Deploy to AWS with Terraform within a GitHub Action

preview_player
Показать описание
How to deploy to AWS with Terraform within a GitHub Action.

Don't forget to calculate how much solutions will cost you on AWS before creating resources.
Рекомендации по теме
Комментарии
Автор

What a massive joy it was to go through the video and grasp the topics at hand, and great plus for showing us so many good practices which often are missed such as the use of GH-secrets.

purDvotion
Автор

Thanks so much for this! I'm currently trying to nail down this exact skill set on the big three platforms (AWS, GCP, and Azure) so that I can bake those pipelines into multi-platform deployments.

andythedishwasher
Автор

Great work Guilhem you made it so simple and make it very easy to understand the concept AWS, Terraform & GitHub Action hope you will make more videos on AWS/DevOps

regards
Sanjay
from India

MadeinIndia-Vlogs
Автор

41s - JWT = JSON Web Token
Great explanation!

maximeaoustin
Автор

This is very precise. Thank you for sharing this great video.

harikrishnathallapalle
Автор

Thanks for the great video. Will you be able to add/explain how can we add a destroy job that can be triggered once tested?

debprasad
Автор

Thanks so much for the idea. I use Terraform Cloud and IAM Identity Center with AWS Organizations instead, so I got stuck after the OIDC config. I'd have to tweak a lot of things

ToBi-xrmg
Автор

Thanks for this informative video . How to destroy the stack, can you pls elaborate ??

shankarmishra
Автор

Great video; everything was well explained. Loved the demo :)
I have a question about using the repository secrets vs variables. Wondering if when working a group of people, using variables instead of secrets for the non sensitive data would be more convenient so peers can know what value is being used (for example, what S3 bucket is used to host the terraform state).

jfaguile
Автор

What if the plan is successful, but the apply command fails because of some misconfiguration? what is the next step with the current way of working. Opening again a PR?

danielt
Автор

Thank you for this tutorial. Its worked quite nice!!

orebelo
Автор

can we add more repos under the same custom trust policy and also the repos are from different orgs.

sunnystechworld
Автор

Congratulations again for the useful content!

sasha
Автор

Awesome! thanks for nice explanation.

sunilchaudhari
Автор

great work, thanks for the efforts. where is the provider aws block ?

manojpunia
Автор

10:20 I’m wondering about the aws provider block. Why didn’t you include it? Maybe the Terrafom action uses doesn’t require it?

margred
Автор

Hello, What could be the reasons i am getting this error? Error: Not authorized to perform I did noticed on my aws account, there was no option to get thumbprint

abifoluwaoni
Автор

Thank you so much, it was crystal clear

durbabanik
Автор

if i want to delete the infra using tf ?

martinsebastianperezquinon
Автор

Thanks for sharing this video. I am working with eks and really junior :) how can I create github action for my need? Which aim permission should I give?

mehmetnuricetin