github.com/iaas-resource-provision/iaas-rpc@v1.0.7-0.20211021023331-ed21f798c408/website/docs/language/state/remote-state-data.html.md (about)

     1  ---
     2  layout: "language"
     3  page_title: "The terraform_remote_state Data Source"
     4  sidebar_current: "docs-iaas-rpc.diratasource-remote-state"
     5  description: |-
     6    Retrieves the root module output values from a Terraform state snapshot stored in a remote backend.
     7  ---
     8  
     9  # The `terraform_remote_state` Data Source
    10  
    11  [backends]: /docs/backends/index.html
    12  
    13  The `terraform_remote_state` data source retrieves the root module output values
    14  from some other Terraform configuration, using the latest state snapshot from
    15  the remote backend.
    16  
    17  This data source is built into Terraform, and is always available; you do not
    18  need to require or configure a provider in order to use it.
    19  
    20  -> **Note:** This data source is implemented by a built-in provider, whose
    21  [source address](/docs/language/providers/requirements.html#source-addresses)
    22  is `terraform.io/builtin/terraform`. That provider does not include any other
    23  resources or data sources.
    24  
    25  ## Alternative Ways to Share Data Between Configurations
    26  
    27  Sharing data with root module outputs is convenient, but it has drawbacks.
    28  Although `terraform_remote_state` only exposes output values, its user must have
    29  access to the entire state snapshot, which often includes some sensitive
    30  information.
    31  
    32  When possible, we recommend explicitly publishing data for external consumption
    33  to a separate location instead of accessing it via remote state. This lets you
    34  apply different access controls for shared information and state snapshots.
    35  
    36  To share data explicitly between configurations, you can use pairs of managed
    37  resource types and data sources in various providers, including (but not
    38  limited to) the following:
    39  
    40  | System | Publish with... | Read with... |
    41  |--|--|--|
    42  | Alibaba Cloud DNS<br><small>(for IP addresses and hostnames)</small> | [`alicloud_alidns_record` resource type](https://registry.terraform.io/providers/aliyun/alicloud/latest/docs/resources/alidns_record) | Normal DNS lookups, or [the `dns` provider](https://registry.terraform.io/providers/hashicorp/dns/latest/docs) |
    43  | Amazon Route53<br><small>(for IP addresses and hostnames)</small> | [`aws_route53_record` resource type](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/route53_record) | Normal DNS lookups, or [the `dns` provider](https://registry.terraform.io/providers/hashicorp/dns/latest/docs) |
    44  | Amazon S3 | [`aws_s3_bucket_object` resource type](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/s3_bucket_object) | [`aws_s3_bucket_object` data source](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/s3_bucket_object) |
    45  | Amazon SSM Parameter Store | [`aws_ssm_parameter` resource type](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssm_parameter) | [`aws_ssm_parameter` data source](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/ssm_parameter) |
    46  | Azure Automation | [`azurerm_automation_variable_string` resource type](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/automation_variable_string) | [`azurerm_automation_variable_string` data source](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/data-sources/automation_variable_string) |
    47  | Azure DNS<br><small>(for IP addresses and hostnames)</small> | [`azurerm_dns_a_record` resource type](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/dns_a_record), etc | Normal DNS lookups, or [the `dns` provider](https://registry.terraform.io/providers/hashicorp/dns/latest/docs) |
    48  | Google Cloud DNS<br><small>(for IP addresses and hostnames)</small> | [`google_dns_record_set` resource type](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/dns_record_set) | Normal DNS lookups, or [the `dns` provider](https://registry.terraform.io/providers/hashicorp/dns/latest/docs) |
    49  | Google Cloud Storage | [`google_storage_bucket_object`  resource type](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/storage_bucket_object) | [`google_storage_bucket_object` data source](https://registry.terraform.io/providers/hashicorp/google/latest/docs/data-sources/storage_bucket_object) and [`http` data source](https://registry.terraform.io/providers/hashicorp/http/latest/docs/data-sources/http) |
    50  | HashiCorp Consul | [`consul_key_prefix` resource type](https://registry.terraform.io/providers/hashicorp/consul/latest/docs/resources/key_prefix) | [`consul_key_prefix` data source](https://registry.terraform.io/providers/hashicorp/consul/latest/docs/data-sources/key_prefix) |
    51  | Kubernetes | [`kubernetes_config_map` resource type](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/config_map) | [`kubernetes_config_map` data source](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/data-sources/config_map) |
    52  | OCI Object Storage | [`oci_objectstorage_bucket` resource type](https://registry.terraform.io/providers/hashicorp/oci/latest/docs/resources/objectstorage_object) | [`oci_objectstorage_bucket` data source](https://registry.terraform.io/providers/hashicorp/oci/latest/docs/data-sources/objectstorage_object) |
    53  
    54  -> These are some common options from the Official Terraform providers, but
    55  there are too many configuration storage options for us to list them all
    56  here, including some in partner and community providers.
    57  Any pair of managed resource type and corresponding data source can potentially
    58  be used to share data between Terraform configurations. See individual provider
    59  documentation to find other possibilities.
    60  
    61  A key advantage of using a separate explicit configuration store instead of
    62  `terraform_remote_state` is that the data can potentially also be read by
    63  systems other than Terraform, such as configuration management or scheduler
    64  systems within your compute instances. For that reason, we recommend selecting
    65  a configuration store that your other infrastructure could potentially make
    66  use of. For example:
    67  
    68  * If you wish to share IP addresses and hostnames, you could publish them as
    69  normal DNS `A`, `AAAA`, `CNAME`, and `SRV` records in a private DNS zone and
    70  then configure your other infrastructure to refer to that zone so you can
    71  find infrastructure objects via your system's built-in DNS resolver.
