Merge pull request #9301 from jamtur01/patch-11

Updated provisioning getting started
This commit is contained in:
James Nugent 2016-10-10 22:45:39 -04:00 committed by GitHub
commit 258005408b
1 changed files with 22 additions and 22 deletions

View File

@ -3,20 +3,20 @@ layout: "intro"
page_title: "Provision"
sidebar_current: "gettingstarted-provision"
description: |-
You're now able to create and modify infrastructure. This page introduces how to use provisioners to run basic shell scripts on instances when they're created.
Introduces provisioners that can initialize instances when they're created.
---
# Provision
You're now able to create and modify infrastructure. This page
introduces how to use provisioners to run basic shell scripts on
instances when they're created.
You're now able to create and modify infrastructure. Now let's see
how to use provisioners to initialize instances when they're created.
If you're using an image-based infrastructure (perhaps with images
created with [Packer](https://www.packer.io)), then what you've
learned so far is good enough. But if you need to do some initial
setup on your instances, provisioners let you upload files,
run shell scripts, etc.
setup on your instances, then provisioners let you upload files,
run shell scripts, or install and trigger other software like
configuration management tools, etc.
## Defining a Provisioner
@ -29,25 +29,25 @@ resource "aws_instance" "example" {
instance_type = "t2.micro"
provisioner "local-exec" {
command = "echo ${aws_instance.example.public_ip} > file.txt"
command = "echo ${aws_instance.example.public_ip} > ip_address.txt"
}
}
```
This adds a `provision` block within the `resource` block. Multiple
`provision` blocks can be added to define multiple provisioning steps.
This adds a `provisioner` block within the `resource` block. Multiple
`provisioner` blocks can be added to define multiple provisioning steps.
Terraform supports
[multiple provisioners](/docs/provisioners/index.html),
but for this example we use the "local-exec" provisioner.
but for this example we are using the `local-exec` provisioner.
The "local-exec" provisioner executes a command locally on the machine
The `local-exec` provisioner executes a command locally on the machine
running Terraform. We're using this provisioner versus the others so
we don't have to worry about specifying any
[connection info](/docs/provisioners/connection.html) right now.
## Running Provisioners
Provisioners are run only when a resource is _created_. They
Provisioners are only run when a resource is _created_. They
are not a replacement for configuration management and changing
the software of an already-running server, and are instead just
meant as a way to bootstrap a server. For configuration management,
@ -71,10 +71,10 @@ Apply complete! Resources: 2 added, 0 changed, 0 destroyed.
Terraform will output anything from provisioners to the console,
but in this case there is no output. However, we can verify
everything worked by looking at the "file.txt" file:
everything worked by looking at the `ip_address.txt` file:
```
$ cat file.txt
$ cat ip_address.txt
54.192.26.128
```
@ -82,21 +82,21 @@ It contains the IP, just as we asked!
## Failed Provisioners and Tainted Resources
If a resource successfully creates but fails during provision,
If a resource successfully creates but fails during provisioning,
Terraform will error and mark the resource as "tainted." A
resource that is tainted has been physically created, but can't
be considered safe to use since provisioning failed.
When you generate your next execution plan, Terraform will remove
any tainted resources and create new resources, attempting to
provision again. It does not attempt to restart provisioning on the
same resource because it isn't guaranteed to be safe.
When you generate your next execution plan, Terraform not attempt to restart
provisioning on the same resource because it isn't guaranteed to be safe. Instead,
Terraform will remove any tainted resources and create new resources, attempting to
provision them again after creation.
Terraform does not automatically roll back and destroy the resource
Terraform also does not automatically roll back and destroy the resource
during the apply when the failure happens, because that would go
against the execution plan: the execution plan would've said a
resource will be created, but does not say it will ever be deleted.
But if you create an execution plan with a tainted resource, the
If you create an execution plan with a tainted resource, however, the
plan will clearly state that the resource will be destroyed because
it is tainted.
@ -106,7 +106,7 @@ Provisioning is important for being able to bootstrap instances.
As another reminder, it is not a replacement for configuration
management. It is meant to simply bootstrap machines. If you use
configuration management, you should use the provisioning as a way
to bootstrap the configuration management utility.
to bootstrap the configuration management tool.
In the next section, we start looking at [variables as a way to
parameterize our configurations](/intro/getting-started/variables.html).