2014-07-28 19:43:00 +02:00
---
layout: "intro"
page_title: "Input Variables"
sidebar_current: "gettingstarted-variables"
2014-10-22 05:21:56 +02:00
description: |-
2015-01-03 19:31:53 +01:00
You now have enough Terraform knowledge to create useful configurations, but we're still hardcoding access keys, AMIs, etc. To become truly shareable and committable to version control, we need to parameterize the configurations. This page introduces input variables as a way to do this.
2014-07-28 19:43:00 +02:00
---
# Input Variables
You now have enough Terraform knowledge to create useful
configurations, but we're still hardcoding access keys,
2015-01-03 19:31:53 +01:00
AMIs, etc. To become truly shareable and committable to version
2014-07-28 19:43:00 +02:00
control, we need to parameterize the configurations. This page
introduces input variables as a way to do this.
## Defining Variables
Let's first extract our access key, secret key, and region
into a few variables. Create another file `variables.tf` with
the following contents. Note that the file can be named anything,
since Terraform loads all files ending in `.tf` in a directory.
```
variable "access_key" {}
variable "secret_key" {}
variable "region" {
default = "us-east-1"
}
```
This defines three variables within your Terraform configuration.
The first two have empty blocks `{}` . The third sets a default. If
a default value is set, the variable is optional. Otherwise, the
variable is required. If you run `terraform plan` now, Terraform will
error since the required variables are not set.
## Using Variables in Configuration
Next, replace the AWS provider configuration with the following:
```
provider "aws" {
access_key = "${var.access_key}"
secret_key = "${var.secret_key}"
region = "${var.region}"
}
```
This uses more interpolations, this time prefixed with `var.` . This
tells Terraform that you're accessing variables. This configures
the AWS provider with the given variables.
## Assigning Variables
2015-04-22 06:37:03 +02:00
There are multiple ways to assign variables. Below is also the order
in which variable values are chosen. If they're found in an option first
below, then the options below are ignored.
2014-07-28 19:43:00 +02:00
2015-04-22 06:37:03 +02:00
**UI Input:** If you execute `terraform plan` or apply without doing
2014-11-23 02:55:20 +01:00
anything, Terraform will ask you to input the variables interactively.
2014-10-13 20:57:43 +02:00
These variables are not saved, but provides a nice user experience for
getting started with Terraform.
2015-04-22 06:37:03 +02:00
**Command-line flags:** You can set it directly on the command-line with the
2014-07-28 19:43:00 +02:00
`-var` flag. Any command in Terraform that inspects the configuration
accepts this flag, such as `apply` , `plan` , and `refresh` :
```
$ terraform plan \
-var 'access_key=foo' \
-var 'secret_key=bar'
...
```
2014-10-13 20:57:43 +02:00
Once again, setting variables this way will not save them, and they'll
have to be input repeatedly as commands are executed.
2015-04-22 06:37:03 +02:00
**From a file:** To persist variable values, create
2014-10-13 20:57:43 +02:00
a file and assign variables within this file. Create a file named
"terraform.tfvars" with the following contents:
2014-07-28 19:43:00 +02:00
```
access_key = "foo"
secret_key = "bar"
```
2014-08-12 19:21:30 +02:00
If a "terraform.tfvars" file is present in the current directory,
Terraform automatically loads it to populate variables. If the file is
named something else, you can use the `-var-file` flag directly to
2014-10-13 20:57:43 +02:00
specify a file. These files are the same syntax as Terraform configuration
files. And like Terraform configuration files, these files can also be JSON.
2014-07-28 19:43:00 +02:00
2015-04-22 06:37:03 +02:00
**From environment variables:** Terraform will read environment variables
in the form of `TF_VAR_name` to find the value for a variable. For example,
the `TF_VAR_access_key` variable can be set to set the `access_key` variable.
2015-08-30 08:59:21 +02:00
We don't recommend saving usernames and password to version control, But you
can create a local secret variables file and use `-var-file` to load it.
You can use multiple `-var-file` arguments in a single command, with some
checked in to version control and others not checked in. For example:
```
$ terraform plan \
-var-file="secret.tfvars" \
-var-file="production.tfvars"
```
2014-07-28 19:43:00 +02:00
2015-07-01 20:11:21 +02:00
< a id = "mappings" > < / a >
2014-07-28 19:43:00 +02:00
## Mappings
We've replaced our sensitive strings with variables, but we still
are hardcoding AMIs. Unfortunately, AMIs are specific to the region
that is in use. One option is to just ask the user to input the proper
AMI for the region, but Terraform can do better than that with
_mappings_.
Mappings are a way to create variables that are lookup tables. An example
will show this best. Let's extract our AMIs into a mapping and add
support for the "us-west-2" region as well:
```
variable "amis" {
default = {
2015-12-11 17:07:06 +01:00
us-east-1 = "ami-8eb061e6"
us-west-2 = "ami-ef5e24df"
2014-07-28 19:43:00 +02:00
}
}
```
A variable becomes a mapping when it has a default value that is a
map like above. There is no way to create a required map.
Then, replace the "aws\_instance" with the following:
```
resource "aws_instance" "example" {
ami = "${lookup(var.amis, var.region)}"
2016-01-11 06:16:46 +01:00
instance_type = "t1.micro"
2014-07-28 19:43:00 +02:00
}
```
This introduces a new type of interpolation: a function call. The
`lookup` function does a dynamic lookup in a map for a key. The
key is `var.region` , which specifies that the value of the region
variables is the key.
2014-07-29 00:47:34 +02:00
While we don't use it in our example, it is worth noting that you
2014-07-28 19:43:00 +02:00
can also do a static lookup of a mapping directly with
`${var.amis.us-east-1}` .
2015-07-01 20:11:21 +02:00
< a id = "assigning-mappings" > < / a >
## Assigning Mappings
We set defaults above, but mappings can also be set using the `-var` and
`-var-file` values. For example, if the user wanted to specify an alternate AMI
for us-east-1:
2014-07-28 19:43:00 +02:00
```
$ terraform plan -var 'amis.us-east-1=foo'
...
```
2015-07-01 20:11:21 +02:00
**Note**: even if every key will be assigned as input, the variable must be
established as a mapping by setting its default to `{}` .
Here is an example of setting a mapping's keys from a file. Starting with these
variable definitions:
```
variable "region" {}
variable "amis" {
default = {}
}
```
You can specify keys in a `terraform.tfvars` file:
```
amis.us-east-1 = "ami-abc123"
amis.us-west-2 = "ami-def456"
```
And access them via `lookup()` :
```
output "ami" {
2015-11-07 04:02:05 +01:00
value = "${lookup(var.amis, var.region)}"
2015-07-01 20:11:21 +02:00
}
```
Like so:
```
$ terraform apply -var region=us-west-2
Apply complete! Resources: 0 added, 0 changed, 0 destroyed.
Outputs:
ami = ami-def456
```
2014-07-28 19:43:00 +02:00
## Next
Terraform provides variables for parameterizing your configurations.
2014-09-09 23:29:05 +02:00
Mappings let you build lookup tables in cases where that makes sense.
2014-07-28 19:43:00 +02:00
Setting and using variables is uniform throughout your configurations.
In the next section, we'll take a look at
[output variables ](/intro/getting-started/outputs.html ) as a mechanism
to expose certain values more prominently to the Terraform operator.