Detect, track and alert on infrastructure drift
 
 
 
 
Go to file
sundowndev-snyk c42fc3dc34
test(aws): aws_lb
Delete unnecesary files and improve tests for that resource.
2022-04-07 15:08:54 +04:00
.circleci chore: use jq to improve changelog script 2022-03-01 18:14:39 +01:00
.github chore: Change code ownership to a more accurate team 2022-04-01 15:45:47 +02:00
build chore: Disable usage reporting for non release builds 2022-03-30 17:09:05 +02:00
docs Fix hacky way to serve fake tf provider schema in tests 2021-11-25 14:57:31 +01:00
logger Move to @snyk 2021-12-06 14:29:39 +01:00
mocks Move to @snyk 2021-12-06 14:29:39 +01:00
pkg test(aws): aws_lb 2022-04-07 15:08:54 +04:00
scripts chore: remove duplicates in array 2022-03-22 18:02:25 +04:00
sentry Move to @snyk 2021-12-06 14:29:39 +01:00
test feat: add aws_lb & aws_alb 2022-04-07 11:56:02 +04:00
.all-contributorsrc docs: update .all-contributorsrc [skip ci] 2022-03-31 11:35:28 +00:00
.dockerignore Ignore .terraform folders from docker context 2021-03-10 17:04:55 +01:00
.editorconfig Change json identation 2021-04-29 16:36:32 +02:00
.gitignore chore: add changelog automatically 2021-12-20 14:42:34 +04:00
.go-version chore: upgrade to go1.17 2022-01-13 17:59:38 +04:00
.golangci.yml Remove reference used in loops 2021-02-04 22:45:10 +01:00
.goreleaser.yml chore: add blobs config to goreleaser file 2022-03-22 15:50:46 +04:00
.mockery.yaml remove testonly from mockery config 2021-02-16 18:05:18 +01:00
.snyk Ignore vuln in terraform dependencies 2022-01-11 10:50:15 +01:00
CONTRIBUTORS.md docs: update CONTRIBUTORS.md [skip ci] 2022-03-31 11:35:27 +00:00
Dockerfile fix: Dockerfile to reduce vulnerabilities 2022-03-18 04:00:37 +00:00
LICENSE.md Moved to @snyk legal stuff 2021-12-06 14:09:56 +01:00
Makefile Increase aws acc test timeout 2021-10-29 10:08:53 +02:00
README.md docs: readme 2022-01-04 09:47:17 +04:00
ROADMAP.md refactor: rename cloudskiff to snyk 2021-12-06 17:00:54 +01:00
codecov.yml Change range of coverage colors 2021-03-03 12:28:01 +01:00
go.mod chore: add azblob dependency 2022-02-22 14:51:15 +01:00
go.sum chore: add azblob dependency 2022-02-22 14:51:15 +01:00
goland_watchers.xml Use printer to not break output isolation 2021-03-15 12:03:35 +01:00
main.go feat: enabled colors when driftctl is piped in snyk CLI 2022-03-09 10:31:00 +01:00

README.md

driftctl

Measures infrastructure as code coverage, and tracks infrastructure drift.
IaC: Terraform. Cloud providers: AWS, GitHub, Azure, GCP.
⚠️ This tool is still in beta state and will evolve in the future with potential breaking changes ⚠️

Packaging status Packaging status

Why driftctl ?

Infrastructure drift is a blind spot and a source of potential security issues. Drift can have multiple causes: from team members creating or updating infrastructure through the web console without backporting changes to Terraform, to unexpected actions from authenticated apps and services.

You can't efficiently improve what you don't track. We track coverage for unit tests, why not infrastructure as code coverage?

Spot discrepancies as they happen: driftctl is a free and open-source CLI that warns of infrastructure drifts and fills in the missing piece in your DevSecOps toolbox.

Features

  • Scan cloud provider and map resources with IaC code
  • Analyze diffs, and warn about drift and unwanted unmanaged resources
  • Allow users to ignore resources
  • Multiple output formats

Get Started

Documentation

Installation

Discord

Contribute

To learn more about compiling driftctl and contributing, please refer to the contribution guidelines and the contributing guide for technical details.

This project follows the all-contributors specification and is brought to you by these awesome contributors.

Build with ❤️ from 🇫🇷 🇬🇧 🇯🇵 🇬🇷 🇸🇪 🇺🇸 🇷🇪 🇨🇦 🇮🇱

Helping you get started

We have 30 min slots for 1:1 tech discussions and overviews twice a day to help you get started and collect users feedback.

Feel free to book a slot.

Security notice

All Terraform state and Terraform files in this repository are for unit test purposes only. No running code attempts to access these resources (except to create and destroy them, in the case of acceptance tests). They are just opaque strings.