Latest
AWS Cloud Architecture
Aws Cloud Architecture This document provides comprehensive guidelines for aws cloud architecture development and best practices. Compute Services EC2 EC2 instance types and sizing Implement proper ec2 instance types and sizing Follow best practices for optimal results Auto Auto Scaling Groups for elasticity Implement proper auto scaling groups for elasticity Follow best practices for optimal results Elastic Elastic Load Balancer (ALB, NLB, CLB) Implement proper elastic load balancer (alb, nlb, clb) Follow best practices for optimal results ECS ECS for container orchestration Implement proper ecs for container orchestration Follow best practices for optimal results EKS EKS for managed Kubernetes Implement proper eks for managed kubernetes Follow best practices for optimal results Database Services RDS RDS for SQL databases (MySQL, PostgreSQL) Implement proper rds for sql databases (mysql, postgresql) Follow best practices for optimal results DynamoDB DynamoDB for NoSQL applications Implement proper dynamodb for nosql applications Follow best practices for optimal results ElastiCache ElastiCache for in-memory caching Implement proper elasticache for in-memory caching Follow best practices for optimal results Redshift Redshift for data warehousing Implement proper redshift for data warehousing Follow best practices for optimal results Aurora Aurora for high-performance databases Implement proper aurora for high-performance databases Follow best practices for optimal results Security & Identity IAM IAM roles and policies Implement proper iam roles and policies Follow best practices for optimal results Security Security Groups and NACLs Implement proper security groups and nacls Follow best practices for optimal results AWS AWS WAF for web application protection Implement proper aws waf for web application protection Follow best practices for optimal results KMS KMS for encryption key management Implement proper kms for encryption key management Follow best practices for optimal results Secrets Secrets Manager for sensitive data Implement proper secrets manager for sensitive data Follow best practices for optimal results Monitoring & Observability CloudWatch CloudWatch for metrics and logging Implement proper cloudwatch for metrics and logging Follow best practices for optimal results X-Ray X-Ray for distributed tracing Implement proper x-ray for distributed tracing Follow best practices for optimal results CloudTrail CloudTrail for audit logging Implement proper cloudtrail for audit logging Follow best practices for optimal results Systems Systems Manager for operations Implement proper systems manager for operations Follow best practices for optimal results AWS AWS Config for compliance Implement proper aws config for compliance Follow best practices for optimal results Cost Optimization Reserved Reserved Instances and Savings Plans Implement proper reserved instances and savings plans Follow best practices for optimal results Spot Spot Instances for cost reduction Implement proper spot instances for cost reduction Follow best practices for optimal results Resource Resource tagging strategies Implement proper resource tagging strategies Follow best practices for optimal results Cost Cost Explorer and billing alerts Implement proper cost explorer and billing alerts Follow best practices for optimal results Right-sizing Right-sizing recommendations Implement proper right-sizing recommendations Follow best practices for optimal results Performance Optimization CloudFront CloudFront for global content delivery Implement proper cloudfront for global content delivery Follow best practices for optimal results ElastiCache ElastiCache for application caching Implement proper elasticache for application caching Follow best practices for optimal results Database Database performance tuning Implement proper database performance tuning Follow best practices for optimal results Network Network optimization Implement proper network optimization Follow best practices for optimal results Auto Auto Scaling policies Implement proper auto scaling policies Follow best practices for optimal results Summary Checklist [ ] Core principles implemented [ ] Best practices followed [ ] Performance optimized [ ] Security measures in place [ ] Testing strategy implemented [ ] Documentation completed [ ] Monitoring configured [ ] Production deployment ready Follow these comprehensive guidelines for successful aws cloud architecture implementation.
