New Terraform Tutorial: Use Application Load Balancers for Blue-Green and Canary Deployments
Learn how to use application load balancers for blue-green and canary deployments with this new tutorial on HashiCorp Learn.
Blue-green deployments and rolling upgrades (canary tests) allow you to release new software gradually and mitigate the potential blast radius of a failed release. Using this pattern, you can release new software with near-zero downtime.
In the new tutorial, Use Application Load Balancers for Blue-Green and Canary Deployments, you will use a combination of blue-green, canary, and rolling deployments to incrementally promote a new application version via HashiCorp Terraform feature toggles and an AWS application load balancer (ALB).

The ALB automatically distributes incoming traffic to the appropriate service at the application layer. ALBs are different from classic load balancers, which only route traffic to EC2 instances across multiple availability zones. You can define an ALB's listeners (rules) and target groups to dynamically route traffic to services. These rules enable you to run canary tests on and incrementally promote the green environment.
» What You’ll Learn
By the end of this tutorial, you will know how to use an application load balancer to incrementally deploy a new application release. In addition, you will have implemented feature toggles to codify and run three advanced deployment techniques in a consistent, reliable manner.
Sign up for the latest HashiCorp news
More blog posts like this one

Terraform embraces Arm: More choice, greater flexibility
Supporting Arm architecture gives Terraform customers the choice and flexibility to maximize their IT investments.

HCP Terraform introduces Hold Your Own Key (HYOK)
HCP Terraform customers can now gain greater control over access to secrets within Terraform artifacts such as state and plan files with Hold Your Own Key (HYOK).

Enforce private module registry usage in Terraform with Sentinel
Learn how to use Sentinel policy as code in HCP Terraform to ensure developers are only using approved infrastructure modules.