github.com/hs0210/hashicorp-terraform@v0.11.12-beta1/website/intro/getting-started/variables.html.md (about)

     1  ---
     2  layout: "intro"
     3  page_title: "Input Variables"
     4  sidebar_current: "gettingstarted-variables"
     5  description: |-
     6    You now have enough Terraform knowledge to create useful configurations, but we're still hardcoding access keys, AMIs, etc. To become truly shareable and committable to version control, we need to parameterize the configurations. This page introduces input variables as a way to do this.
     7  ---
     8  
     9  # Input Variables
    10  
    11  You now have enough Terraform knowledge to create useful
    12  configurations, but we're still hard-coding access keys,
    13  AMIs, etc. To become truly shareable and version
    14  controlled, we need to parameterize the configurations. This page
    15  introduces input variables as a way to do this.
    16  
    17  ## Defining Variables
    18  
    19  Let's first extract our access key, secret key, and region
    20  into a few variables. Create another file `variables.tf` with
    21  the following contents.
    22  
    23  -> **Note**: that the file can be named anything, since Terraform loads all
    24  files ending in `.tf` in a directory.
    25  
    26  ```hcl
    27  variable "access_key" {}
    28  variable "secret_key" {}
    29  variable "region" {
    30    default = "us-east-1"
    31  }
    32  ```
    33  
    34  This defines three variables within your Terraform configuration.  The first
    35  two have empty blocks `{}`. The third sets a default. If a default value is
    36  set, the variable is optional. Otherwise, the variable is required. If you run
    37  `terraform plan` now, Terraform will prompt you for the values for unset string
    38  variables.
    39  
    40  ## Using Variables in Configuration
    41  
    42  Next, replace the AWS provider configuration with the following:
    43  
    44  ```hcl
    45  provider "aws" {
    46    access_key = "${var.access_key}"
    47    secret_key = "${var.secret_key}"
    48    region     = "${var.region}"
    49  }
    50  ```
    51  
    52  This uses more interpolations, this time prefixed with `var.`. This
    53  tells Terraform that you're accessing variables. This configures
    54  the AWS provider with the given variables.
    55  
    56  ## Assigning Variables
    57  
    58  There are multiple ways to assign variables. Below is also the order
    59  in which variable values are chosen. The following is the descending order
    60  of precedence in which variables are considered.
    61  
    62  #### Command-line flags
    63  
    64  You can set variables directly on the command-line with the
    65  `-var` flag. Any command in Terraform that inspects the configuration
    66  accepts this flag, such as `apply`, `plan`, and `refresh`:
    67  
    68  ```
    69  $ terraform apply \
    70    -var 'access_key=foo' \
    71    -var 'secret_key=bar'
    72  # ...
    73  ```
    74  
    75  Once again, setting variables this way will not save them, and they'll
    76  have to be input repeatedly as commands are executed.
    77  
    78  #### From a file
    79  
    80  To persist variable values, create a file and assign variables within
    81  this file. Create a file named `terraform.tfvars` with the following
    82  contents:
    83  
    84  ```hcl
    85  access_key = "foo"
    86  secret_key = "bar"
    87  ```
    88  
    89  For all files which match `terraform.tfvars` or `*.auto.tfvars` present in the
    90  current directory, Terraform automatically loads them to populate variables. If
    91  the file is named something else, you can use the `-var-file` flag directly to
    92  specify a file. These files are the same syntax as Terraform
    93  configuration files. And like Terraform configuration files, these files
    94  can also be JSON.
    95  
    96  We don't recommend saving usernames and password to version control, but you
    97  can create a local secret variables file and use `-var-file` to load it.
    98  
    99  You can use multiple `-var-file` arguments in a single command, with some
   100  checked in to version control and others not checked in. For example:
   101  
   102  ```
   103  $ terraform apply \
   104    -var-file="secret.tfvars" \
   105    -var-file="production.tfvars"
   106  ```
   107  
   108  #### From environment variables
   109  
   110  Terraform will read environment variables in the form of `TF_VAR_name`
   111  to find the value for a variable. For example, the `TF_VAR_access_key`
   112  variable can be set to set the `access_key` variable.
   113  
   114  -> **Note**: Environment variables can only populate string-type variables.
