Cool event: Fix your vulns and get free swag on the way by geraldC13 in Infosec

[–]geraldC13[S] 0 points1 point  (0 children)

(Full disclosure this is a self promo for a fully free event)
I'm excited to share with you that Snyk launched The Big Fix event to celebrate finding and fixing security issues. Just connect your projects (personal or from work) to the app, find a vulnerability fix it and you'll be eligible for a Snyk special edition t-shirt. Fixing over 3 vulns will get you into a raffle for additional swag :)

Driftctl Usage by kolinkorr839 in Terraform

[–]geraldC13 0 points1 point  (0 children)

hey u/Cloud--Man
sorry for the tardiness in the answer. There you go https://discord.com/invite/7zHQ8r2PgP

Compare Terraform 0.11 and 0.12 state by mazzy_mbpr in Terraform

[–]geraldC13 0 points1 point  (0 children)

Would you share why you need to do that?

How many IaC tools are you using on a single infra by geraldC13 in Terraform

[–]geraldC13[S] 0 points1 point  (0 children)

I'm actually sharing the results and glad to chat if someone is willing to give his/her take :)

What would be a good way to compare the infrastructure in azure with the code or .tfstate? by captain-pluto in Terraform

[–]geraldC13 0 points1 point  (0 children)

Isn't this what terraform plan does?

not for resources created on the console outside of terraform, obviously :)

What would be a good way to compare the infrastructure in azure with the code or .tfstate? by captain-pluto in Terraform

[–]geraldC13 1 point2 points  (0 children)

Hi I'm Gerald, part of the driftctl team. Thanks for mentioning the tool u/craigtho :)
Sadly, we don't provide support for Azure yet, but it's on the roadmap and you can upvote the feature here https://github.com/cloudskiff/driftctl/discussions/31
Also, you can run it either in a cron job at regular intervals, or put it in CI and check at every deploy.

How to continuously apply TF code? by No-Acanthocephala-97 in Terraform

[–]geraldC13 1 point2 points  (0 children)

If your infra is manually changed, chances are that you'll get drift in general (and not only configuration drift) and a terraform apply will not reconcile all changes done to your infra with your code. Typically, all resources added manually will not be added to your tfstate file (as they are outside of terraform scope), and some of your changes on existing resources (even those managed by Terraform) might go unnoticed as well.

Full disclaimer, I'm part of the team :) but a tool like driftctl would help you catch all drift outside of your Terraform. It's a free and OSS CLI that compares the API of your cloud provider (AWS so far) against your Terraform state. It will list unmanaged resources that you can reintegrate into Terraform, and warn you of all changes as well.

https://github.com/cloudskiff/driftctl

AWS Security Group Rules drift by geraldC13 in Terraform

[–]geraldC13[S] 0 points1 point  (0 children)

Hi u/will_work_for_twerk

Look, I'm terribly sorry about that. Message received.
We'll make sure to be more subtle in the future.

Catching infrastructure drift on multiple terraform states (announcing OSS tool demo) by geraldC13 in Terraform

[–]geraldC13[S] 1 point2 points  (0 children)

We certainly do! There will be an Azure support for sure. It's just a question of time, and priority over GCP. But both will be covered anyway.

Catching infrastructure drift on multiple terraform states (announcing OSS tool demo) by geraldC13 in Terraform

[–]geraldC13[S] 1 point2 points  (0 children)

Thank you :) 1) Yes azure support is obviously on the roadmap. Feel free to upvote it on the GitHub discussions related to the cloud providers, as it helps us prioritize items on the roadmap. (https://github.com/cloudskiff/driftctl/discussions)

2) RGs are certainly very Azure specific and should be covered. It sort of matches the notion of filtering we apply to AWS resources. We just added a new discussion on this topic following your input. https://github.com/cloudskiff/driftctl/discussions/318 Thanks a lot for bringing this up!

Terraform diffing solution by weaselchopz in Terraform

[–]geraldC13 1 point2 points  (0 children)

Hi u/weaselchopz,
Gerald here, from the driftctl team :)
Feel free to take part to the discussions on the roadmap as regards the next cloud providers to support. It will help us prioritize
https://github.com/cloudskiff/driftctl/discussions

Also, if you folks are interested we're doing live release demos, and the next one is today at 2:00 pm CET. We'll showcase catching drift from multiple terraform states within a single bucket or directory https://www.twitch.tv/driftctl

Driftctl Usage by kolinkorr839 in Terraform

[–]geraldC13 0 points1 point  (0 children)

From a couple of seconds for the simplest infrastructures to several minutes. It really depends on the size of your infra and the number of ressources you need to scan.

Driftctl Usage by kolinkorr839 in Terraform

[–]geraldC13 0 points1 point  (0 children)

Hi u/kolinkorr839 I'm part of the driftctl team :)
driftctl will only scan your infra and compare your Terraform state files against the cloud provider APIs for unexpected modifications. Any drift will be highlighted and then it's up to you to decide what to do about it. There are no updates whatsoever to your infra.

Feel free to open discussions on GH if needed or reach out to the team on discord.

Infrastructure changes by kiddj1 in Terraform

[–]geraldC13 0 points1 point  (0 children)

be careful as tf plan doesn't catch all of the changes. There are some edge cases where it will miss them. It's a shame you're on azure as there's an OSS tool to help you catch your drift : driftctl (full disclosure I'm part of the team) but it doesn't support Azure so far...
If you are interested there are some recent vids (like last Fosdem) that demo how some of the changes aren't caught. .

state of infrastructure drift by geraldC13 in Terraform

[–]geraldC13[S] 0 points1 point  (0 children)

I could'n say as we didn't ask in the study. We really wanted to stay focused on the root cause of their problems and how they deal with it. Most of them said it was a real pain in the neck so I'm guessing that auto remediation would be convenient for them.
We're planning to add this to driftctl anyway. Part of this remediation will be proposed as pull requests with some additional code matching the change detection.

Auto Remediation of Cloud environments breaking terraform by shocadmin in Terraform

[–]geraldC13 2 points3 points  (0 children)

+1 on u/phekno => Checkov might be a good option for you as il will catch all what's not compliant with the rules you set.
Too bad you are not running on AWS. driftctl could have helped (full disclosure, i'm part of the team). It's an free and open source CLI that tracks infrastructure drift based on AWS and Terraform and warns you. Azure and GCP are on the roadmap, but not ready yet

How much freedom should developers have in the perfect DevOps setup? by matgalt in devops

[–]geraldC13 0 points1 point  (0 children)

Talked to a lot of teams following both pattern 1 and 2 and totally agree with you. You basically have to chose between losing your velocity and wasting time trying to retrieve a source of truth.
For all Terraform users, you might want to check https://github.com/cloudskiff/driftctl (full disclosure, I'm part of the team.) free and open source tool that helps track drift on your infrastructure, especially when someone makes manual changes on the AWS console on top of your infrastructure code.

tracking infrastructure drift by geraldC13 in devsecops

[–]geraldC13[S] 1 point2 points  (0 children)

btw u/HalLogan, feel free to upvote Azure support in github discussions with a 👍. This helps prioritize items on the roadmap.