You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/layers/atmos-pro/tutorials/deploy-with-cloudformation.mdx
+115-7Lines changed: 115 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,12 +12,28 @@ import TaskList from '@site/src/components/TaskList';
12
12
importAdmonitionfrom'@theme/Admonition';
13
13
14
14
<Intro>
15
-
Deploy the required AWS infrastructure for Atmos Pro with just a few clicks using CloudFormation. This approach provides a quick and straightforward way to set up all necessary resources.
15
+
Deploy the required AWS infrastructure for Atmos Pro with just a few clicks using CloudFormation. This approach provides a quick and straightforward way to set up all necessary resources including state backend, plan file storage, and GitHub OIDC integration.
16
16
</Intro>
17
17
18
-
<Admonitiontype="info"title="Coming Soon">
19
-
Cloudformation support will be available soon. This will provide a one-click deployment experience for setting up the required infrastructure.
20
-
</Admonition>
18
+
<KeyPoints>
19
+
- Deploy complete Terraform backend infrastructure in a single CloudFormation stack
20
+
- Set up S3 buckets for state and plan file storage
21
+
- Configure DynamoDB tables for state locking and plan file management
22
+
- Create GitHub OIDC integration for secure authentication
23
+
- Configure Atmos Pro to use the deployed infrastructure
24
+
</KeyPoints>
25
+
26
+
## Overview
27
+
28
+
Atmos Pro doesn't run Terraform or Atmos itself. It dispatches GitHub Actions that **you control**. To run Terraform in those GitHub Actions, you need to set up a few things in your cloud environment:
29
+
30
+
<TaskList>
31
+
-**State Backend** (S3 + DynamoDB) to store Terraform state and enable state locking
32
+
-**Plan File Storage** (S3 + DynamoDB) to persist Terraform plan outputs for review and approvals
33
+
-**OIDC Integration** with GitHub for workflows to authenticate with your cloud provider
34
+
</TaskList>
35
+
36
+
To make things easier, we've provided a CloudFormation template that sets up everything for you.
21
37
22
38
## Deployment Steps
23
39
@@ -28,6 +44,7 @@ import Admonition from '@theme/Admonition';
28
44
<TaskList>
29
45
- Sign in to your AWS account
30
46
- Ensure you have administrator access
47
+
- Choose your deployment region (we recommend `us-east-1`)
31
48
</TaskList>
32
49
</Step>
33
50
@@ -40,20 +57,111 @@ import Admonition from '@theme/Admonition';
40
57
- Click "Create stack" to deploy
41
58
</TaskList>
42
59
43
-
<Admonitiontype="info"title="Coming Soon">
44
-
The "Deploy to AWS" button will be available soon. This will provide a one-click deployment experience for setting up the required infrastructure.
60
+
<Admonitiontype="warning"title="Important">
61
+
Your stack name must be unique across all AWS accounts. We use the stack name as part of the S3 bucket and DynamoDB table IDs.
Verify and complete the AWS infrastructure setup for Atmos Pro using Atmos and Terraform. This approach checks your existing backend infrastructure and deploys the additional resources needed for plan file storage and GitHub OIDC integration.
- Deploy new S3 bucket and DynamoDB table for plan file storage
23
+
- Ensure GitHub OIDC integration is properly configured
24
+
- Create IAM roles for GitHub Actions authentication
25
+
</KeyPoints>
26
+
27
+
## Overview
28
+
29
+
Atmos Pro doesn't run Terraform or Atmos itself. It dispatches GitHub Actions that **you control**. To run Terraform in those GitHub Actions, you need to set up a few things in your cloud environment:
30
+
31
+
<TaskList>
32
+
-**State Backend** (S3 + DynamoDB) to store Terraform state and enable state locking
33
+
-**Plan File Storage** (S3 + DynamoDB) to persist Terraform plan outputs for review and approvals
34
+
-**OIDC Integration** with GitHub for workflows to authenticate with your cloud provider
35
+
</TaskList>
36
+
37
+
This deployment method verifies your existing backend infrastructure (which should already be deployed as part of the reference architecture) and deploys the additional resources needed for plan file storage and GitHub OIDC integration.
38
+
16
39
## Quick Start
17
40
18
41
| Steps ||
@@ -88,12 +111,14 @@ import CodeBlock from '@theme/CodeBlock';
88
111
89
112
## Review
90
113
91
-
Congratulations! The Atmos components have now deployed:
114
+
Congratulations! The Atmos components have now verified and deployed:
92
115
93
116
<TaskList>
94
-
- An IAM role configured with trusted relationships for GitHub Actions
95
-
- An S3 bucket to store Terraform plan files
96
-
- A DynamoDB table for managing those plan files
117
+
- Verified existing Terraform backend infrastructure (S3 bucket and DynamoDB table for state)
118
+
- Deployed new S3 bucket to store Terraform plan files
119
+
- Deployed new DynamoDB table for managing plan files
120
+
- Ensured GitHub OIDC provider is properly configured
121
+
- Created IAM roles for GitHub Actions authentication
97
122
</TaskList>
98
123
99
124
You're now ready to start using Atmos Pro with GitHub Actions.
0 commit comments