<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Quy Tang</title>
    <description>The latest articles on DEV Community by Quy Tang (@qtangs).</description>
    <link>https://dev.to/qtangs</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F722396%2F6403070a-ca75-45e4-82e1-3e4e2f0c3766.jpeg</url>
      <title>DEV Community: Quy Tang</title>
      <link>https://dev.to/qtangs</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/qtangs"/>
    <language>en</language>
    <item>
      <title>Deploying Serverless GitLab Runners on AWS Fargate with Terraform</title>
      <dc:creator>Quy Tang</dc:creator>
      <pubDate>Fri, 11 Nov 2022 11:35:20 +0000</pubDate>
      <link>https://dev.to/aws-builders/deploying-serverless-gitlab-runners-on-aws-fargate-with-terraform-898</link>
      <guid>https://dev.to/aws-builders/deploying-serverless-gitlab-runners-on-aws-fargate-with-terraform-898</guid>
      <description>&lt;p&gt;A complete setup of secure and scalable serverless GitLab runners on AWS Fargate via Terraform IAC&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AJljtRg4GU22NeLbK7vrcXQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AJljtRg4GU22NeLbK7vrcXQ.png" alt="Architecture Overview"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As GitLab becomes widely used in my organization, we need a way to manage our CICD runner fleet in the most secure and scalable way. A serverless setup with AWS Fargate becomes attractive with its simplified infrastructure management and effortless scalability.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In this post, I will share a setup for a fleet of serverless GitLab runners on AWS Fargate managed via Terraform for ease of reproducibility in any environment.&lt;/strong&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Background
&lt;/h3&gt;

&lt;p&gt;GitLab has a guide on &lt;a href="https://docs.gitlab.com/runner/configuration/runner_autoscale_aws_fargate" rel="noopener noreferrer"&gt;Autoscaling GitLab CI on AWS Fargate&lt;/a&gt;, with runner manager hosted on an EC2, thus it’s not completely serverless. Others have shared a full ECS on Fargate setup for both managers and workers, such as &lt;a href="https://medium.com/ci-t/serverless-gitlab-ci-cd-on-aws-fargate-da2a106ad39c" rel="noopener noreferrer"&gt;Serverless GitLab CI/CD on AWS Fargate&lt;/a&gt; by Daniel Coutinho de Miranda and &lt;a href="https://www.proud2becloud.com/a-serverless-approach-for-gitlab-integration-on-aws/" rel="noopener noreferrer"&gt;A serverless approach for GitLab integration on AWS&lt;/a&gt; by Damiano Giorgi. &lt;/p&gt;

&lt;p&gt;However, these examples rely heavily on manual configuration and support only 1 manager profile in the EC2/Fargate Task.&lt;/p&gt;

