github.com/hs0210/hashicorp-terraform@v0.11.12-beta1/website/intro/getting-started/variables.html.md (about) 1 --- 2 layout: "intro" 3 page_title: "Input Variables" 4 sidebar_current: "gettingstarted-variables" 5 description: |- 6 You now have enough Terraform knowledge to create useful configurations, but we're still hardcoding access keys, AMIs, etc. To become truly shareable and committable to version control, we need to parameterize the configurations. This page introduces input variables as a way to do this. 7 --- 8 9 # Input Variables 10 11 You now have enough Terraform knowledge to create useful 12 configurations, but we're still hard-coding access keys, 13 AMIs, etc. To become truly shareable and version 14 controlled, we need to parameterize the configurations. This page 15 introduces input variables as a way to do this. 16 17 ## Defining Variables 18 19 Let's first extract our access key, secret key, and region 20 into a few variables. Create another file `variables.tf` with 21 the following contents. 22 23 -> **Note**: that the file can be named anything, since Terraform loads all 24 files ending in `.tf` in a directory. 25 26 ```hcl 27 variable "access_key" {} 28 variable "secret_key" {} 29 variable "region" { 30 default = "us-east-1" 31 } 32 ``` 33 34 This defines three variables within your Terraform configuration. The first 35 two have empty blocks `{}`. The third sets a default. If a default value is 36 set, the variable is optional. Otherwise, the variable is required. If you run 37 `terraform plan` now, Terraform will prompt you for the values for unset string 38 variables. 39 40 ## Using Variables in Configuration 41 42 Next, replace the AWS provider configuration with the following: 43 44 ```hcl 45 provider "aws" { 46 access_key = "${var.access_key}" 47 secret_key = "${var.secret_key}" 48 region = "${var.region}" 49 } 50 ``` 51 52 This uses more interpolations, this time prefixed with `var.`. This 53 tells Terraform that you're accessing variables. This configures 54 the AWS provider with the given variables. 55 56 ## Assigning Variables 57 58 There are multiple ways to assign variables. Below is also the order 59 in which variable values are chosen. The following is the descending order 60 of precedence in which variables are considered. 61 62 #### Command-line flags 63 64 You can set variables directly on the command-line with the 65 `-var` flag. Any command in Terraform that inspects the configuration 66 accepts this flag, such as `apply`, `plan`, and `refresh`: 67 68 ``` 69 $ terraform apply \ 70 -var 'access_key=foo' \ 71 -var 'secret_key=bar' 72 # ... 73 ``` 74 75 Once again, setting variables this way will not save them, and they'll 76 have to be input repeatedly as commands are executed. 77 78 #### From a file 79 80 To persist variable values, create a file and assign variables within 81 this file. Create a file named `terraform.tfvars` with the following 82 contents: 83 84 ```hcl 85 access_key = "foo" 86 secret_key = "bar" 87 ``` 88 89 For all files which match `terraform.tfvars` or `*.auto.tfvars` present in the 90 current directory, Terraform automatically loads them to populate variables. If 91 the file is named something else, you can use the `-var-file` flag directly to 92 specify a file. These files are the same syntax as Terraform 93 configuration files. And like Terraform configuration files, these files 94 can also be JSON. 95 96 We don't recommend saving usernames and password to version control, but you 97 can create a local secret variables file and use `-var-file` to load it. 98 99 You can use multiple `-var-file` arguments in a single command, with some 100 checked in to version control and others not checked in. For example: 101 102 ``` 103 $ terraform apply \ 104 -var-file="secret.tfvars" \ 105 -var-file="production.tfvars" 106 ``` 107 108 #### From environment variables 109 110 Terraform will read environment variables in the form of `TF_VAR_name` 111 to find the value for a variable. For example, the `TF_VAR_access_key` 112 variable can be set to set the `access_key` variable. 113 114 -> **Note**: Environment variables can only populate string-type variables. 