Back to articles
# I built a CLI that catches dangerous Terraform changes before you apply them
NewsDevOps

# I built a CLI that catches dangerous Terraform changes before you apply them

via Dev.to DevOpsAdil Khan

Before every terraform apply I was doing the same thing. Read the plan output. Switch to the AWS console. Check security groups. Try to remember what depends on what. Then a security group with port 22 open to 0.0.0.0/0 slipped through. Caught it fast, nothing broke — but I kept thinking about it. That whole review process was just me, manually, every time, hoping I didn't miss anything in 300 lines of text. That's not a process. That's vibes. So I built IACGuard. This is how it works and what I got wrong along the way. The gap in terraform plan The output doesn't tell you what matters. A production database being replaced and a tag change look identical in the plan — same format, same indentation, same weight. You have to already know what's dangerous to spot it. The second gap is pipelines. You can fail a PR on test failures or linting. You can't natively fail a PR because the plan replaces a production RDS instance. That gap means risky infrastructure changes get the same review as

Continue reading on Dev.to DevOps

Opens in a new tab

Read Full Article
7 views

Related Articles