdio
| Command | Description |
|---|---|
make build |
Build the binary |
make test |
Run all tests |
make test-e2e |
Run end-to-end tests |
make docker-build |
Build Docker image |
make run-http |
Run HTTP server locally |
make docker-run-http |
Run HTTP server in Docker |
make test-http |
Test HTTP health endpoint |
make clean |
Remove build artifacts |
make help |
Show all available commands |
This project is licensed under the terms of the MPL-2.0 open source license. Please refer to LICENSE file for the full terms.
For security issues, please contact [email protected] or follow our security policy.
For bug reports and feature requests, please open an issue on GitHub.
For general questions and discussions, open a GitHub Discussion.
Добавь это в claude_desktop_config.json и перезапусти Claude Desktop.
{
"mcpServers": {
"hashicorp-terraform-mcp-server": {
"command": "npx",
"args": []
}
}
}