&lt;p&gt;The main motivations for the setup described in this post are:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Use Terraform Infra-as-Code for a more secure, reproducible and configurable setup.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Support multiple runner manager profiles in one Fargate instance.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Architecture Overview
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AwoheZLhJZyNt1uURv2eKyQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2000%2F1%2AwoheZLhJZyNt1uURv2eKyQ.png" alt="Detailed Architecture"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Key elements:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;ECS Service on AWS Fargate to host the manager service, this service can register multiple runner managers.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Each runner manager registers itself with GitLab upon creation of new ECS Task under this ECS Service. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;When a job from GitLab is triggered, an appropriate runner manager is assigned the job by GitLab, it then creates a new worker ECS task in specific subnet and security group to perform the job. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Each worker task has a predefined role and container image.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Deployment Process
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Step 1: Build and publish container image for managers&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Code: &lt;a href="https://github.com/GovTechSG/fargate-gitlab-runner" rel="noopener noreferrer"&gt;https://github.com/GovTechSG/fargate-gitlab-runner&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Set &lt;code&gt;IMAGE_NAME&lt;/code&gt;, &lt;code&gt;IMAGE_TAG&lt;/code&gt; , &lt;code&gt;AWS_ACCOUNT_ID&lt;/code&gt;, and &lt;code&gt;AWS_REGION&lt;/code&gt; environment variables as desired. &lt;code&gt;IMAGE_NAME&lt;/code&gt; should start with the ECR domain &lt;code&gt;${AWS_ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com&lt;/code&gt; to publish to ECR later.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use &lt;code&gt;docker-compose build&lt;/code&gt; to build the image. &lt;br&gt;
Alternatively run: &lt;code&gt;docker build -t ${IMAGE_NAME}:${IMAGE_TAG}&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Login to ECR&lt;br&gt;
&lt;code&gt;aws ecr get-login-password --region ${AWS_REGION} | docker login --username AWS --password-stdin ${AWS_ACCOUNT_ID}.dkr.ecr.${AWS_REGION}.amazonaws.com&lt;/code&gt; .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Publish to ECR using &lt;code&gt;docker-compose push&lt;/code&gt; or &lt;code&gt;docker push ${IMAGE_NAME}:${IMAGE_TAG}&lt;/code&gt; .&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Note that this single image spawns multiple managers using profiles from the &lt;code&gt;MANAGERS_CONFIGS&lt;/code&gt; environment variable.&lt;br&gt;
 If you use &lt;code&gt;podman&lt;/code&gt; instead of &lt;code&gt;docker&lt;/code&gt;, install &lt;a href="https://github.com/containers/podman-compose" rel="noopener noreferrer"&gt;podman-compose&lt;/a&gt; as well.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Step 2: Build and publish container image for worker tasks&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Sample images are available at &lt;a href="https://github.com/GovTechSG/fargate-gitlab-runner-worker" rel="noopener noreferrer"&gt;https://github.com/GovTechSG/fargate-gitlab-runner-worker&lt;/a&gt;. &lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Update &lt;code&gt;Dockerfile&lt;/code&gt; to install new tools as necessary.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Build and publish to ECR using the steps for managers image above.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Step 3: Set up additional resources required by the ECS Service&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Following resources are required to be set up either manually or via another set of Terraform code (recommended):&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Secret for GitLab Token: Obtain token for runners from GitLab, create a new secret in either AWS Secret Manager or System Manager Parameter Store. Take note of the KMS key used.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;VPC, subnets and security groups required for both managers and workers. Take note that SSH communication via port 22 need to be allowed between managers’ and workers’ network ACLs and security groups.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Workers’ ECS Task roles with appropriate policies for the worker tasks to access AWS services.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Step 4: Deploy ECS Service using &lt;a href="https://terragrunt.gruntwork.io/docs/getting-started/quick-start/" rel="noopener noreferrer"&gt;Terragrunt&lt;/a&gt;&lt;/strong&gt;
&lt;/h3&gt;

