driftctl
former2
Our great sponsors
driftctl | former2 | |
---|---|---|
31 | 11 | |
2,398 | 2,119 | |
0.9% | - | |
0.0 | 7.6 | |
7 days ago | 28 days ago | |
Go | JavaScript | |
Apache License 2.0 | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
driftctl
-
Top Terraform Tools to Know in 2024
Driftctl is an open-source Terraform drift detection tool that tracks and warns about infrastructure drift. Driftctl scans your infrastructure, compares it with your IaC configurations (like Terraform), and reports discrepancies.
- Catch drift outside of your infrastructure code
-
Generating documents from the TF state?
their decoder https://github.com/snyk/driftctl/tree/main/pkg/iac/terraform/state
-
Folks who use Atlantis for Terraform Self Service - what pains you the most?
Drift detection is a pain for us as it is today, we are planning on adding another tool to the stack to solve this problem, like snyk/driftctl
-
Terraform Drift Detection
driftctl. That is all.
- GitHub - rootsami/terradrift: A tool to detect drifts in terraform IaC
- tool to log into AWS and generate Terraform code
-
Driftctl and Terraform, they're two of a kind!
Driftctl website / Driftctl source code
-
Terraforming in 2021 – new features, testing and compliance
Driftctl tool
-
Terraform diffing solution
Hi u/weaselchopz, Gerald here, from the driftctl team :) Feel free to take part to the discussions on the roadmap as regards the next cloud providers to support. It will help us prioritize https://github.com/cloudskiff/driftctl/discussions
former2
-
Top 10 terraform tools you should know about.
Former2 is a tool that automates the creation of Infrastructure-as-Code (IaC) scripts from existing AWS resources. It utilizes the AWS JavaScript SDK to scan the user’s AWS infrastructure, identifying all available resources. Users can then select from this list which resources they want to include in their IaC outputs. This process simplifies the task of writing IaC scripts, especially for complex environments, by directly converting current AWS configurations into ready-to-use code. Former2 is particularly useful for documenting existing infrastructure or for migrating manually created resources into an IaC framework.
-
Importing multiple modules at once from AWS
You can use tools like https://github.com/cycloidio/terracognita or https://github.com/iann0036/former2 to generate the terraform code for you. Then you can consolidate them and if they are simply the same type of objects with different values then you can use terragrunt to pass values to your terraform module.
- Is there a way to turn a existing cloudformation template into a terraform file?
-
Overwhelmed by AWS
I have never tried out this tool, but maybe it's worth checking: you could create all the stuff via AWS Console in a sandbox environment and then try to use former2. Nothing autogenerated will ever be good enough compared to handcrafted, but it should give you a nice starting point without much effort.Such a tool can not be expected to work reliably. Thankfully, you need to cover only classic, foundational services like EC2, ELB, and IAM, so I would expect them to work properly for those use cases.
- tool to log into AWS and generate Terraform code
-
Current infrastructure as code
Not quite: a command line tool is also available: https://github.com/iann0036/former2/blob/master/cli/README.md
-
Please fix the AWS free tier before somebody gets hurt
https://github.com/iann0036/former2
This will scan your entire account and list all of your resources - it's actually made for generating CloudFormation templates, but it's very useful for a use-case like yours.
What are some alternatives?
terraformer - CLI tool to generate terraform files from existing infrastructure (reverse Terraform). Infrastructure to Code
terracognita - Reads from existing public and private cloud providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
terratest - Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
terradiff - Get told when your Terraform config doesn't match reality
aws-nuke - Nuke a whole AWS account and delete all its resources.
terraforming - Export existing AWS resources to Terraform style (tf, tfstate) / No longer actively maintained
terraform - Terraform enables you to safely and predictably create, change, and improve infrastructure. It is a source-available tool that codifies APIs into declarative configuration files that can be shared amongst team members, treated as code, edited, reviewed, and versioned.
checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
aws-multi-account-viewer - Serverless app designed for any customer with two or more accounts to view resources across accounts/regions in simple single pane of glass website
tfsec - Security scanner for your Terraform code [Moved to: https://github.com/aquasecurity/tfsec]