   115  List and map type variables must be populated via one of the other mechanisms.
   116  
   117  #### UI Input
   118  
   119  If you execute `terraform apply` with certain variables unspecified,
   120  Terraform will ask you to input their values interactively.  These
   121  values are not saved, but this provides a convenient workflow when getting
   122  started with Terraform. UI Input is not recommended for everyday use of
   123  Terraform.
   124  
   125  -> **Note**: UI Input is only supported for string variables. List and map
   126  variables must be populated via one of the other mechanisms.
   127  
   128  #### Variable Defaults
   129  
   130  If no value is assigned to a variable via any of these methods and the
   131  variable has a `default` key in its declaration, that value will be used
   132  for the variable.
   133  
   134  <a id="lists"></a>
   135  ## Lists
   136  
   137  Lists are defined either explicitly or implicitly
   138  
   139  ```hcl
   140  # implicitly by using brackets [...]
   141  variable "cidrs" { default = [] }
   142  
   143  # explicitly
   144  variable "cidrs" { type = "list" }
   145  ```
   146  
   147  You can specify lists in a `terraform.tfvars` file:
   148  
   149  ```hcl
   150  cidrs = [ "10.0.0.0/16", "10.1.0.0/16" ]
   151  ```
   152  
   153  ## Maps
   154  
   155  We've replaced our sensitive strings with variables, but we still
   156  are hard-coding AMIs. Unfortunately, AMIs are specific to the region
   157  that is in use. One option is to just ask the user to input the proper
   158  AMI for the region, but Terraform can do better than that with
   159  _maps_.
   160  
   161  Maps are a way to create variables that are lookup tables. An example
   162  will show this best. Let's extract our AMIs into a map and add
   163  support for the `us-west-2` region as well:
   164  
   165  ```hcl
   166  variable "amis" {
   167    type = "map"
   168    default = {
   169      "us-east-1" = "ami-b374d5a5"
   170      "us-west-2" = "ami-4b32be2b"
   171    }
   172  }
   173  ```
   174  
   175  A variable can have a `map` type assigned explicitly, or it can be implicitly
   176  declared as a map by specifying a default value that is a map. The above
   177  demonstrates both.
   178  
   179  Then, replace the `aws_instance` with the following:
   180  
   181  ```hcl
   182  resource "aws_instance" "example" {
   183    ami           = "${lookup(var.amis, var.region)}"
   184    instance_type = "t2.micro"
   185  }
   186  ```
   187  
   188  This introduces a new type of interpolation: a function call. The
   189  `lookup` function does a dynamic lookup in a map for a key. The
   190  key is `var.region`, which specifies that the value of the region
   191  variables is the key.
   192  
   193  While we don't use it in our example, it is worth noting that you
   194  can also do a static lookup of a map directly with
   195  `${var.amis["us-east-1"]}`.
   196  
   197  ## Assigning Maps
   198  
   199  We set defaults above, but maps can also be set using the `-var` and
   200  `-var-file` values. For example:
   201  
   202  ```
   203  $ terraform apply -var 'amis={ us-east-1 = "foo", us-west-2 = "bar" }'
   204  # ...
   205  ```
   206  
   207  -> **Note**: Even if every key will be assigned as input, the variable must be
   208  established as a map by setting its default to `{}`.
   209  
   210  Here is an example of setting a map's keys from a file. Starting with these
   211  variable definitions:
   212  
   213  ```hcl
   214  variable "region" {}
   215  variable "amis" {
   216    type = "map"
   217  }
   218  ```
   219  
   220  You can specify keys in a `terraform.tfvars` file:
   221  
   222  ```hcl
   223  amis = {
   224    "us-east-1" = "ami-abc123"
   225    "us-west-2" = "ami-def456"
   226  }
   227  ```
   228  
   229  And access them via `lookup()`:
   230  
   231  ```hcl
   232  output "ami" {
   233    value = "${lookup(var.amis, var.region)}"
   234  }
   235  ```
   236  
   237  Like so:
   238  
   239  ```
   240  $ terraform apply -var region=us-west-2
   241  
   242  Apply complete! Resources: 0 added, 0 changed, 0 destroyed.
   243  
   244  Outputs:
   245  
   246    ami = ami-def456
   247  ```
   248  
   249  ## Next
   250  
   251  Terraform provides variables for parameterizing your configurations.
   252  Maps let you build lookup tables in cases where that makes sense.
   253  Setting and using variables is uniform throughout your configurations.
   254  
   255  In the next section, we'll take a look at
   256  [output variables](/intro/getting-started/outputs.html) as a mechanism
   257  to expose certain values more prominently to the Terraform operator.