DevOps CI/CD with GitHub Actions
DevOps CI/CD with GitHub Actions Workflow Fundamentals and Setup Basic Workflow Structure Environment Variables and Secrets Management Node.js Application CI/CD Complete Node.js Pipeline Advanced Docker Multi-Stage Build Infrastructure as Code with Terraform Terraform Deployment Pipeline Kubernetes Deployment Pipeline Kubernetes Deployment Workflow Helm Chart Template Database Migration and Backup Database Migration Pipeline Monitoring and Observability Performance Monitoring Pipeline Reusable Workflows and Actions Custom Action for Deployment Reusable Security Workflow Checklist for DevOps CI/CD with GitHub Actions [ ] Set up comprehensive workflow structure with proper triggers [ ] Configure environment variables and secrets management [ ] Implement multi-stage testing (unit, integration, E2E) [ ] Add security scanning and vulnerability checks [ ] Set up Docker multi-stage builds with optimization [ ] Configure container registry authentication and push [ ] Implement Infrastructure as Code with Terraform [ ] Set up Kubernetes deployment with Helm charts [ ] Add database migration and backup workflows [ ] Configure monitoring and alerting pipelines [ ] Implement proper deployment strategies (blue-green, rolling) [ ] Set up environment-specific configurations [ ] Add performance monitoring and lighthouse checks [ ] Create reusable workflows and custom actions [ ] Configure proper notification systems (Slack, email) [ ] Implement rollback mechanisms for failed deployments
DevOps CI/CD Pipelines
Devops Cicd This document provides comprehensive guidelines for devops cicd development and best practices. Pipeline Design Multi-stage Multi-stage pipeline architecture Implement proper multi-stage pipeline architecture Follow best practices for optimal results Parallel Parallel and sequential job execution Implement proper parallel and sequential job execution Follow best practices for optimal results Conditional Conditional pipeline execution Implement proper conditional pipeline execution Follow best practices for optimal results Pipeline Pipeline triggers and scheduling Implement proper pipeline triggers and scheduling Follow best practices for optimal results Artifact Artifact management strategies Implement proper artifact management strategies Follow best practices for optimal results Build Automation Build Build tool integration (Maven, Gradle, npm) Implement proper build tool integration (maven, gradle, npm) Follow best practices for optimal results Multi-platform Multi-platform builds Implement proper multi-platform builds Follow best practices for optimal results Dependency Dependency management Implement proper dependency management Follow best practices for optimal results Binary Binary artifact creation Implement proper binary artifact creation Follow best practices for optimal results Build Build caching strategies Implement proper build caching strategies Follow best practices for optimal results Infrastructure as Code Terraform Terraform for infrastructure provisioning Implement proper terraform for infrastructure provisioning Follow best practices for optimal results Ansible Ansible for configuration management Implement proper ansible for configuration management Follow best practices for optimal results CloudFormation CloudFormation for AWS resources Implement proper cloudformation for aws resources Follow best practices for optimal results Kubernetes Kubernetes manifests deployment Implement proper kubernetes manifests deployment Follow best practices for optimal results Environment Environment consistency Implement proper environment consistency Follow best practices for optimal results Security Integration Static Static code analysis (SAST) Implement proper static code analysis (sast) Follow best practices for optimal results Dynamic Dynamic security testing (DAST) Implement proper dynamic security testing (dast) Follow best practices for optimal results Dependency Dependency vulnerability scanning Implement proper dependency vulnerability scanning Follow best practices for optimal results Container Container security scanning Implement proper container security scanning Follow best practices for optimal results Secrets Secrets management Implement proper secrets management Follow best practices for optimal results Container Orchestration Docker Docker image building Implement proper docker image building Follow best practices for optimal results Kubernetes Kubernetes deployment automation Implement proper kubernetes deployment automation Follow best practices for optimal results Helm Helm chart management Implement proper helm chart management Follow best practices for optimal results Service Service mesh configuration Implement proper service mesh configuration Follow best practices for optimal results Container Container registry management Implement proper container registry management Follow best practices for optimal results Environment Management Development Development environment automation Implement proper development environment automation Follow best practices for optimal results Staging Staging environment configuration Implement proper staging environment configuration Follow best practices for optimal results Production Production deployment safeguards Implement proper production deployment safeguards Follow best practices for optimal results Environment Environment promotion strategies Implement proper environment promotion strategies Follow best practices for optimal results Configuration Configuration management Implement proper configuration management Follow best practices for optimal results Scalability & Performance Pipeline Pipeline optimization techniques Implement proper pipeline optimization techniques Follow best practices for optimal results Parallel Parallel execution strategies Implement proper parallel execution strategies Follow best practices for optimal results Build Build cache optimization Implement proper build cache optimization Follow best practices for optimal results Resource Resource allocation management Implement proper resource allocation management Follow best practices for optimal results Cost Cost optimization measures Implement proper cost optimization measures Follow best practices for optimal results Summary Checklist [ ] Core principles implemented [ ] Best practices followed [ ] Performance optimized [ ] Security measures in place [ ] Testing strategy implemented [ ] Documentation completed [ ] Monitoring configured [ ] Production deployment ready Follow these comprehensive guidelines for successful devops cicd implementation.
