-
cardano-node: {{ cardano_node_state }}
-
cardano-db-sync: {{ cardano_db_sync_state }}
-
backend: {{ backend_state }}
-
-
-
diff --git a/infra/terraform/.envrc b/infra/terraform/.envrc
deleted file mode 100644
index a5c07fb88..000000000
--- a/infra/terraform/.envrc
+++ /dev/null
@@ -1,3 +0,0 @@
-source_up
-env_vars_required AWS_PROFILE
-use flake --extra-experimental-features nix-command --extra-experimental-features flakes ../..#infra
diff --git a/infra/terraform/README.md b/infra/terraform/README.md
deleted file mode 100644
index 0cfd562c8..000000000
--- a/infra/terraform/README.md
+++ /dev/null
@@ -1,99 +0,0 @@
-# Terraform Infrastructure for GovTool
-
-This repository contains Terraform configurations for managing cloud resources
-for the GovTool project, focusing on AWS.
-
-## Architecture Overview
-
-The infrastructure is designed to support multiple environments and components
-across the development lifecycle.
-
-### Components
-
-- **IAM Groups and Policies**: Manage access and permissions for CI/CD
- processes.
-- **DNS Management**: Route 53 is used to handle DNS configurations for various
- services.
-- **ECR Repositories**: Host Docker images for backend, frontend, and services.
-- **EC2 Instances**: Support development, testing, staging, and beta
- environments.
-
-## Managed Resources
-
-This project configures and manages several AWS resources essential for the
-operation and deployment of the GovTool application across various environments.
-
-### IAM Configuration
-
-- **IAM Group (`CICD`)**: Manages CI/CD permissions.
-- **IAM Policy (`CICD_ECR`)**: Attached to the `CICD` group to manage ECR
- access.
-
-### DNS Management
-
-- **Route 53 Zone (`govtool.byron.network`)**: Handles DNS configurations and
- routing for the application.
-
-### Container Registry
-
-- **ECR Repositories**:
- - `backend`: Stores backend service images.
- - `backend-base`: Stores base images for backend development.
- - `frontend`: Stores frontend service images.
- - `status-service`: Stores images for the status monitoring service.
- - `metadata-validation`: Stores images for metadata validation service.
- - `analytics-dashboard`: Stores images for analytics dashboard.
-
-### Compute Resources
-
-- **EC2 Instances**:
- - `dev`: Instance for development.
- - `test`: Instance for testing.
- - `staging`: Instance for staging.
- - `beta`: Instance for beta testing.
-
-## Configuration Files
-
-- `main.tf`: Defines the provider, resources, and modules for infrastructure
- management.
-- `versions.tf`: Specifies the required versions for Terraform and providers,
- ensuring compatibility.
-
-## Managing Infrastructure
-
-### Prerequisites
-
-- AWS CLI
-- Configured AWS credentials
-- Terraform CLI (version specified in `versions.tf`)
-
-### Initialization
-
-Initialize the Terraform environment to begin managing the infrastructure:
-
-```bash
-terraform init
-terraform plan
-terraform apply
-```
-
-### Adding or Modifying Components
-
-When adding new resources or modifying existing configurations, ensure to follow
-the modular structure and update the respective environment settings as
-required.
-
-## Continuous Integration and Deployment
-
-IAM configurations and ECR policies are tailored to support CI/CD pipelines,
-allowing automated build and deployment processes.
-
-## Outputs
-
-Terraform outputs are configured to provide URLs and domain names for the
-deployed services, facilitating easy access and management.
-
-## Contributions
-
-Contributions are welcome. Please ensure to maintain the modular architecture
-and follow best practices for cloud resource management.
diff --git a/infra/terraform/bootstrap-aws-account.sh b/infra/terraform/bootstrap-aws-account.sh
deleted file mode 100755
index 0e9307c07..000000000
--- a/infra/terraform/bootstrap-aws-account.sh
+++ /dev/null
@@ -1,19 +0,0 @@
-#!/bin/bash
-
-state_bucket="vva-terraform-state"
-lock_table="vva-terraform-locks"
-region="eu-west-1"
-
-# aws s3api create-bucket --bucket "$state_bucket" --region "$region"
-aws s3 mb s3://"$state_bucket" --region "$region"
-aws s3api put-bucket-versioning --bucket "$state_bucket" --versioning-configuration Status=Enabled
-aws s3api get-bucket-versioning --bucket "$state_bucket"
-aws dynamodb describe-table --table-name "$lock_table"
-if [ $? -ne 0 ]; then
- aws dynamodb create-table \
- --region "$region" \
- --table-name "$lock_table" \
- --attribute-definitions AttributeName=LockID,AttributeType=S \
- --key-schema AttributeName=LockID,KeyType=HASH \
- --billing-mode PAY_PER_REQUEST
-fi
diff --git a/infra/terraform/default.nix b/infra/terraform/default.nix
deleted file mode 100644
index b69f64e6b..000000000
--- a/infra/terraform/default.nix
+++ /dev/null
@@ -1,12 +0,0 @@
-{ pkgs ? import