Skip to content

Production-ready multi-cloud infrastructure automation using Terraform, GitHub Actions, and Jira integration. Implements SecOps best practices for enterprise-scale deployments with automated security scanning and compliance validation.

Notifications You must be signed in to change notification settings

AndrewBz512/kabon-infrastructure

Repository files navigation

Kabon Multi-Cloud Infrastructure Project

Overview

This repository contains Infrastructure as Code for the Kabon multi-cloud infrastructure project, spanning AWS and GCP environments.

Jira Integration

Related Stories

Project Structure

├── .github/
│   └── workflows/           # GitHub Actions workflows
├── terraform/
│   ├── modules/            # Reusable Terraform modules
│   ├── environments/       # Environment-specific configurations
│   └── main.tf            # Main Terraform configuration
├── scripts/               # Deployment and utility scripts
└── docs/                 # Documentation

Automated Workflows

This repository includes GitHub Actions workflows that integrate with Jira:

  1. Jira Integration Workflow - Automatically creates infrastructure based on Jira issues
  2. Branch Creation - Creates feature branches for Jira stories
  3. Status Updates - Updates Jira issue status from GitHub
  4. Infrastructure Generation - Auto-generates Terraform code templates

Usage

Trigger Workflow from Jira

  1. Go to GitHub Actions → "Jira-GitHub Integration Workflow"
  2. Click "Run workflow"
  3. Enter your Jira issue key (e.g., KAN-20)
  4. Select the action you want to perform
  5. Click "Run workflow"

Manual Setup

  1. Clone this repository
  2. Configure AWS and GCP credentials
  3. Initialize Terraform: terraform init
  4. Plan deployment: terraform plan
  5. Apply changes: terraform apply

Environment Setup

Prerequisites

  • Terraform >= 1.0
  • AWS CLI configured
  • GCP CLI configured
  • GitHub CLI (optional)

Environment Variables

export TF_VAR_aws_region="us-east-1"
export TF_VAR_gcp_project_id="your-gcp-project"
export TF_VAR_gcp_region="us-central1"

Contributing

  1. Create a feature branch from a Jira issue
  2. Make your changes
  3. Test thoroughly
  4. Create a pull request
  5. Link back to the Jira issue

Security

  • All sensitive data uses encrypted storage
  • IAM follows least privilege principles
  • Network security groups restrict access
  • Regular security scans via CI/CD

Monitoring

  • CloudWatch (AWS) and Cloud Monitoring (GCP)
  • Cross-cloud dashboards
  • Automated alerting
  • Log aggregation

Managed by: Andrew Boyd (aboyd1eng@gmail.com)
Last Updated: July 30, 2025

About

Production-ready multi-cloud infrastructure automation using Terraform, GitHub Actions, and Jira integration. Implements SecOps best practices for enterprise-scale deployments with automated security scanning and compliance validation.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published