&lt;p&gt;Code: &lt;a href="https://github.com/GovTechSG/fargate-gitlab-runner-terraform" rel="noopener noreferrer"&gt;https://github.com/GovTechSG/fargate-gitlab-runner-terraform&lt;/a&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Copy from &lt;code&gt;environments/sample-dev&lt;/code&gt; to a new env &lt;code&gt;environments/&amp;lt;env&amp;gt;&lt;/code&gt;, replacing &lt;code&gt;&amp;lt;env&amp;gt;&lt;/code&gt; with your desired environment name.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update your environment settings at &lt;code&gt;environments/&amp;lt;env&amp;gt;/env_inputs.hcl&lt;/code&gt; .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If there’s no existing ECS Cluster for either managers or workers, create new one(s) following the samples at &lt;code&gt;environments/&amp;lt;env&amp;gt;/ecs-cluster-for-managers&lt;/code&gt; or &lt;code&gt;environments/&amp;lt;env&amp;gt;/ecs-cluster-for-workers&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Update variable values in &lt;code&gt;environments/&amp;lt;env&amp;gt;/ecs-fargate-gitlab-runner-service/terragrunt.hcl&lt;/code&gt; matching your environment.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Use &lt;code&gt;cd environments/&amp;lt;env&amp;gt;/ecs-fargate-gitlab-runner-service &amp;amp;&amp;amp; terragrunt apply&lt;/code&gt; to deploy the ECS Service.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;After a few minutes, review ECS Service logs, and check GitLab to verify that new runner(s) have been registered. The number of runners should be equal to &lt;code&gt;manager_instance_count * length(keys(managers_configs))&lt;/code&gt;.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Test the new GitLab runner(s) with your own job or a simple script like this:&lt;br&gt;
&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;    test:
      tags:
        # these should match all the tags set in the manager configs or a subset (note that a subset may mean other non-Fargate runners can pick up the job, depending on your setup)
        - dev
        - tool1
      script:
        - echo "It works!"
        - for i in $(seq 1 30); do echo "."; sleep 1; done
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If all is successful, you should get an output similar to this:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2114%2F1%2ANY0daAtlc5S8Tll6njjxZA.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2114%2F1%2ANY0daAtlc5S8Tll6njjxZA.png" alt="Output of a successful run"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If you prefer to use Terraform instead of Terragrunt for a quick test: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create &lt;code&gt;terraform.tfvars&lt;/code&gt; file in folder &lt;code&gt;terraform_modules/ecs-fargate-gitlab-runner-service&lt;/code&gt; with all variable values found in &lt;code&gt;environments/&amp;lt;env&amp;gt;/ecs-fargate-gitlab-runner-service/terragrunt.hcl&lt;/code&gt; &lt;/li&gt;
&lt;li&gt;Copy content of &lt;code&gt;versions.tf&lt;/code&gt; and &lt;code&gt;provider.tf&lt;/code&gt; from &lt;code&gt;environments/terragrunt.hcl&lt;/code&gt; into their respective files in &lt;code&gt;terraform_modules/ecs-fargate-gitlab-runner-service&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;Finally, run &lt;code&gt;terraform apply&lt;/code&gt; .&lt;/li&gt;
&lt;/ul&gt;
&lt;/blockquote&gt;

&lt;h3&gt;
  
  
  Resources Created by Terraform
&lt;/h3&gt;

&lt;p&gt;These are the main resources created by the Terraform module:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;an ECS Service for the manager container&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;its container definition with required environment variables&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;its IAM role that allows running and stopping the new ECS Tasks using the worker ECS Task definition(s)&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;worker ECS Task definition(s), one for each manager profile in managers_configs&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  What happened?
&lt;/h2&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;During Registration:&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Once ECS Service is deployed by Terraform, it creates a task to host the manager container image.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;When this container is up, it reads environment variables, most notably &lt;code&gt;MANAGERS_CONFIGS&lt;/code&gt; variable, and registers each manager as a runner to GitLab, generates the full GitLab runner &lt;code&gt;config.toml&lt;/code&gt; file as well as individual runner’s &lt;code&gt;fargate_worker.toml&lt;/code&gt; file containing the worker’s security, network settings and its task definition.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You should see this in GitLab’s list of runners, 1 runner for each key in &lt;code&gt;MANAGERS_CONFIGS&lt;/code&gt; (assuming &lt;code&gt;manager_instance_count&lt;/code&gt; is 1).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2534%2F1%2AYy6bZSw7v1_Z9nWIMDPjUQ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fcdn-images-1.medium.com%2Fmax%2F2534%2F1%2AYy6bZSw7v1_Z9nWIMDPjUQ.png" alt="Runners in GitLab UI"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  &lt;strong&gt;Running job:&lt;/strong&gt;
&lt;/h3&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Once a job whose tags match a subset of the tag list of those runners is triggered,  GitLab sends the job to the appropriate runner manager.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The runner manager then starts a new worker ECS task using the task definition that have been passed in &lt;code&gt;MANAGERS_CONFIGS&lt;/code&gt; , adding its &lt;code&gt;SSH_PUBLIC_KEY&lt;/code&gt; as environment variable in the process.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The worker ECS task is started with the &lt;code&gt;sshd&lt;/code&gt; process with the manager’s &lt;code&gt;SSH_PUBLIC_KEY&lt;/code&gt; added to its &lt;code&gt;authorized_keys&lt;/code&gt; .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Finally, the manager runs the job in the worker ECS task via &lt;code&gt;ssh&lt;/code&gt; , the job output and status are shared back to GitLab as usual.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Troubleshooting
&lt;/h2&gt;

