Deploy to AWS with Terraform within a GitHub Action

Поделиться
HTML-код
  • Опубликовано: 28 сен 2024

Комментарии • 62

  • @shreyojitdas9333
    @shreyojitdas9333 5 месяцев назад

    can you please make a playlist on devops and aws...we want to learn from u

  • @jfaguile
    @jfaguile 8 месяцев назад

    Great video; everything was well explained. Loved the demo :)
    I have a question about using the repository secrets vs variables. Wondering if when working a group of people, using variables instead of secrets for the non sensitive data would be more convenient so peers can know what value is being used (for example, what S3 bucket is used to host the terraform state).

  • @pur3D3votion
    @pur3D3votion 6 месяцев назад +3

    What a massive joy it was to go through the video and grasp the topics at hand, and great plus for showing us so many good practices which often are missed such as the use of GH-secrets.

  • @nathanhadi876
    @nathanhadi876 Год назад

    Great content. Thank you!

  • @marg8880
    @marg8880 Год назад

    Where exactly actions gng to run the gi mean the Ubuntu its in git or in aws ?

  • @aminejawadi6293
    @aminejawadi6293 Год назад +1

    merci Great work keep going😅 just one question how can i destroy the same infrastructure later

    • @alibaba888
      @alibaba888 Год назад

      - remove everything in `main.tf` and save the file
      - stage files, then commit, and lastly push to the origin
      - merge the PR we created now

  • @sprour
    @sprour Год назад

    Can you use Terraform itself to do all the steps both for GitHub and AWS?

  • @amalviswanathan3254
    @amalviswanathan3254 Год назад +1

    hey thanks for the video and it helped me a lot , a quick question I've a scenario where I want to get the secrets from the parameter store and use that value in a config file
    eg: rds - endpoint and secrets i need to get the value to a config file
    how can I achieve that , if anyone could help me achieve this .
    and a suggestion can you do some zero to hero sessions on cloud and devops tools it would helpful a beginner like me

    • @cloudscalr
      @cloudscalr  Год назад +2

      Thanks Amal for your suggestions :)
      Look in google for : Data Source: aws_ssm_parameter, you will find the webpage from Terraform.
      From the data you will do in your code, you can then interpolate the value of the data inside your rds block.

    • @amalviswanathan3254
      @amalviswanathan3254 Год назад

      ​@@cloudscalr hey , in the open id connection part you have mentioned a username and repo name for setting an IAM policy, so what if it 's in an organization level repo the user name will be the organization name right ?? or do i need to give my id in the organization

  • @jayturner5242
    @jayturner5242 Год назад

    JWT is JSON Web Token, not Java Web Token. No Java is involved in the process (usually)

    • @cloudscalr
      @cloudscalr  Год назад

      You are right, that was a typo from my side. Thanks for pointing it.

  • @dmitryche1630
    @dmitryche1630 23 дня назад

    Hello everyone, I have this issue with my Tf-GithubActions-Aws infrastructure, maybe someone could help me to solve it
    Error loading state: failed to lock s3 state: 2 errors occurred:
    * operation error DynamoDB: PutItem, https response error
    I use credentials from tf output, also I did not find any issues on iam.tf files so what is it could be ?

  • @MadeinIndia-Vlogs
    @MadeinIndia-Vlogs 2 года назад +6

    Great work Guilhem you made it so simple and make it very easy to understand the concept AWS , Terraform & GitHub Action hope you will make more videos on AWS/DevOps
    regards
    Sanjay
    from India

    • @cloudscalr
      @cloudscalr  2 года назад +3

      Thank you Sanjay,
      It’s the best part of doing video: when you hear it’s useful to someone!
      Cheers.

  • @abifoluwaoni1966
    @abifoluwaoni1966 2 месяца назад

    Hello, What could be the reasons i am getting this error? Error: Not authorized to perform sts:AssumeRoleWithWebIdentity. I did noticed on my aws account, there was no option to get thumbprint

  • @danielt5542
    @danielt5542 Год назад +2

    What if the plan is successful, but the apply command fails because of some misconfiguration? what is the next step with the current way of working. Opening again a PR?

    • @MaskedProgrammer
      @MaskedProgrammer 6 месяцев назад

      you have the terraform validate. So there shouldn't be an error on the apply. Please someone correct me if i'm wrong

    • @shadowthehedgehog2727
      @shadowthehedgehog2727 29 дней назад

      @@MaskedProgrammerfrom my experience.. it’s not often but terraform plan can work, but the apply can fail. For example making a new security group rule in aws in the plan could work fine, but the apply could lead to an error because the sgr definitions exist already. Interacting with the provider api during apply could result in an error on apply step.

  • @sunnystechworld6252
    @sunnystechworld6252 Месяц назад

    can we add more repos under the same custom trust policy and also the repos are from different orgs.

  • @KingkorAtMaxint
    @KingkorAtMaxint 4 месяца назад

    0:46 The correct abbreviation of JWT is JSON Web Token not Java Web Token lol

  • @shankarmishra124
    @shankarmishra124 9 месяцев назад +1

    Thanks for this informative video . How to destroy the stack ,can you pls elaborate ??

