Search Results for ""

Installing CircleCI 2.0 on Amazon Web Services with Terraform

This document provides step-by-step instructions for installing CircleCI 2.0 on Amazon Web Services (AWS) with Terraform in the following sections:

If you have CircleCI Enterprise installed you may access CircleCI 2.0 features on your current installation with no restrictions under your current agreement and support level. Contact your CircleCI account representative for assistance with upgrading.


  • CircleCI 2.0 is only available on AWS.
  • Teams may create a new CircleCI 2.0 .circleci/config.yml file in their repositories to add new 2.0 projects incrementally while continuing to build 1.0 projects which use a circle.yml configuration file.


Install the following automated infrastructure provisioning software:

  • Terraform, see the Download Terraform web site for links to packages for your architecture.

Have the following information available before beginning the installation procedure:

  • CircleCI License file (.rli), contact CircleCI support for a license.
  • AWS Access Key, AWS Secret Key.
  • Name of AWS EC2 SSH key.
  • AWS Region, for example us-west-2.
  • AWS Virtual Private Cloud (VPC) ID and AWS Subnet ID. Your default VPC ID is listed under Account Attributes in Amazon if your account is configured to use a default VPC.
  • Set your VPC [enableDnsSupport] setting to true to ensure that queries to the Amazon provided DNS server at the IP address, or the reserved IP address at the base of the VPC IPv4 network range plus two will succeed. See the Using DNS with Your VPC Amazon Web Services documentation for additional details.

Private Subnet Requirements

The following additional settings are required to support using private subnets on AWS with CircleCI:

  • The private subnet for builder boxes must be configured with a NAT gateway or an internet gateway configured for the outbound traffic to the internet via attached route tables.
  • The VPC Endpoint for S3 should be enabled. Enabling the VPC endpoint for S3 should significantly improve S3 operations for CircleCI and other nodes within your subnet.
  • Adequately power the NAT instance for heavy network operations. Depending on the specifics of your deployment, it is possible for NAT instances to become constrained by highly parallel builds using Docker and external network resources. A NAT that is inadequate could cause slowness in network and cache operations.
  • If you are integrating with, ensure that your network access control list (ACL) whitelists ports 80 and 443 for GitHub webhooks. When integrating with GitHub, either set up CircleCI in a public subnet, or set up a public load balancer to forward traffic.
  • See the Services section of the Administrator’s Overview for more information on the specific ports that need to be accessible to instances in your CircleCI installation.


Have available the following information and policies before starting the Preview Release installation:

  • If you use network proxies, contact your Account team before attempting to install CircleCI 2.0.
  • Plan to provision at least two AWS instances, one for the Services and one for your first set of Nomad Clients. Best practice is to use an m4.2xlarge instance with 8 vCPUs and 32GB RAM for the Services as well as Nomad Clients instances.
  • AWS instances must have outbound access to pull Docker containers and to verify your license.
  • In order to provision required AWS entities with Terraform you need an IAM User with following permissions:
      "Version": "2012-10-17",
      "Statement": [
              "Action": [
              "Effect": "Allow",
              "Resource": [
              "Action": [
              "Resource": [
              "Effect": "Allow"

Installation with Terraform

  1. Clone the Setup repository (if you already have it cloned, make sure it is up-to-date and you are on the master branch: git checkout master && git pull).
  2. Run make init to init terraform.tfvars file (your previous terraform.tfvars if any, will be backed up in the same directory).
  3. Fill terraform.tfvars with appropriate AWS values for section 1.
  4. Specify a circle_secret_passphrase in section 2, replacing ... with alpha numeric characters. Passphrase cannot be empty.
  5. Specify the instance type for your Nomad Clients. By default, the value specified in the terraform.tfvars file for Nomad Clients is m4.2xlarge (8 vCPUs, 32GB RAM). To increase the number of concurrent CircleCI jobs that each Nomad Client can run, modify section 2 of the terraform.tfvars file to specify a larger nomad_client_instance_type. Refer to the AWS Amazon EC2 Instance Types guide for details. Note: The builder_instance_type is only used for 1.0 and is disabled by default in section 3.
  6. Run terraform apply to provision.
  7. Go to the provided URL at the end of Terraform output and follow the instructions.
  8. Enter your license.
  9. Register CircleCI as a new OAuth application in at or in the GitHub Enterprise Settings using the IP address of the AWS instance from Step 6 for the Homepage URL and using http(s)://AWS instance IP address/auth/github as the Authorization callback URL. Click the Register Application button.
    • Note: If you get an “Unknown error authenticating via GitHub. Try again, or contact us.” message, try using http: instead of https: for the Homepage URL and callback URL.
  10. Copy the Client ID from GitHub and paste it into the entry field for GitHub Application Client ID.
  11. Copy the Secret from GitHub and paste it into the entry field for GitHub Application Client Secret and click Test Authentication.
  12. Complete the Storage section. It is best practice to use an instance profile for authentication (no additional configuration required).
  13. Configure the vm-service if you plan to use Remote Docker or machine executor features (you can configure it later if necessary). Again, it is best to use an instance profile for authentication (no additional configuration required).
  14. After applying settings you will be redirected to the Management Console Dashboard. It will take a few minutes to download all of the necessary Docker containers. If the Management Console reports that Failure reported from operator: no such image click Start again and it should continue.
  15. After the application has started, log in to CircleCI and start running 2.0 builds!
  16. You can use our realitycheck repo to check basic CircleCI functionality.

Validating your Installation

  1. Click the Open link in the dashboard to go to the CircleCI app. The Starting page appears for a few minutes as the CircleCI application is booting up, then automatically redirects to the homepage.
  2. Sign up or sign in by clicking the Get Started button. Because you are the first user to log in, you become the Administrator.
  3. Add a project using the Hello World document.


If you’re unable to run your first builds successfully please start with our Troubleshooting guide as well as an Introduction to Nomad Cluster Operation document for information about how to check status of Builders.

After the build containers start and complete downloading of images, the first build should begin immediately.

If there are no updates after about 15 minutes and you have clicked the Refresh button, contact CircleCI support for assistance.