- Notifications
You must be signed in to change notification settings - Fork166
Detect, track and alert on infrastructure drift
License
snyk/driftctl
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
This project is now in maintenance mode. We cannot promise to review contributions. Please feel free to fork the project to apply any changes you might want to make.
Measures infrastructure as code coverage, and tracks infrastructure drift.
IaC: Terraform.Cloud providers: AWS, GitHub, Azure, GCP.
Infrastructure drift is a blind spot and a source of potential security issues.Drift can have multiple causes: from team members creating or updating infrastructure through the web console without backporting changes to Terraform, to unexpected actions from authenticated apps and services.
You can't efficiently improve what you don't track. We track coverage for unit tests, why not infrastructure as code coverage?
Spot discrepancies as they happen: driftctl is a free and open-source CLI that warns of infrastructure drifts and fills in the missing piece in your DevSecOps toolbox.
- Scan cloud provider and map resources with IaC code
- Analyze diffs, and warn about drift and unwanted unmanaged resources
- Allow users toignore resources
- Multiple output formats
To learn more about compiling driftctl and contributing, please refer to thecontribution guidelines and thecontributing guide for technical details.
This project follows theall-contributors specification and is brought to you by theseawesome contributors.
Build with ❤️️ from 🇫🇷 🇬🇧 🇯🇵 🇬🇷 🇸🇪 🇺🇸 🇷🇪 🇨🇦 🇮🇱 🇩🇪
All Terraform state and Terraform files in this repository are for unit testpurposes only. No running code attempts to access these resources (except tocreate and destroy them, in the case of acceptance tests). They are just opaquestrings.
About
Detect, track and alert on infrastructure drift