  • @YorkshireScooter
    @YorkshireScooter Год назад +2

    You need to do more videos

  • @debprasad1059
    @debprasad1059 9 месяцев назад +1

    Thanks for the great video. Will you be able to add/explain how can we add a destroy job that can be triggered once tested?

  • @GoalRushCR7
    @GoalRushCR7 8 месяцев назад

    at 8:10, I cannot access the policies in the roles tab??

  • @andythedishwasher1117
    @andythedishwasher1117 Год назад +2

    Thanks so much for this! I'm currently trying to nail down this exact skill set on the big three platforms (AWS, GCP, and Azure) so that I can bake those pipelines into multi-platform deployments.

  • @manojpunia7717
    @manojpunia7717 Год назад +1

    great work, thanks for the efforts. where is the provider aws block ?

  • @martinsebastianperezquinon1478
    @martinsebastianperezquinon1478 6 месяцев назад

    if i want to delete the infra using tf ?

  • @maximeaoustin7325
    @maximeaoustin7325 Год назад +1

    41s - JWT = JSON Web Token
    Great explanation!

    • @cloudscalr
      @cloudscalr  Год назад

      You are right, that was a typo from my side. Thanks for pointing it.

  • @sunilchaudhari5248
    @sunilchaudhari5248 Год назад +1

    Awesome! thanks for nice explanation.

  • @margred2912
    @margred2912 Год назад

    10:20 I’m wondering about the aws provider block. Why didn’t you include it? Maybe the Terrafom action uses doesn’t require it?

  • @arjunpt9304
    @arjunpt9304 6 месяцев назад

    Really worth

  • @ToBi-xr2mg
    @ToBi-xr2mg Год назад

    Thanks so much for the idea. I use Terraform Cloud and IAM Identity Center with AWS Organizations instead, so I got stuck after the OIDC config. I'd have to tweak a lot of things

  • @Yahalomis
    @Yahalomis Год назад +1

    Nice one ! Thanks for the explanation

  • @mehmetnuricetin4104
    @mehmetnuricetin4104 Год назад

    Thanks for sharing this video. I am working with eks and really junior :) how can I create github action for my need? Which aim permission should I give?

  • @thirdworldorder3
    @thirdworldorder3 Год назад +1

    Bro.... thanks alot

  • @WannaBeFamous-i9w
    @WannaBeFamous-i9w Год назад

    Great content on terraform with GitHub action. Can you please make a video on how to pass environment specific values with terraform.tfvars file to the CI/CD pipeline

  • @MisterDevilRo
    @MisterDevilRo 2 года назад +1

    Excelent !

  • @orebelo
    @orebelo 11 месяцев назад

    Thank you for this tutorial. Its worked quite nice!!

  • @karam3375
    @karam3375 Год назад

    Not gonna lie I was following along fine until "Create AWS Policy". What exactly did you make here, and why? And what do you mean for us to do the same for our specific use-case? I'm kinda confused.

    • @margred2912
      @margred2912 Год назад

      For the first one, you need to create a policy to allow the IAM Role assumes for Github permissions to access the AWS S3 bucket to read and overwrite the tfsate. The second one, is because dependes of the infrastructure and aws resources you want to deploy. For most cases, maybe, just with a PowerAccess o AdministratorAccess allow enough permissions to deploy all need resources.

  • @mareksottl5117
    @mareksottl5117 2 года назад

    Do you have any recommendation for other github actions for TF?

  • @Airbo71
    @Airbo71 Год назад

    Could you do the teardown pipeline video also?
    Thanks

  • @durbabanik3372
    @durbabanik3372 5 месяцев назад

    Thank you so much , it was crystal clear

  • @rishawsingh
    @rishawsingh Год назад

    Hey Nice Work, I am struggling with creating flow diagram for my Devops related projects, I have tried AWS cloudformation, but can you suggest some alternate options for the same. Thanks

    • @cloudscalr
      @cloudscalr  Год назад +3

      Hi, Take a look at draw.io !

  • @Labandusette
    @Labandusette 11 месяцев назад

    thanks Guilhem. great vid

  • @01sasha66
    @01sasha66 2 года назад +1

    Congratulations again for the useful content!

  • @malicksylla886
    @malicksylla886 Год назад

    Great Job! You KISS ;)

  • @SRTMLops
    @SRTMLops 4 месяца назад

    Excelente tutorial

  • @madeleinehenry3261
    @madeleinehenry3261 2 года назад +1

    Killer🔪work 🙏

  • @ojcorzog
    @ojcorzog Год назад

    Great video! clear and informative.

  • @fooked1
    @fooked1 Год назад

    Solid tutorial. Thank you.

  • @abhaysingh8896
    @abhaysingh8896 Год назад

    Goodone. nice content

  • @kayoutube690
    @kayoutube690 Год назад

    amazing sir

  • @egokick
    @egokick 11 месяцев назад

    clean

  • @nekenlight
    @nekenlight Год назад

    Very clear !