    72  * If you use HashiCorp Consul then publishing data to the Consul key/value
    73  store or Consul service catalog can make that data also accessible via
    74  [Consul Template](https://github.com/hashicorp/consul-template)
    75  or the
    76  [HashiCorp Nomad](https://www.nomadproject.io/docs/job-specification/template)
    77  `template` stanza.
    78  * If you use Kubernetes then you can
    79  [make Config Maps available to your Pods](https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/).
    80  
    81  Some of the data stores listed above are specifically designed for storing
    82  small configuration values, while others are generic blob storage systems. For
    83  those generic systems, you can use
    84  [the `jsonencode` function](https://www.terraform.io/docs/language/functions/jsonencode.html)
    85  and
    86  [the `jsondecode` function](https://www.terraform.io/docs/language/functions/jsondecode.html) respectively
    87  to store and retrieve structured data.
    88  
    89  You can encapsulate the implementation details of retrieving your published
    90  configuration data by writing a
    91  [data-only module](/docs/language/modules/develop/composition.html#data-only-modules)
    92  containing the necessary data source configuration and any necessary
    93  post-processing such as JSON decoding. You can then change that module later
    94  if you switch to a different strategy for sharing data between multiple
    95  Terraform configurations.
    96  
    97  ## Example Usage (`remote` Backend)
    98  
    99  ```hcl
   100  data "terraform_remote_state" "vpc" {
   101    backend = "remote"
   102  
   103    config = {
   104      organization = "hashicorp"
   105      workspaces = {
   106        name = "vpc-prod"
   107      }
   108    }
   109  }
   110  
   111  # Terraform >= 0.12
   112  resource "aws_instance" "foo" {
   113    # ...
   114    subnet_id = data.terraform_remote_state.vpc.outputs.subnet_id
   115  }
   116  
   117  # Terraform <= 0.11
   118  resource "aws_instance" "foo" {
   119    # ...
   120    subnet_id = "${data.terraform_remote_state.vpc.subnet_id}"
   121  }
   122  ```
   123  
   124  ## Example Usage (`local` Backend)
   125  
   126  ```hcl
   127  data "terraform_remote_state" "vpc" {
   128    backend = "local"
   129  
   130    config = {
   131      path = "..."
   132    }
   133  }
   134  
   135  # Terraform >= 0.12
   136  resource "aws_instance" "foo" {
   137    # ...
   138    subnet_id = data.terraform_remote_state.vpc.outputs.subnet_id
   139  }
   140  
   141  # Terraform <= 0.11
   142  resource "aws_instance" "foo" {
   143    # ...
   144    subnet_id = "${data.terraform_remote_state.vpc.subnet_id}"
   145  }
   146  ```
   147  
   148  ## Argument Reference
   149  
   150  The following arguments are supported:
   151  
   152  * `backend` - (Required) The remote backend to use.
   153  * `workspace` - (Optional) The Terraform workspace to use, if the backend
   154    supports workspaces.
   155  * `config` - (Optional; object) The configuration of the remote backend.
   156    Although this argument is listed as optional, most backends require
   157    some configuration.
   158  
   159      The `config` object can use any arguments that would be valid in the
   160      equivalent `terraform { backend "<TYPE>" { ... } }` block. See
   161      [the documentation of your chosen backend](/docs/language/settings/backends/index.html)
   162      for details.
   163  
   164      -> **Note:** If the backend configuration requires a nested block, specify
   165      it here as a normal attribute with an object value. (For example,
   166      `workspaces = { ... }` instead of `workspaces { ... }`.)
   167  * `defaults` - (Optional; object) Default values for outputs, in case the state
   168    file is empty or lacks a required output.
   169  
   170  ## Attributes Reference
   171  
   172  In addition to the above, the following attributes are exported:
   173  
   174  * (v0.12+) `outputs` - An object containing every root-level
   175    [output](/docs/language/values/outputs.html) in the remote state.
   176  * (<= v0.11) `<OUTPUT NAME>` - Each root-level [output](/docs/language/values/outputs.html)
   177    in the remote state appears as a top level attribute on the data source.
   178  
   179  ## Root Outputs Only
   180  
   181  Only the root-level output values from the remote state snapshot are exposed
   182  for use elsewhere in your module. Resource data and output values from nested
   183  modules are not accessible.
   184  
   185  If you wish to make a nested module output value accessible as a root module
   186  output value, you must explicitly configure a passthrough in the root module.
   187  For example:
   188  
   189  For example:
   190  
   191  ```hcl
   192  module "app" {
   193    source = "..."
   194  }
   195  
   196  output "app_value" {
   197    # This syntax is for Terraform 0.12 or later.
   198    value = module.app.example
   199  }
   200  ```
   201  
   202  In this example, the output value named `example` from the "app" module is
   203  available as the `app_value` root module output value. If this configuration
   204  didn't include the `output "app_value"` block then the data would not be
   205  accessible via `terraform_remote_state`.
   206  
   207  ~> **Warning:** Although `terraform_remote_state` doesn't expose any other
   208  state snapshot information for use in configuration, the state snapshot data
   209  is a single object and so any user or server which has enough access to read
   210  the root module output values will also always have access to the full state
   211  snapshot data by direct network requests. Don't use `terraform_remote_state`
   212  if any of the resources in your configuration work with data that you consider
   213  sensitive.