New Terraform Provider for VMware NSX-T Platform
We are excited to announce the new Terraform provider for VMware’s NSX-T platform available today. VMware users are now able to use HashiCorp Terraform for provisioning and managing NSX-T infrastructure. The NSX-T platform is ideal for customers transitioning into a containerized, multi-hypervisor, or multi-cloud environments. The Terraform provider offers support for a number of Data Sources and Resources making it easy for organizations to automate their NSX-T deployments.
» NSX-T Data Sources
With the new provider, users can configure data sources into their Terraform files. This tells Terraform where to find crucial data while it builds the specified resources. Some of the available data sources are:
- transport_zone
- switching_profile
- ns_service
- logical_tier0_router
- edge_cluster
» NSX-T Resources
Resources are the specific components of the NSX-T platform that Terraform can now create, manage, and destroy with the new provider. Resources can be provisioned individually or grouped together as part of a larger deployment all within the same configuration file. At launch, the resources being supported by the NSX-T provider will be:
- logical_switch
- logical_port
- logical_tier1_router
- logical_router_downlink_port
- logical_router_link_port_on_tier0
- logical_router_link_port_on_tier1
- l4_port_set_ns_service
- icmp_type_ns_service
- igmp_type_ns_service
- ether_type_ns_service
- alg_type_ns_service
- ip_protocol_ns_service
- ns_group
- firewall_section
- nat_rule
- ip_set
- dhcp_relay_profile
- dhcp_relay_service
- static_route
» Getting Started
For additional details and assistance getting started with this provider, VMware has published a blog and recorded a demo of a NSX-T and Terraform configuration (shown below).
For more information about Terraform please visit https://www.hashicorp.com/terraform
Sign up for the latest HashiCorp news
More blog posts like this one

Scalable, secure infrastructure code the right way: Use a private module registry
How do you ensure standard security, compliance, and reliability best practices are followed across your organization when provisioning infrastructure? A private module registry is the first step.

Vault Enterprise 1.20: SCEP, usage reporting, cloud secret imports
Vault 1.20 adds smarter, streamlined security workflows with encryption updates and UX improvements. The Terraform Vault provider adds ephemeral values.

Automating workload identity for Vault and Nomad with Terraform
Learn how to use HashiCorp Vault and workload identities in your Nomad-orchestrated applications.