&lt;p&gt;Followings are some issues that can occur:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unable to start Fargate Task due to **&lt;code&gt;No Container Instances were found in your cluster **error&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check your ECS Cluster for workers and make sure &lt;code&gt;Default capacity provider strategy&lt;/code&gt; is set to &lt;code&gt;FARGATE&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Manager unable to connect to ECS to start a task&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;If the managers are hosted in private subnets, create VPC endpoints for ECS and ECR and make sure the managers can access them.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Manager unable to connect to worker ECS task via &lt;code&gt;ssh&lt;/code&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Make sure your worker container image has openssh installed and &lt;code&gt;SSH_PUBLIC_KEY&lt;/code&gt; is added to the right user’s &lt;code&gt;~/.ssh/authorized_keys&lt;/code&gt; .&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Check that the subnets and security groups of both managers and workers allow traffic on port 22. Use the VPC Reachability Analyzer to confirm.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;If the error is &lt;code&gt;signature algorithm ssh-rsa not in PubkeyAcceptedAlgorithms&lt;/code&gt; , enable &lt;code&gt;ssh-rsa&lt;/code&gt; by adding this to worker container image: &lt;code&gt;RUN echo “PubkeyAcceptedKeyTypes +ssh-rsa” &amp;gt;&amp;gt; /etc/ssh/sshd_config&lt;/code&gt; .&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Worker ECS task has no credentials to access AWS&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Share the variable &lt;code&gt;AWS_CONTAINER_CREDENTIALS_RELATIVE_URI&lt;/code&gt; with the SSH session by adding this to &lt;code&gt;sshd&lt;/code&gt; run:
&lt;code&gt;-o "SetEnv=AWS_CONTAINER_CREDENTIALS_RELATIVE_URI=\"$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI\""&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Known Limitation:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;The Fargate driver doesn’t support ECS Exec yet. For more info: &lt;a href="https://gitlab.com/gitlab-org/ci-cd/custom-executor-drivers/fargate/-/issues/49" rel="noopener noreferrer"&gt;https://gitlab.com/gitlab-org/ci-cd/custom-executor-drivers/fargate/-/issues/49&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Conclusion
&lt;/h2&gt;

&lt;p&gt;We have set up a complete set of serverless runners for GitLab using AWS Fargate. With Terraform, the setup can be configured easily for different environments.&lt;/p&gt;

&lt;p&gt;In addition, we have full freedom to create runners for a wide variety of needs: array of worker images with different tools installed, multiple worker ECS clusters using different spot instance strategies to optimize costs, custom worker roles to access cross account resources, … &lt;/p&gt;

&lt;p&gt;The possibilities are boundless. It’s up to you to configure and experiment.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Thank you for reading. Do comment below to share your thoughts.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;The main project for this article is hosted on &lt;a href="https://github.com/GovTechSG/fargate-gitlab-runner-terraform" rel="noopener noreferrer"&gt;Github&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;This post was originally published at &lt;a href="https://medium.com/singapore-gds/deploying-serverless-gitlab-runners-on-aws-fargate-with-terraform-33b56194671b" rel="noopener noreferrer"&gt;Medium&lt;/a&gt;&lt;/p&gt;

</description>
      <category>aws</category>
      <category>gitlab</category>
      <category>serverless</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
