GitScrum / Docs
All Best Practices

Infrastructure as Code | 45% Fewer Infra Incidents

Manage IaC projects with GitScrum Terraform and CloudFormation tracking. Coordinate environments, review security. 45% fewer infrastructure incidents.

4 min read

How to use GitScrum for Infrastructure as Code projects?

Manage IaC projects in GitScrum by tracking infrastructure changes as tasks, using labels for IaC tools and environments, and documenting architecture in NoteVault. Review infrastructure PRs with security focus, coordinate with application deployments. Teams with organized IaC reduce infrastructure incidents by 45% [Source: DevOps Research 2024].

IaC project workflow:

  • Requirements - Infrastructure needs
  • Design - Architecture decision
  • Code - Write IaC
  • Plan - Preview changes
  • Review - Security, cost review
  • Apply Dev - Dev environment
  • Apply Prod - Production
  • IaC labels

    LabelPurpose
    tool-terraformTerraform changes
    tool-cloudformationAWS CF changes
    tool-pulumiPulumi changes
    tool-ansibleAnsible playbooks
    env-devDevelopment
    env-stagingStaging
    env-prodProduction
    type-newNew infrastructure
    type-changeModification
    type-destroyResource removal

    IaC columns

    ColumnPurpose
    BacklogRequested changes
    DesignArchitecture review
    CodingWriting IaC
    Plan ReviewPlan output review
    Dev AppliedDev environment
    Staging AppliedStaging environment
    Prod AppliedProduction

    Infrastructure task template

    ## Infrastructure: [description]
    
    ### Changes
    - Resource type: [VPC, EC2, RDS, etc.]
    - Action: [create/modify/destroy]
    - Environment: [dev/staging/prod]
    
    ### Plan Preview
    [paste plan output]
    
    ### Security Considerations
    - [ ] IAM reviewed
    - [ ] Network access reviewed
    - [ ] Encryption configured
    
    ### Rollback
    How to revert if needed
    
    ### Checklist
    - [ ] Code written
    - [ ] Plan reviewed
    - [ ] Security approved
    - [ ] Applied to dev
    - [ ] Tested in dev
    - [ ] Applied to staging
    - [ ] Tested in staging
    - [ ] Applied to prod
    - [ ] Verified in prod
    

    NoteVault IaC documentation

    DocumentContent
    Architecture diagramsVisual infrastructure
    Module catalogReusable modules
    Environment configsPer-env settings
    Access policiesWho can apply where
    RunbooksOperations guides

    Security review checklist

    CheckVerify
    IAM permissionsLeast privilege
    Network accessMinimal exposure
    EncryptionAt rest and transit
    LoggingCloudTrail, etc.
    SecretsNo hardcoded
    CostBudget impact

    Environment promotion

    StageAction
    DevApply, test
    StagingApply, integration test
    ProdApply, verify

    Coordination with apps

    ScenarioOrder
    New serviceInfra first
    Scale upInfra first
    Feature flagApp first (or simultaneous)
    DecommissionApp removal, then infra

    IaC state management

    PracticeTracking
    State filesDocumented location
    State lockingConfigured
    State backupAutomated
    Drift detectionRegular checks

    Common IaC issues

    IssueSolution
    DriftDetection tasks
    Unreviewed appliesRequire review
    Lost stateBackup automation
    UndocumentedNoteVault requirement

    IaC team metrics

    MetricTrack
    Changes per weekTask count
    Failed appliesIssue tracking
    Review timeColumn cycle time
    IncidentsRelated tasks

    Related articles