Docker Containerization Best Practices
Docker Containerization Best Practices Dockerfile Optimization Multi-Stage Builds for Smaller Images Layer Caching Optimization Security Hardening Image Size Optimization Alpine Linux Base Images .dockerignore Configuration Distroless Images for Production Docker Compose for Development Complete Development Environment Development Dockerfile Health Checks and Monitoring Application Health Check Health Check Endpoint Environment Configuration Environment Variables Management Runtime Configuration Logging and Debugging Structured Logging Configuration Debug Container Setup Security Best Practices Secret Management Network Security Production Deployment Production Docker Compose CI/CD Pipeline Integration Performance Optimization Resource Limits Caching Strategies Monitoring and Observability Container Metrics Checklist for Docker Containerization [ ] Use multi-stage builds to minimize image size [ ] Implement proper layer caching strategies [ ] Create non-root user for security [ ] Configure .dockerignore for build optimization [ ] Add health checks and readiness probes [ ] Set up structured logging [ ] Implement secret management [ ] Configure resource limits and ulimits [ ] Use Alpine or distroless base images [ ] Set up development docker-compose [ ] Configure production deployment [ ] Implement container security scanning [ ] Add monitoring and observability [ ] Document container architecture
Jenkins CI/CD Automation
Jenkins Cicd This document provides comprehensive guidelines for jenkins cicd development and best practices. Pipeline Development Declarative Declarative vs scripted pipelines Implement proper declarative vs scripted pipelines Follow best practices for optimal results Jenkinsfile Jenkinsfile syntax and structure Implement proper jenkinsfile syntax and structure Follow best practices for optimal results Pipeline Pipeline stages and steps Implement proper pipeline stages and steps Follow best practices for optimal results Parallel Parallel execution strategies Implement proper parallel execution strategies Follow best practices for optimal results Conditional Conditional logic implementation Implement proper conditional logic implementation Follow best practices for optimal results Testing Integration Automated Automated testing frameworks Implement proper automated testing frameworks Follow best practices for optimal results Test Test result reporting Implement proper test result reporting Follow best practices for optimal results Code Code coverage analysis Implement proper code coverage analysis Follow best practices for optimal results Integration Integration test execution Implement proper integration test execution Follow best practices for optimal results Performance Performance testing Implement proper performance testing Follow best practices for optimal results Security & Credentials Credential Credential management Implement proper credential management Follow best practices for optimal results Secret Secret storage and rotation Implement proper secret storage and rotation Follow best practices for optimal results Role-based Role-based access control Implement proper role-based access control Follow best practices for optimal results Pipeline Pipeline security scanning Implement proper pipeline security scanning Follow best practices for optimal results Secure Secure artifact handling Implement proper secure artifact handling Follow best practices for optimal results Environment Management Multi-environment Multi-environment configuration Implement proper multi-environment configuration Follow best practices for optimal results Environment-specific Environment-specific variables Implement proper environment-specific variables Follow best practices for optimal results Infrastructure Infrastructure as code integration Implement proper infrastructure as code integration Follow best practices for optimal results Container Container deployment Implement proper container deployment Follow best practices for optimal results Cloud Cloud platform integration Implement proper cloud platform integration Follow best practices for optimal results Distributed Builds Agent Agent node configuration Implement proper agent node configuration Follow best practices for optimal results Build Build load distribution Implement proper build load distribution Follow best practices for optimal results Agent Agent labeling and selection Implement proper agent labeling and selection Follow best practices for optimal results Dynamic Dynamic agent provisioning Implement proper dynamic agent provisioning Follow best practices for optimal results Container-based Container-based agents Implement proper container-based agents Follow best practices for optimal results Advanced Features Pipeline Pipeline libraries and shared code Implement proper pipeline libraries and shared