|
2 | 2 |
|
3 | 3 | ## Overview |
4 | 4 |
|
5 | | -Integrate Amazon Bedrock to your HashiCorp Cloud Platform Terraform (Terraform Cloud) Run Tasks for: |
| 5 | +Enhance your HashiCorp Cloud Platform Terraform (Terraform Cloud) workflows with AI-powered analysis using Amazon Bedrock. This module integrates seamlessly as a Run Task to provide: |
6 | 6 |
|
7 | | -* Analyzing Terraform plan and generate short-summary |
| 7 | +* Intelligent Terraform plan analysis with concise, human-friendly summaries |
| 8 | +* Advanced function calling capabilities for extended analysis (e.g., AMI evaluation) |
| 9 | +* Responsible AI implementation with customizable guardrails |
8 | 10 |
|
9 | | -* Function calling for other API-based analysis (e.g AMI analysis) |
| 11 | +### Key Features |
10 | 12 |
|
11 | | -### Terraform plan summary |
| 13 | +1. **AI-Powered Plan Summaries** |
| 14 | + * Generate clear, natural language summaries of Terraform plan outputs |
| 15 | + * Quickly understand the impact of infrastructure changes |
| 16 | +  |
12 | 17 |
|
13 | | -Summarize Terraform plan output in human friendly natural language. |
14 | | - |
| 18 | +2. **Extensible Analysis with Function Calling** |
| 19 | + * Leverage AI to perform additional analyses, such as AMI evaluation |
| 20 | + * Easily extend to other API-based tools and services |
| 21 | +  |
15 | 22 |
|
16 | | -### Function calling (AMI analysis) |
| 23 | +3. **Responsible AI Integration** |
| 24 | + * Implement Amazon Bedrock guardrails tailored to your organization's policies |
| 25 | + * Ensure ethical and compliant AI usage in your infrastructure workflows |
| 26 | +  |
17 | 27 |
|
18 | | -Use function calling to execute other tools, such as analyzing AMI data. |
19 | | - |
| 28 | +4. **Secure Architecture** |
| 29 | + * Designed for deployment in a dedicated AWS account |
| 30 | + * Optional AWS WAF integration for enhanced endpoint protection |
| 31 | + * Adherence to AWS security best practices |
20 | 32 |
|
21 | | -### Responsible AI |
| 33 | +5. **Seamless Terraform Cloud Integration** |
| 34 | + * Operates as a native Run Task within your Terraform Cloud workflow |
| 35 | + * Provides insights without disrupting existing processes |
22 | 36 |
|
23 | | -Implement safeguards using Amazon Bedrock guardrails customized to your organization requirements and responsible AI policies |
24 | | - |
| 37 | +6. **Flexible and Customizable** |
| 38 | + * Adapt the module to fit your specific organizational needs |
| 39 | + * Easily configure and extend guardrails and analysis capabilities |
25 | 40 |
|
26 | 41 | ## Architecture |
27 | 42 |
|
28 | 43 |  |
29 | 44 |
|
30 | | -This module must be deployed in AWS account with access to Amazon Bedrock model. We recommend you to use hub-spoke model, by deploying this module in one dedicated account. |
31 | | - |
32 | | -Please refer to the [best-practice](#best-practice) section below for more details. |
| 45 | +This module leverages a hub-spoke model, designed for deployment in a dedicated AWS account with Amazon Bedrock access. It utilizes AWS Lambda, CloudFront, and other AWS services to provide a scalable and secure solution. |
33 | 46 |
|
34 | 47 | ## Prerequisites |
35 | 48 |
|
36 | | -To use this module you need have the following: |
| 49 | +To implement this module, you'll need: |
| 50 | + |
| 51 | +1. An AWS account with appropriate credentials |
| 52 | +2. Access to Amazon Bedrock (default model: Claude 3 Sonnet) |
| 53 | +3. A HashiCorp Cloud Platform (HCP) Terraform account |
| 54 | + |
| 55 | +## Getting Started |
| 56 | + |
| 57 | +For detailed setup instructions and best practices, please refer to the sections below: |
| 58 | + |
| 59 | +* [Usage](#usage) |
| 60 | +* [Best Practices](#best-practice) |
37 | 61 |
|
38 | | -1. AWS account and credentials |
39 | | -1. Amazon Bedrock model access (default model is `Claude 3 Sonnet`) |
40 | | -1. HCP Terraform account |
| 62 | +Enhance your Terraform workflows with AI-powered insights while maintaining security and responsible AI practices. |
41 | 63 |
|
42 | 64 | ## Usage |
43 | 65 |
|
|
0 commit comments