See the best practices for deploying AWS cloud infrastructure for financial institutions inside a GitLab CI/CD pipeline.
Niels Peto & Nicolas Pepinster are using Terraform extensively to deploy their applications and their underlying infrastructures in the cloud and on-premises. They want their experience and setup to inspire and provide guidance to others.
How do you allow development teams to be autonomous in their effort to bring the business' ideas to life by giving them early feedback on their infrastructure definitions' potential issues and ensuring that those definitions are compliant with security, architecture, compliance guidelines, and best practices?
In this talk you'll learn the best practices they use for deploying AWS cloud infrastructure for a financial institution inside a GitLab CI/CD pipeline. We'll help you think about these aspects:
- Backend in S3
- State lock in DynamoDB
terraform validate as soon as possible to provide quick feedback to developers
- Merge request approval by the Terraform specialists
- Integrated terraform-compliance checks in the CI/CD pipeline to be sure nothing wrong will be deployed in production
- Usage of remote states to use their outputs, etc.
Speakers: Niels Peto & Nicolas Pepinster
A Leadership Guide to Multi-Cloud Success for the Department of Defense
A Leadership Guide to Multi-Cloud Success for Federal Agencies
Database Provisioning Evolution at GoPay with Terraform and Ansible
Secrets Management at Swiss Federal Railways (SBB) with HashiCorp Vault