code Follow best practices for optimal results Dynamic Dynamic pipeline generation Implement proper dynamic pipeline generation Follow best practices for optimal results Multibranch Multibranch pipelines Implement proper multibranch pipelines Follow best practices for optimal results Organization Organization folders Implement proper organization folders Follow best practices for optimal results Pipeline Pipeline restart and resume Implement proper pipeline restart and resume Follow best practices for optimal results Backup & Recovery Configuration Configuration backup strategies Implement proper configuration backup strategies Follow best practices for optimal results Job Job and pipeline migration Implement proper job and pipeline migration Follow best practices for optimal results Disaster Disaster recovery planning Implement proper disaster recovery planning Follow best practices for optimal results Data Data retention policies Implement proper data retention policies Follow best practices for optimal results System System maintenance procedures Implement proper system maintenance procedures Follow best practices for optimal results Troubleshooting Build Build failure analysis Implement proper build failure analysis Follow best practices for optimal results Log Log investigation techniques Implement proper log investigation techniques Follow best practices for optimal results Performance Performance debugging Implement proper performance debugging Follow best practices for optimal results Network Network connectivity issues Implement proper network connectivity issues Follow best practices for optimal results Plugin Plugin conflict resolution Implement proper plugin conflict resolution Follow best practices for optimal results Summary Checklist [ ] Core principles implemented [ ] Best practices followed [ ] Performance optimized [ ] Security measures in place [ ] Testing strategy implemented [ ] Documentation completed [ ] Monitoring configured [ ] Production deployment ready Follow these comprehensive guidelines for successful jenkins cicd implementation.
Nginx Web Server Configuration
Nginx Configuration This document provides comprehensive guidelines for nginx configuration development and best practices. Web Server Configuration Static Static file serving optimization Implement proper static file serving optimization Follow best practices for optimal results MIME MIME type configuration Implement proper mime type configuration Follow best practices for optimal results Compression Compression and caching headers Implement proper compression and caching headers Follow best practices for optimal results Security Security headers implementation Implement proper security headers implementation Follow best practices for optimal results Error Error page customization Implement proper error page customization Follow best practices for optimal results Load Balancing Round-robin Round-robin load balancing Implement proper round-robin load balancing Follow best practices for optimal results Least Least connections algorithm Implement proper least connections algorithm Follow best practices for optimal results IP IP hash and consistent hashing Implement proper ip hash and consistent hashing Follow best practices for optimal results Weighted Weighted load balancing Implement proper weighted load balancing Follow best practices for optimal results Backup Backup server configuration Implement proper backup server configuration Follow best practices for optimal results Performance Optimization Worker Worker process configuration Implement proper worker process configuration Follow best practices for optimal results Connection Connection limits and timeouts Implement proper connection limits and timeouts Follow best practices for optimal results Buffer Buffer size optimization Implement proper buffer size optimization Follow best practices for optimal results Sendfile Sendfile and TCP optimizations Implement proper sendfile and tcp optimizations Follow best practices for optimal results Rate Rate limiting implementation Implement proper rate limiting implementation Follow best practices for optimal results Caching Strategies Browser Browser caching headers Implement proper browser caching headers Follow best practices for optimal results Proxy Proxy caching setup Implement proper proxy caching setup Follow best practices for optimal results FastCGI FastCGI caching Implement proper fastcgi caching Follow best practices for optimal results Micro-caching Micro-caching techniques Implement proper micro-caching techniques Follow best practices for optimal results Cache Cache invalidation strategies Implement proper cache invalidation strategies Follow best practices for optimal results Location Blocks URL URL matching patterns Implement proper url matching patterns Follow best practices for optimal results Regular Regular