A containerized tool that codifies unmanaged cloud resources as Terraform, detects drift, estimates costs, and scans for security issues via pull requests.
cloud-concierge is a containerized tool that helps teams manage cloud infrastructure through Terraform best practices. It identifies resources outside Terraform control, generates corresponding code, detects configuration drift, estimates costs, and scans for security issues—all delivered via pull requests. It solves the problem of maintaining accurate infrastructure-as-code documentation and preventing configuration drift in cloud environments.
DevOps engineers, platform teams, and infrastructure developers managing cloud resources with Terraform who need better visibility into their infrastructure state and want to enforce infrastructure-as-code practices.
Developers choose cloud-concierge because it automates the tedious process of maintaining Terraform documentation while providing comprehensive infrastructure insights through a familiar GitOps workflow. Its unique pull request-based delivery makes infrastructure changes transparent and reviewable, integrating seamlessly with existing CI/CD pipelines.
"Terraform best practices as a Pull Request." Codify resources outside of Terraform control, detect drift, estimate cloud costs, identify security risks, and more.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Identifies unmanaged resources and generates corresponding Terraform code with import statements, automating infrastructure documentation as per the key features.
Compares actual cloud infrastructure against Terraform state files to detect configuration drift, ensuring alignment with infrastructure-as-code principles.
Combines cost estimation via Infracost and security scanning via tfsec, delivering all findings through a single, digestible pull request in a GitOps manner.
Outputs results via pull requests to a repository of choice, promoting transparency and reviewable changes, as highlighted in the philosophy and example output.
Relies on a Python-based Google Cloud Function for resource matching, introducing external API calls and potential privacy concerns, as admitted in the NLP Engine section.
Requires Docker, environment variable configuration, and cloud provider credentials setup, which can be cumbersome, as seen in the multi-step Quick Start guides.
Only supports Terraform-managed infrastructure, making it incompatible with other IaC tools like Pulumi or AWS CloudFormation, restricting its utility.