terrascan
cloudknit
terrascan | cloudknit | |
---|---|---|
1 | 3 | |
3,324 | 94 | |
- | - | |
10.0 | 7.6 | |
over 1 year ago | 7 months ago | |
Go | TypeScript | |
Apache License 2.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
terrascan
-
Defender for DevOps on GitHub (Terrascan edition)
As mentioned MSDO features a few different tools (I will cover some of the other tools in a future blog post), but I want to concentrate on a specific tool today called Terrascan which is part of the MSDO toolkit.
cloudknit
-
CloudKnit: An Open Source Solution for Managing Cloud Environments
Thanks for the question. I'm assuming you are talking about the open source Pulumi and Terraform CLI. We don't compete with them but rather integrate with them. These IaC tools and even other cloud native tools like Helm/Kustomize work well to manage individual components of your "Environment" but folks still need to write pipeline code on top of these tools to get an Environment thats useful. The pipeline code is imperative and becomes very difficult to manage as you scale. Environment as Code is a declarative way (with state management) to provision entire environment.
If you think about this using a Lego analogy, CloudKnit connects various lego pieces (components within your environment like networking, eks, db, web apps, backend apps) and builds a lego toy (entire environment). Those various components will still be provisioned using Pulumi, TF, Helm Kustomize etc.
We also provide workflow, visibility for the environments.
We have a diagram in our README (https://github.com/cloudknit-io/cloudknit#readme) that explains how CloudKnit fits in with existing tools. Please check "Diagram 1: Where does CloudKnit fit in with existing tools".
Also, here is a talk I gave about Environment as Code that might help understand the concept behind CloudKnit better: https://www.youtube.com/watch?v=INCUMYl2B-0&t=9s
Hope this helps.
Thank,
What are some alternatives?
klotho - Klotho - write AWS applications at lightning speed
devopsish.com - DevOps, Cloud Native, Hybrid Cloud, Open Source, industry news, culture, and the ‘ish between.
aws-sso-cli - A powerful tool for using AWS Identity Center for the CLI and web console.
cloudy - A tool for managing production-grade cloud clusters, infrastructure as code (IaC)
yatas - :owl::mag_right: A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integration
XSSFaaS - Distributed, serverless cloud powered by browser tabs
MSDO-Lab - Microsoft Security DevOps (MSDO) Lab for testing Defender for DevOps integration on Azure.
Selefra - The open-source policy-as-code software that provides analysis for Multi-Cloud and SaaS environments, you can get insight with natural language (powered by OpenAI).
terraform-provider-checkly - Terraform provider for the Checkly monitoring service
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.
Netris.ai - The Kubernetes Operator for Netris
terrascan - Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure. [Moved to: https://github.com/accurics/terrascan]