PromptsVault AI is thinking...
Searching the best prompts from our community
Searching the best prompts from our community
Prompts matching the #devops tag
Create reusable Terraform module for multi-cloud deployment (AWS/Azure). Features: 1. Networking layer (VPC/VNet). 2. Variables for customization (instance types, regions). 3. State management with remote backend (S3/Blob). 4. Security groups and firewall rules. 5. Load balancer configuration. 6. Output values for connection strings. 7. Terratest scripts for validation. 8. Documentation with input/output tables. Include conditional resource creation logic.
Build robust CI/CD automation pipeline. Workflow: 1. Set up multi-stage builds (test, build, deploy). 2. Implement automated testing (unit, integration, e2e). 3. Add code quality checks (linting, security scanning). 4. Configure Docker image building and optimization. 5. Set up environment-specific deployments (dev, staging, prod). 6. Implement blue-green deployment strategy. 7. Add automated rollback on failure. 8. Configure Slack/email notifications. Include secrets management and deployment approval gates.
Implement zero-downtime deployments with Kubernetes. Setup: 1. Create blue and green deployment manifests with identical specs. 2. Configure service selector to route traffic between environments. 3. Implement health checks and readiness probes. 4. Set up Helm charts for version management. 5. Create CI/CD pipeline with automated testing gates. 6. Add rollback mechanism with previous version retention. 7. Implement traffic splitting for canary testing. 8. Monitor deployment metrics with Prometheus and Grafana. Include namespace isolation and resource quotas.
Deploy with Kubernetes. Concepts: 1. Pods as deployment units. 2. Deployments for replica management. 3. Services for networking. 4. ConfigMaps and Secrets for config. 5. Namespaces for isolation. 6. Ingress for HTTP routing. 7. Resource limits and requests. 8. Health and readiness probes. Use kubectl and YAML manifests. Implement rolling updates and rollbacks. Monitor with Prometheus.
Containerize applications with Docker. Best practices: 1. Small base images (Alpine). 2. Multi-stage builds. 3. Layer caching optimization. 4. .dockerignore file. 5. Non-root user for security. 6. Health checks. 7. Environment-specific configs. 8. Volume mounts for data. Keep images lean. One process per container. Use docker-compose for local development. Tag images properly.
Scan for security vulnerabilities. Tools: 1. SAST (Snyk, SonarQube) for code analysis. 2. DAST for runtime scanning. 3. Dependency scanning (npm audit, Dependabot). 4. Secret detection (GitGuardian). 5. Container scanning. 6. Infrastructure as Code scanning. Integrate in CI/CD. Fix critical issues immediately. Use OWASP Top 10 as guide. Regular security reviews.
Build a production-grade CI/CD pipeline using GitHub Actions. Workflow: 1. Trigger on push to main and pull requests. 2. Run linting and unit tests in parallel. 3. Build Docker image with caching. 4. Run integration tests against test environment. 5. Deploy to staging on main branch merge. 6. Manual approval gate for production deployment. 7. Rollback mechanism on failure. Use secrets management, matrix builds for multiple Node versions, and status badges. Include deployment notifications to Slack.
Write a basic Terraform configuration (`main.tf`) to provision an AWS S3 bucket. The configuration should specify the AWS provider, a resource for the S3 bucket, and a unique bucket name. Include a variable for the AWS region.
I have a Node.js application with a package.json file. Create a Dockerfile to containerize this application. The Dockerfile should install dependencies, copy the application code, and specify the command to run the application. Optimize the Dockerfile for smaller image size and faster builds.
Design a basic CI/CD pipeline using GitHub Actions for a Python web application. The pipeline should be triggered on a push to the main branch. It should include steps for installing dependencies, running linters, executing unit tests, and deploying the application to a staging environment.
Generate the YAML for a basic Kubernetes Deployment and Service. The Deployment should run 3 replicas of the `nginx:alpine` image. The Service should expose the Nginx deployment on port 80 using a `ClusterIP`.
Set up effective CI/CD pipeline. Stages: 1. Source (code commit triggers pipeline). 2. Build (compile, dependency installation). 3. Test (unit, integration, e2e tests). 4. Code Quality (linting, code coverage, SonarQube). 5. Security Scan (dependency vulnerabilities, SAST). 6. Deploy to Staging (automated). 7. Deploy to Production (manual approval or automated). Tools: GitHub Actions, GitLab CI, Jenkins, CircleCI. Use Docker for consistent environments. Parallel jobs for speed. Fail fast. Notifications on failure. Blue-green or canary deployments. Infrastructure as Code (Terraform). Measure: deployment frequency, lead time, MTTR.