github.com/zhizhiboom/nomad@v0.8.5-0.20180907175415-f28fd3a1a056/website/source/docs/job-specification/template.html.md (about)

     1  ---
     2  layout: "docs"
     3  page_title: "template Stanza - Job Specification"
     4  sidebar_current: "docs-job-specification-template"
     5  description: |-
     6    The "template" block instantiates an instance of a template renderer. This
     7    creates a convenient way to ship configuration files that are populated from
     8    environment variables, Consul data, Vault secrets, or just general
     9    configurations within a Nomad task.
    10  ---
    11  
    12  # `template` Stanza
    13  
    14  <table class="table table-bordered table-striped">
    15    <tr>
    16      <th width="120">Placement</th>
    17      <td>
    18        <code>job -> group -> task -> **template**</code>
    19      </td>
    20    </tr>
    21  </table>
    22  
    23  The `template` block instantiates an instance of a template renderer. This
    24  creates a convenient way to ship configuration files that are populated from
    25  environment variables, Consul data, Vault secrets, or just general
    26  configurations within a Nomad task.
    27  
    28  ```hcl
    29  job "docs" {
    30    group "example" {
    31      task "server" {
    32        template {
    33          source        = "local/redis.conf.tpl"
    34          destination   = "local/redis.conf"
    35          change_mode   = "signal"
    36          change_signal = "SIGINT"
    37        }
    38      }
    39    }
    40  }
    41  ```
    42  
    43  Nomad utilizes a tool called [Consul Template][ct]. Since Nomad v0.5.3, the
    44  template can reference [Nomad's runtime environment variables][env]. Since Nomad
    45  v0.5.6, the template can reference [Node attributes and metadata][nodevars]. For
    46  a full list of the API template functions, please refer to the [Consul Template
    47  README][ct]. Since Nomad v0.6.0, templates can be read as environment variables.
    48  
    49  ## `template` Parameters
    50  
    51  - `change_mode` `(string: "restart")` - Specifies the behavior Nomad should take
    52    if the rendered template changes. Nomad will always write the new contents of
    53    the template to the specified destination. The possible values below describe
    54    Nomad's action after writing the template to disk.
    55  
    56    - `"noop"` - take no action (continue running the task)
    57    - `"restart"` - restart the task
    58    - `"signal"` - send a configurable signal to the task
    59  
    60  - `change_signal` `(string: "")` - Specifies the signal to send to the task as a
    61    string like `"SIGUSR1"` or `"SIGINT"`. This option is required if the
    62    `change_mode` is `signal`.
    63  
    64  - `data` `(string: "")` - Specifies the raw template to execute. One of `source`
    65    or `data` must be specified, but not both. This is useful for smaller
    66    templates, but we recommend using `source` for larger templates.
    67  
    68  - `destination` `(string: <required>)` - Specifies the location where the
    69    resulting template should be rendered, relative to the task directory.
    70  
    71  - `env` `(bool: false)` - Specifies the template should be read back in as
    72    environment variables for the task. (See below)
    73  
    74  - `left_delimiter` `(string: "{{")` - Specifies the left delimiter to use in the
    75    template. The default is "{{" for some templates, it may be easier to use a
    76    different delimiter that does not conflict with the output file itself.
    77  
    78  - `perms` `(string: "644")` - Specifies the rendered template's permissions.
    79    File permissions are given as octal of the Unix file permissions rwxrwxrwx.
    80  
    81  - `right_delimiter` `(string: "}}")` - Specifies the right delimiter to use in the
    82    template. The default is "}}" for some templates, it may be easier to use a
    83    different delimiter that does not conflict with the output file itself.
    84  
    85  - `source` `(string: "")` - Specifies the path to the template to be rendered.
    86    One of `source` or `data` must be specified, but not both. This source can
    87    optionally be fetched using an [`artifact`][artifact] resource. This template
    88    must exist on the machine prior to starting the task; it is not possible to
    89    reference a template inside of a Docker container, for example.
    90  
    91  - `splay` `(string: "5s")` - Specifies a random amount of time to wait between
    92    0 ms and the given splay value before invoking the change mode. This is
    93    specified using a label suffix like "30s" or "1h", and is often used to
    94    prevent a thundering herd problem where all task instances restart at the same
    95    time.
    96  
    97  -   `vault_grace` `(string: "15s")` - Specifies the grace period between lease
    98      renewal and secret re-acquisition. When renewing a secret, if the remaining
    99      lease is less than or equal to the configured grace, the template will request
   100      a new credential. This prevents Vault from revoking the secret at its
   101      expiration and the task having a stale secret.
   102  
   103      If the grace is set to a value that is higher than your default TTL or max
   104      TTL, the template will always read a new secret. **If secrets are being
   105      renewed constantly, decrease the `vault_grace`.**
   106  
   107      If the task defines several templates, the `vault_grace` will be set to the
   108      lowest value across all the templates.
   109  
   110  
   111  ## `template` Examples
   112  
   113  The following examples only show the `template` stanzas. Remember that the
   114  `template` stanza is only valid in the placements listed above.
