Stores Configuration
The stores section in atmos.yaml configures external key-value stores that can be used to share data between components using the !store YAML function and hooks.
Configuration
atmos.yaml
Store Name Convention
Store names follow the pattern <environment>/<type> by convention:
prod/ssm- Production SSM Parameter Storedev/secrets- Development Secrets Managershared/config- Shared configuration store
You can reference stores in stack configuration using the !store function:
vars:
database_password: !store prod/secrets::database/password
api_key: !store prod/ssm::/app/api-key
Supported Store Types
aws-ssm-parameter-store- AWS Systems Manager Parameter Store. Stores and retrieves parameters from SSM.
azure-key-vault- Azure Key Vault. Stores and retrieves secrets from Azure.
google-secret-manager(orgsm)- Google Cloud Secret Manager. Stores and retrieves secrets from GCP.
redis- Redis key-value store. Useful for caching and temporary data.
artifactory- JFrog Artifactory. Stores and retrieves artifacts and metadata.
Store Type Configuration
AWS SSM Parameter Store
atmos.yaml
Azure Key Vault
atmos.yaml
Authentication uses the Azure Default Credential chain, which checks environment variables, managed identity, Azure CLI, and other sources.
Google Secret Manager
atmos.yaml
Redis
atmos.yaml
The url option supports Redis URL format including authentication: redis://:password@host:port/db
Artifactory
atmos.yaml
Using Stores in Hooks
You can write values to stores using hooks:
components:
terraform:
vpc:
hooks:
store-outputs:
events:
- after-terraform-apply
command: store
name: prod/ssm
outputs:
- vpc_id
- subnet_ids
This writes Terraform outputs to the configured store after apply completes.
Related
- External Stores - Using
!storefunction in stacks - Hooks - Writing to stores with hooks
- Terraform State - Alternative data sharing method