My objectives was to create an application load balancer and attach that to three Amazon EC2 instances hosted in three different availability zones in a region using Terraform and GitHub Actions.
I discussed the concept in detail in my notes at -CI-CD with Terraform and GitHub Actions to deploy to AWS.
Note: I did not include the concepts of creating the EC2 instances, or installing a certificate, or route53 in this note.
For this code to function without errors, I created an OpenID connect identity provider in Amazon Identity and Access Management that has a trust relationship with this GitHub repository. You can read about it here to get a detailed explanation with steps.
I stored the ARN
of the IAM Role
as a GitHub secret which is referred in the terraform.yml
file.
Ensure that the policy attached to the IAM role whose credentials are being used in this configuration has permission to create and manage all the resources that are included in this repository.
Review the code including the terraform.yml
to understand the steps in the GitHub Actions pipeline. Also review the terraform
code to understand all the concepts associated with creating an AWS VPC, subnets, internet gateway, route table, and route table association.
If you want to check the pipeline logs, click on the Build Badge (terrform-infra-provisioning) above the image in this ReadMe.