115 List and map type variables must be populated via one of the other mechanisms. 116 117 #### UI Input 118 119 If you execute `terraform apply` with certain variables unspecified, 120 Terraform will ask you to input their values interactively. These 121 values are not saved, but this provides a convenient workflow when getting 122 started with Terraform. UI Input is not recommended for everyday use of 123 Terraform. 124 125 -> **Note**: UI Input is only supported for string variables. List and map 126 variables must be populated via one of the other mechanisms. 127 128 #### Variable Defaults 129 130 If no value is assigned to a variable via any of these methods and the 131 variable has a `default` key in its declaration, that value will be used 132 for the variable. 133 134 <a id="lists"></a> 135 ## Lists 136 137 Lists are defined either explicitly or implicitly 138 139 ```hcl 140 # implicitly by using brackets [...] 141 variable "cidrs" { default = [] } 142 143 # explicitly 144 variable "cidrs" { type = "list" } 145 ``` 146 147 You can specify lists in a `terraform.tfvars` file: 148 149 ```hcl 150 cidrs = [ "10.0.0.0/16", "10.1.0.0/16" ] 151 ``` 152 153 ## Maps 154 155 We've replaced our sensitive strings with variables, but we still 156 are hard-coding AMIs. Unfortunately, AMIs are specific to the region 157 that is in use. One option is to just ask the user to input the proper 158 AMI for the region, but Terraform can do better than that with 159 _maps_. 160 161 Maps are a way to create variables that are lookup tables. An example 162 will show this best. Let's extract our AMIs into a map and add 163 support for the `us-west-2` region as well: 164 165 ```hcl 166 variable "amis" { 167 type = "map" 168 default = { 169 "us-east-1" = "ami-b374d5a5" 170 "us-west-2" = "ami-4b32be2b" 171 } 172 } 173 ``` 174 175 A variable can have a `map` type assigned explicitly, or it can be implicitly 176 declared as a map by specifying a default value that is a map. The above 177 demonstrates both. 178 179 Then, replace the `aws_instance` with the following: 180 181 ```hcl 182 resource "aws_instance" "example" { 183 ami = "${lookup(var.amis, var.region)}" 184 instance_type = "t2.micro" 185 } 186 ``` 187 188 This introduces a new type of interpolation: a function call. The 189 `lookup` function does a dynamic lookup in a map for a key. The 190 key is `var.region`, which specifies that the value of the region 191 variables is the key. 192 193 While we don't use it in our example, it is worth noting that you 194 can also do a static lookup of a map directly with 195 `${var.amis["us-east-1"]}`. 196 197 ## Assigning Maps 198 199 We set defaults above, but maps can also be set using the `-var` and 200 `-var-file` values. For example: 201 202 ``` 203 $ terraform apply -var 'amis={ us-east-1 = "foo", us-west-2 = "bar" }' 204 # ... 205 ``` 206 207 -> **Note**: Even if every key will be assigned as input, the variable must be 208 established as a map by setting its default to `{}`. 209 210 Here is an example of setting a map's keys from a file. Starting with these 211 variable definitions: 212 213 ```hcl 214 variable "region" {} 215 variable "amis" { 216 type = "map" 217 } 218 ``` 219 220 You can specify keys in a `terraform.tfvars` file: 221 222 ```hcl 223 amis = { 224 "us-east-1" = "ami-abc123" 225 "us-west-2" = "ami-def456" 226 } 227 ``` 228 229 And access them via `lookup()`: 230 231 ```hcl 232 output "ami" { 233 value = "${lookup(var.amis, var.region)}" 234 } 235 ``` 236 237 Like so: 238 239 ``` 240 $ terraform apply -var region=us-west-2 241 242 Apply complete! Resources: 0 added, 0 changed, 0 destroyed. 243 244 Outputs: 245 246 ami = ami-def456 247 ``` 248 249 ## Next 250 251 Terraform provides variables for parameterizing your configurations. 252 Maps let you build lookup tables in cases where that makes sense. 253 Setting and using variables is uniform throughout your configurations. 254 255 In the next section, we'll take a look at 256 [output variables](/intro/getting-started/outputs.html) as a mechanism 257 to expose certain values more prominently to the Terraform operator.