   115  
   116  ### Inline Template
   117  
   118  This example uses an inline template to render a file to disk. This file watches
   119  various keys in Consul for changes:
   120  
   121  ```hcl
   122  template {
   123    data        = "---\nkey: {{ key \"service/my-key\" }}"
   124    destination = "local/file.yml"
   125  }
   126  ```
   127  
   128  It is also possible to use heredocs for multi-line templates, like:
   129  
   130  ```hcl
   131  template {
   132    data = <<EOH
   133    ---
   134      bind_port:   {{ env "NOMAD_PORT_db" }}
   135      scratch_dir: {{ env "NOMAD_TASK_DIR" }}
   136      node_id:     {{ env "node.unique.id" }}
   137      service_key: {{ key "service/my-key" }}
   138    EOH
   139  
   140    destination = "local/file.yml"
   141  }
   142  ```
   143  
   144  ### Remote Template
   145  
   146  This example uses an [`artifact`][artifact] stanza to download an input template
   147  before passing it to the template engine:
   148  
   149  ```hcl
   150  artifact {
   151    source      = "https://example.com/file.yml.tpl"
   152    destination = "local/file.yml.tpl"
   153  }
   154  
   155  template {
   156    source      = "local/file.yml.tpl"
   157    destination = "local/file.yml"
   158  }
   159  ```
   160  
   161  ### Node Variables
   162  
   163  As of Nomad v0.5.6 it is possible to access the Node's attributes and metadata.
   164  
   165  ```hcl
   166  template {
   167    data = <<EOH
   168    ---
   169      node_dc:    {{ env "node.datacenter" }}
   170      node_cores: {{ env "attr.cpu.numcores" }}
   171      meta_key:   {{ env "meta.node_meta_key" }}
   172    EOH
   173  
   174    destination = "local/file.yml"
   175  }
   176  ```
   177  
   178  ### Environment Variables
   179  
   180  Since v0.6.0 templates may be used to create environment variables for tasks.
   181  Env templates work exactly like other templates except once they're written,
   182  they're read back in as `KEY=value` pairs. Those key value pairs are included
   183  in the task's environment.
   184  
   185  For example the following template stanza:
   186  
   187  ```hcl
   188  template {
   189    data = <<EOH
   190  # Lines starting with a # are ignored
   191  
   192  # Empty lines are also ignored
   193  LOG_LEVEL="{{key "service/geo-api/log-verbosity"}}"
   194  API_KEY="{{with secret "secret/geo-api-key"}}{{.Data.value}}{{end}}"
   195  EOH
   196  
   197    destination = "secrets/file.env"
   198    env         = true
   199  }
   200  ```
   201  
   202  The task's environment would then have environment variables like the
   203  following:
   204  
   205  ```
   206  LOG_LEVEL=DEBUG
   207  API_KEY=12345678-1234-1234-1234-1234-123456789abc
   208  ```
   209  
   210  This allows [12factor app](https://12factor.net/config) style environment
   211  variable based configuration while keeping all of the familiar features and
   212  semantics of Nomad templates.
   213  
   214  If a value may include newlines you should JSON encode it:
   215  
   216  ```
   217  CERT_PEM={{ file "path/to/cert.pem" | toJSON }}
   218  ```
   219  
   220  The parser will read the JSON string, so the `$CERT_PEM` environment variable
   221  will be identical to the contents of the file.
   222  
   223  For more details see [go-envparser's
   224  README](https://github.com/hashicorp/go-envparse#readme).
   225  
   226  ## Vault Integration
   227  
   228  ### PKI Certificate
   229  
   230  This example acquires a PKI certificate from Vault in PEM format and stores it into your application's secret directory.
   231  
   232  ```hcl
   233  template {
   234    data = <<EOH
   235  {{ with secret "pki/issue/foo" "common_name=foo.service.consul" "ip_sans=127.0.0.1" "format=pem" }}
   236  {{ .Data.certificate }}
   237  {{ .Data.issuing_ca }}
   238  {{ .Data.private_key }}{{ end }}
   239  EOH
   240    destination   = "${NOMAD_SECRETS_DIR}/bundle.pem"
   241    change_mode   = "restart"
   242  }
   243  ```
   244  
   245  ### Vault KV API v1
   246  
   247  Under Vault KV API v1, paths start with `secret/`, and the response returns the
   248  raw key/value data. This secret was set using
   249  `vault kv put secret/aws/s3 aws_access_key_id=somekeyid`.
   250  
   251  ```hcl
   252    template {
   253      data = <<EOF
   254        AWS_ACCESS_KEY_ID = "{{with secret "secret/aws/s3"}}{{.Data.aws_access_key_id}}{{end}}"
   255      EOF
   256    }
   257  ```
   258  
   259  ### Vault KV API v2
   260  
   261  Under Vault KV API v2, paths start with `secret/data/`, and the response returns
   262  metadata in addition to key/value data. This secret was set using
   263  `vault kv put secret/aws/s3 aws_access_key_id=somekeyid`.
   264  
   265  ```hcl
   266    template {
   267      data = <<EOF
   268        AWS_ACCESS_KEY_ID = "{{with secret "secret/data/aws/s3"}}{{.Data.data.aws_access_key_id}}{{end}}"
   269      EOF
   270    }
   271  ```
   272  
   273  Notice the addition of `data` in both the path and the field accessor string.
   274  Additionally, when using the Vault v2 API, the Vault policies applied to your
   275  Nomad jobs will need to grant permissions to `read` under `secret/data/...`
   276  rather than `secret/...`.
   277  
   278  ## Client Configuration
   279  
   280  The `template` block has the following [client configuration
   281  options](/docs/configuration/client.html#options):
   282  
   283  * `template.allow_host_source` - Allows templates to specify their source
   284    template as an absolute path referencing host directories. Defaults to `true`.
   285  
   286  [ct]: https://github.com/hashicorp/consul-template "Consul Template by HashiCorp"
   287  [artifact]: /docs/job-specification/artifact.html "Nomad artifact Job Specification"
   288  [env]: /docs/runtime/environment.html "Nomad Runtime Environment"
   289  [nodevars]: /docs/runtime/interpolation.html#interpreted_node_vars "Nomad Node Variables"