expression locations Implement proper regular expression locations Follow best practices for optimal results Nested Nested location handling Implement proper nested location handling Follow best practices for optimal results Try Try files and fallbacks Implement proper try files and fallbacks Follow best practices for optimal results Rewrite Rewrite rules and redirects Implement proper rewrite rules and redirects Follow best practices for optimal results API Gateway Patterns REST REST API proxying Implement proper rest api proxying Follow best practices for optimal results GraphQL GraphQL endpoint handling Implement proper graphql endpoint handling Follow best practices for optimal results WebSocket WebSocket proxy configuration Implement proper websocket proxy configuration Follow best practices for optimal results Microservices Microservices routing Implement proper microservices routing Follow best practices for optimal results API API versioning strategies Implement proper api versioning strategies Follow best practices for optimal results High Availability Failover Failover configuration Implement proper failover configuration Follow best practices for optimal results Health Health check implementation Implement proper health check implementation Follow best practices for optimal results Graceful Graceful shutdown handling Implement proper graceful shutdown handling Follow best practices for optimal results Zero-downtime Zero-downtime deployments Implement proper zero-downtime deployments Follow best practices for optimal results Disaster Disaster recovery setup Implement proper disaster recovery setup Follow best practices for optimal results Best Practices Configuration Configuration organization Implement proper configuration organization Follow best practices for optimal results Security Security hardening Implement proper security hardening Follow best practices for optimal results Performance Performance tuning Implement proper performance tuning Follow best practices for optimal results Maintenance Maintenance procedures Implement proper maintenance procedures Follow best practices for optimal results Documentation Documentation standards Implement proper documentation standards Follow best practices for optimal results Follow these comprehensive guidelines for successful nginx configuration implementation.
Prometheus Monitoring & Alerting
Prometheus Monitoring This document provides comprehensive guidelines for prometheus monitoring development and best practices. Metrics Collection Application Application instrumentation Implement proper application instrumentation Follow best practices for optimal results Custom Custom metrics development Implement proper custom metrics development Follow best practices for optimal results Business Business metrics tracking Implement proper business metrics tracking Follow best practices for optimal results Infrastructure Infrastructure monitoring Implement proper infrastructure monitoring Follow best practices for optimal results Performance Performance metrics Implement proper performance metrics Follow best practices for optimal results Alerting System Alertmanager Alertmanager configuration Implement proper alertmanager configuration Follow best practices for optimal results Alert Alert rule definition Implement proper alert rule definition Follow best practices for optimal results Notification Notification routing and grouping Implement proper notification routing and grouping Follow best practices for optimal results Silence Silence and inhibition rules Implement proper silence and inhibition rules Follow best practices for optimal results Integration Integration with external systems Implement proper integration with external systems Follow best practices for optimal results Grafana Integration Dashboard Dashboard creation and design Implement proper dashboard creation and design Follow best practices for optimal results Panel Panel types and visualizations Implement proper panel types and visualizations Follow best practices for optimal results Template Template variables and filters Implement proper template variables and filters Follow best practices for optimal results Alert Alert notification setup Implement proper alert notification setup Follow best practices for optimal results Data Data source configuration Implement proper data source configuration Follow best practices for optimal results Infrastructure Monitoring Node Node Exporter for system metrics Implement proper node exporter for system metrics Follow best practices for optimal results Container Container monitoring with cAdvisor Implement proper container monitoring with cadvisor Follow best practices for optimal results Network Network monitoring Implement proper network monitoring Follow best practices for optimal results Storage Storage and disk monitoring Implement proper storage