Back

Infrastructure as Code Live Demo (Video)

Infrastructure as Code What is Infrastructure as CodeIn traditional IT a server gets requested from the IT department and they must spi...

3 min read
Published on Apr 10, 2019
Infrastructure as Code Live Demo (Video)

Infrastructure as Code

What is Infrastructure as Code?

In traditional IT, a server gets requested from the IT department, and they must spin it up, add storage, add apps, check configuration, and add any additional resources needed. A server cluster for a web app, that is going to take even more time. Infrastructure as Code is an IT management methodology that uses descriptive models, typically JSON,  to rapidly deploy technology stacks and cloud resources. While it is critical for development teams working in a DevOps environment, it is also a powerful way to manage any type of infrastructure. Some of the benefits of software-defined infrastructure include:

  • Source Control for Resources - Using tools like Azure DevOps, Git.
  • Automatic testing
  • Elimination of configuration drift

What are ARM Templates?

Azure Resource Manager (ARM) Templates are documents that describe a resource within Azure. That resource can be a virtual machine, storage, database, load balancer, virtual network, etc. The documents, usually in JSON, are declarative, meaning you state “what you intend to create” without having to script the sequence of commands needed to create it, instead you declare the properties of the resource you want to create, and Azure Resource Manager does the rest. This is much easier than automating resource creation through scripted configs, as it eliminates the need to code individual command sand configurations.

ARM templates are incredibly flexible, as they can be written directly in JSON, or they can be built using the Azure Resource Manager interface, Visual Studio, and the Azure Editor. The template then exported to JSON, Powershell, or even Ruby for management and source control. It can then be deployed using Azure, Visual Studio, or Powershell. Additionally, you can release your ARM Templates onto the Azure Marketplace for sale or sharing.

What is Desired State Configuration?

Desired state configuration is a PowerShell based method of configuring resources. DSC consists of three primary components:

  • Configurations - Declarative PowerShell scripts that define configurations of resources. When run, they ensure the resource exists in the desired configuration
  • Resources - These contain the code that set and maintain the target of a configuration in the desired state.
  • Local Configuration Manager- The engine behind DSC. This manages the relationship between the configurations and resources and makes sure that the desired state is maintained. If the configuration changes, the LCM will run the code needed to return the resource to the desired state.

Read the Microsoft DSC documentation here.

What is Enterprise Scaffolding

Enterprise scaffolding is a set of flexible controls that provide structure to the environment. The scaffold empowers admins to ensure that workloads meet the minimum governance requirement of the organization while still permitting business units to meet their own goals. The best analogy is that it allows you to stock your infrastructure tool shed with the exact tools your organization needs while restricting tools they do not. This can assure that all new resources follow naming conventions, have appropriate security and compliance controls and meet predefined needs.

Watch the Demonstration

Do you want the added security, resiliency and stability that code based infrastructure can provide? Agile IT is AWS Certified and a Microsoft Gold DevOps Partner.

Let us know about your environment for a free quote.

Agile IT Tech Talks are a resource for our MSP and CSP clients and feature engineers and solution architects providing introductions to new functions and walkthroughs of best practices combined with a private Q&A to allow our clients to explore how they can be applied in their own environments and organizations. To find out more, schedule a call with a cloud service advisor today.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Azure Migration Made Easy Tools Automation and Best Practices

Azure Migration Made Easy: Tools, Automation, and Best Practices for a Smooth Cloud Transition

Simplify your Azure migration with the right tools and automation. Explore Azure Migrate, Site Recovery, DevOps, and third-party solutions for an efficient cloud transition.

May 26, 2025
7 min read
How to Enable Cross-Cloud Collaboration Between GCC High and Office 365

How to Connect GCC High and Office 365 for Cross-Cloud Collaboration

Learn how to securely connect GCC High and Office 365 for cross-cloud collaboration. Explore supported features, limitations, and compliance best practices.

May 22, 2025
6 min read
Key Controls for Achieving CMMC Level 2

Key Controls for Achieving CMMC Level 2 Compliance

Discover the key security controls required for CMMC Level 2 compliance. Learn how to implement NIST 800-171 practices to protect Controlled Unclassified Information (CUI).

May 21, 2025
7 min read
Understanding CMMC Enclaves: A Guide for DoD Contractors

CMMC Enclaves: Your Comprehensive Guide to Protecting CUI

Discover how CMMC enclaves can streamline compliance and bolster security by isolating Controlled Unclassified Information (CUI) within a secure environment.

May 21, 2025
7 min read
How MSPs, RPOs, and C3PAOs Help Organizations Achieve CMMC Compliance

How MSPs Help Organizations Achieve CMMC Compliance

MSPs, RPOs, and C3PAOs play a crucial role in CMMC compliance. Learn how to choose the right consultant, third-party auditor, or provider to meet CMMC certification requirements.

May 20, 2025
8 min read
CMMC Compliance Requirements for Level 1 Level 2 and Level 3

CMMC Compliance Requirements for Level 1 Level 2 and Level 3

CMMC certification requires different cybersecurity controls at each level. Learn the key requirements for Level 1, Level 2, and Level 3 compliance and how they align with NIST 800-171.

May 16, 2025
5 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation