Using External Stores
The !store YAML function reads data from external key-value stores like AWS SSM Parameter Store, HashiCorp Vault,
Artifactory, Redis, and other backends. Use this when you need to share data that isn't stored in Terraform state.
When to Use Stores vs Terraform State
- Use
!terraform.statefor reading Terraform outputs (recommended) - Use
!storefor reading from external systems like SSM, Vault, or other key-value stores
You will learn
- Read from external key-value stores (SSM, Vault, Redis, etc.)
- Configured in
atmos.yamlwith named store definitions - Supports default values for missing keys
- Works with YQ expressions for complex data
When to Use Stores
Use !store when you need to:
- Read secrets from HashiCorp Vault or AWS Secrets Manager
- Access configuration stored in SSM Parameter Store
- Share data that isn't managed by Terraform
- Integrate with external configuration management systems
For Terraform outputs, use !terraform.state instead.
Configuring Stores
Define stores in your atmos.yaml:
atmos.yaml
Basic Usage
Read values from a configured store:
stacks/prod.yaml
Syntax
# Get key from store for component in current stack
!store <store_name> <component> <key>
# Get key from store for component in a different stack
!store <store_name> <stack> <component> <key>
# With default value
!store <store_name> <component> <key> | default <default-value>
# With YQ query
!store <store_name> <component> <key> | query <yq-expression>
Cross-Stack References
Read from stores for components in different stacks:
stacks/prod.yaml
Default Values
Provide fallback values for missing keys:
# String default
api_endpoint: !store ssm/prod api endpoint | default "https://api.example.com"
# The default is used if the key doesn't exist in the store
feature_flag: !store ssm/prod config feature_enabled | default false
Working with Complex Data
Use YQ expressions to extract values from structured data:
# Get a specific field from JSON stored in the store
db_host: !store ssm/prod database config | query .host
# Get first item from a list
primary_endpoint: !store ssm/prod cluster endpoints | query .[0]
# Navigate nested structures
api_key: !store vault/secrets app credentials | query .api.production.key
Supported Store Backends
aws/ssm- AWS Systems Manager Parameter Store.
aws/secretsmanager- AWS Secrets Manager.
vault- HashiCorp Vault.
redis- Redis key-value store.
artifactory- JFrog Artifactory.
Example: Multi-Store Configuration
atmos.yaml
stacks/prod.yaml
Writing to Stores
Stores are typically populated by Terraform components using provider resources:
components/terraform/vpc/outputs.tf
Considerations
- Secrets exposure: Store values may appear in stdout when describing stacks
- Permissions: You need read access to all referenced stores
- Cold starts: Returns error if the key doesn't exist (use
| defaultto handle) - Latency: External store calls add latency compared to
!terraform.state - Consistency: Ensure store values are updated when Terraform state changes
Use !terraform.state for Terraform Outputs
If you're reading Terraform outputs, !terraform.state is faster and doesn't require separate store configuration.
Learn More