Back to Portfolio
CI/CD · GitHub Actions · AWS
Circuit board close-up with glowing green traces representing automated CI/CD pipeline flow
DevOps · 2026AWS Deployment

CI/CD Pipeline to
AWS — How This Portfolio Ships

Every commit to this portfolio triggers a fully automated pipeline — build, test, push to ECR, deploy to EKS. Zero manual steps. Bootstrapped with a Backstage golden path template.

< 8 min
End-to-end pipeline
0 secrets
In CI environment
100%
Automated rollback
OIDC
Keyless AWS auth
01 — THE PIPELINE

From Commit to Production

STAGE 01

Source

GitHub

Code push triggers pipeline via webhook. Branch protection rules enforce PR reviews before merge to main.

STAGE 02

Build

GitHub Actions

Docker image built, tagged with commit SHA. Multi-stage Dockerfile keeps images lean and secure.

STAGE 03

Test

Jest / Pytest

Unit tests, integration tests, and security scans (Trivy) run in parallel. Pipeline fails fast on any issue.

STAGE 04

Push

Amazon ECR

Signed image pushed to private ECR registry. Image digest tracked for immutable deployments.

STAGE 05

Deploy

EKS / Helm

Helm chart updated with new image tag. Rolling deployment with health checks and automatic rollback on failure.

STAGE 06

Verify

Smoke Tests

Post-deploy smoke tests hit production endpoints. Slack notification sent on success or failure.

02 — BACKSTAGE TEMPLATE

Bootstrapped with a Golden Path

Backstage CI/CD Template

Internal Developer Platform

The CI/CD pipeline for this portfolio is bootstrapped using a golden path template from the Internal Developer Platform built with Backstage. The template pre-wires GitHub Actions workflows, Dockerfile conventions, Helm chart scaffolding, and ECR push configuration — so new services get a production-ready pipeline in minutes, not days.

View IDP Backstage Project
TEMPLATE INCLUDES
  • GitHub Actions workflow pre-configured with OIDC auth to AWS
  • Helm chart scaffold with sensible defaults for EKS deployments
  • ECR repository auto-created via Terraform module
  • Branch protection and PR checks enforced by template
  • Slack notifications wired out of the box
03 — AWS SERVICES

Infrastructure Under the Hood

ECR
Private container registry for Docker images
EKS
Managed Kubernetes for workload deployment
IAM OIDC
Keyless auth between GitHub Actions and AWS
S3
Terraform state backend with DynamoDB locking
CloudWatch
Pipeline metrics and deployment logs
Secrets Manager
Secure injection of runtime secrets into pods
DEPLOYMENT FLOW
git push origin mainGitHub Actions triggeredDocker build + testECR pushhelm upgrade --installEKS rolling deploy✓ Live