and disk monitoring Follow best practices for optimal results Process Process and service monitoring Implement proper process and service monitoring Follow best practices for optimal results Performance Optimization Query Query performance tuning Implement proper query performance tuning Follow best practices for optimal results Storage Storage optimization Implement proper storage optimization Follow best practices for optimal results Memory Memory usage management Implement proper memory usage management Follow best practices for optimal results Network Network bandwidth consideration Implement proper network bandwidth consideration Follow best practices for optimal results Sampling Sampling and cardinality control Implement proper sampling and cardinality control Follow best practices for optimal results Cloud & Kubernetes Kubernetes Kubernetes monitoring strategy Implement proper kubernetes monitoring strategy Follow best practices for optimal results Pod Pod and container metrics Implement proper pod and container metrics Follow best practices for optimal results Service Service mesh monitoring Implement proper service mesh monitoring Follow best practices for optimal results Cloud Cloud provider metrics Implement proper cloud provider metrics Follow best practices for optimal results Auto-scaling Auto-scaling based on metrics Implement proper auto-scaling based on metrics Follow best practices for optimal results Troubleshooting Common Common configuration issues Implement proper common configuration issues Follow best practices for optimal results Performance Performance bottleneck identification Implement proper performance bottleneck identification Follow best practices for optimal results Query Query debugging techniques Implement proper query debugging techniques Follow best practices for optimal results Storage Storage problem resolution Implement proper storage problem resolution Follow best practices for optimal results Network Network connectivity issues Implement proper network connectivity issues Follow best practices for optimal results Scaling Considerations Horizontal Horizontal scaling strategies Implement proper horizontal scaling strategies Follow best practices for optimal results Sharding Sharding and federation Implement proper sharding and federation Follow best practices for optimal results Resource Resource allocation planning Implement proper resource allocation planning Follow best practices for optimal results Cost Cost optimization Implement proper cost optimization Follow best practices for optimal results Multi-tenant Multi-tenant considerations Implement proper multi-tenant considerations Follow best practices for optimal results Follow these comprehensive guidelines for successful prometheus monitoring implementation.
Terraform Infrastructure as Code
Terraform Iac This document provides comprehensive guidelines for terraform iac development and best practices. Core Concepts Resources Resources for infrastructure components Implement proper resources for infrastructure components Follow best practices for optimal results Data Data sources for existing infrastructure Implement proper data sources for existing infrastructure Follow best practices for optimal results Variables Variables for parameterization Implement proper variables for parameterization Follow best practices for optimal results Outputs Outputs for information sharing Implement proper outputs for information sharing Follow best practices for optimal results Locals Locals for computed values Implement proper locals for computed values Follow best practices for optimal results State Management Remote Remote state backends (S3, Azure, GCS) Implement proper remote state backends (s3, azure, gcs) Follow best practices for optimal results State State locking mechanisms Implement proper state locking mechanisms Follow best practices for optimal results State State file security and encryption Implement proper state file security and encryption Follow best practices for optimal results State State manipulation commands Implement proper state manipulation commands Follow best practices for optimal results Workspace Workspace management Implement proper workspace management Follow best practices for optimal results Provider Configuration Multi-provider Multi-provider setups Implement proper multi-provider setups Follow best practices for optimal results Provider Provider versioning and constraints Implement proper provider versioning and constraints Follow best practices for optimal results Provider Provider authentication methods Implement proper provider authentication methods Follow best practices for optimal results Provider Provider aliases for multiple instances Implement proper provider aliases for multiple instances Follow best practices for optimal results Custom Custom provider development Implement proper custom provider development Follow best practices for optimal results Security Best Practices Secrets Secrets management strategies Implement proper secrets management strategies Follow best practices for optimal results IAM IAM role and policy configuration Implement proper iam role and policy configuration Follow best practices for optimal results Network Network security implementations Implement proper network security implementations Follow best practices for optimal results Encryption Encryption at rest and in transit Implement proper encryption at rest and in transit Follow best practices for optimal results Compliance Compliance and governance Implement proper compliance and governance Follow best practices for optimal results Multi-Environment Management Environment Environment separation strategies Implement proper environment separation strategies Follow best practices for optimal results Workspace Workspace utilization Implement proper workspace utilization Follow best practices for optimal results Configuration Configuration inheritance Implement proper configuration inheritance Follow best practices for optimal results Environment-specific Environment-specific variables Implement proper environment-specific variables Follow best practices for optimal results Promotion Promotion workflows Implement proper promotion workflows Follow best practices for optimal results CI/CD Integration Automated Automated planning and applying Implement proper automated planning and applying Follow best practices for optimal results GitOps GitOps workflows Implement proper gitops workflows Follow best practices for optimal results Pipeline Pipeline security considerations Implement proper pipeline security considerations Follow best practices for optimal results Approval Approval processes Implement proper approval processes Follow best practices for optimal results Rollback Rollback strategies Implement proper rollback strategies Follow best practices for optimal results Team Collaboration Code Code organization and structure Implement proper code organization and structure Follow best practices for optimal results Version Version control best practices Implement proper version control best practices Follow best practices for optimal results Code Code review processes Implement proper code review processes Follow best practices for optimal results Documentation Documentation standards Implement proper documentation standards Follow best practices for optimal results Knowledge Knowledge sharing strategies Implement proper knowledge sharing strategies Follow best practices for optimal results Summary Checklist [ ] Core principles implemented [ ] Best practices followed [ ] Performance optimized [ ] Security measures in place [ ] Testing strategy implemented [ ] Documentation completed [ ] Monitoring configured [ ] Production deployment ready Follow these comprehensive guidelines for successful terraform iac implementation.
Terraform Infrastructure
Terraform Infrastructure as Code Best Practices Project Structure & Organization Organize Terraform code with clear module structure and separation of concerns. Module Development Create reusable modules with proper inputs, outputs, and documentation. State Management Use remote state and implement state locking for team collaboration. Variable Management Use locals, data sources, and proper variable handling. Resource Configuration Follow best practices for resource configuration and naming. Output Values Define comprehensive outputs for module composition. Environment Management Use workspaces and environment-specific configurations. Security & Compliance Implement security best practices and compliance requirements. Testing & Validation Implement testing strategies for infrastructure code. CI/CD Integration Integrate Terraform with CI/CD pipelines for automated deployments. Checklist [ ] Use consistent naming conventions and resource tagging [ ] Implement proper module structure with inputs, outputs, and documentation [ ] Configure remote state storage with encryption and locking [ ] Use data sources and locals to avoid hardcoded values [ ] Implement validation rules for variables and resources [ ] Follow security best practices with KMS encryption and IAM policies [ ] Use lifecycle rules to prevent accidental resource destruction [ ] Implement comprehensive testing with Terratest [ ] Set up CI/CD pipelines for automated validation and deployment [ ] Use Terraform workspaces or separate state files for environments [ ] Keep Terraform and provider versions pinned [ ] Implement drift detection and remediation processes [ ] Use Terraform Cloud or similar for team collaboration [ ] Document infrastructure architecture and deployment procedures [ ] Monitor infrastructure costs and implement cost controls
Browse Cursor Rules - Cursor IDE Community Prompts & Configurations