1-Click Import of AWS Identity Center to Terraform
Today, ControlMonkey is pleased to announce that we have added the capability to easily import AWS Identity Center resources to Terraform/OpenTofu Code using our Terraform Import Engine.
AWS Identity Center is a service that provides centralized management of access to multiple AWS accounts and applications. It enables organizations to manage user identities and permissions efficiently, allowing users to sign in to their AWS accounts and applications with a single set of credentials
Provisioning Identity Stores resources with Terraform/OpenTofu provides a consistent, version-controlled, simplified, and automated way to manage AWS Accounts permissions and RBAC and reduces the overall risk of manual misconfigurations.
ControlMonkey now supports the one-click Terraform/OpenTofu Import of the following Identity Store resources:
Are you using Identity Center and have resources you would like to shift to Terraform? Feel free to book an intro meeting to learn more about how ControlMonkey generates the Terraform/OpenTofu code that represents your Identity Center configuration, making the shift to Terraform as seamless as possible.
A 30-min meeting will save your team 1000s of hours
A 30-min meeting will save your team 1000s of hours
Today, ControlMonkey is pleased to announce that we have added the capability to easily import AWS OpenSearch domain resources to Terraform Code using our Terraform Import Engine.
AWS OpenSearch is a fully managed service that simplifies the deployment, operation, and scaling of OpenSearch, a powerful search and analytics engine based on Elasticsearch. It provides real-time search, monitoring, and analysis capabilities for various use cases.
Managing OpenSearch resources with Terraform provides a consistent, version-controlled, and automated way to provision, update, and manage OpenSearch deployments, which enhances efficiency and reduces the risk of manual misconfigurations.
ControlMonkey now supports the one-click Terraform Import of the following OpenSearch resources:
So, if you’re using OpenSearch in your environments, swiftly shift your OpenSearch resources to Terraform code and manage the cluster’s configuration with Terraform to create, update, and delete OpenSearch domains reliably and repeatedly.
Are you using OpenSearch and have resources you would like to shift to Terraform? Feel free to book an intro meeting to learn more about how ControlMonkey generates the Terraform code that represents your OpenSearch configuration, making the shift to Terraform as seamless as possible.
A 30-min meeting will save your team 1000s of hours
A 30-min meeting will save your team 1000s of hours
Today, ControlMonkey is pleased to announce that we have added the capability to easily import EC2 Image Builder resources to Terraform Code using our Terraform Import Engine.
EC2 Image Builder is an AWS service that automates creating, managing, and deploying customized and secure machine images for EC2 instances.
Managing EC2 Image Builder with Terraform is important because it ensures consistent, repeatable, and version-controlled deployments of machine images across different environments.
ControlMonkey now supports the one-click Terraform Import of the following Image Builder resources:
So, if you’re building images using EC2 Image Builder, you can now manage their configuration with Terraform.
Are you using Image Builder and have resources you would like to shift to Terraform? Feel free to book an intro meeting with us to learn more about how ControlMonkey generates the Terraform code that represents your Image Builder resources configuration, making the shift to Terraform as seamless as possible.
A 30-min meeting will save your team 1000s of hours
A 30-min meeting will save your team 1000s of hours
Today ControlMonkey is pleased to announce that we have reinforced our Terraform Import Engine with the ability to Import AWS Direct Connect resources to Terraform.
AWS Direct Connect is a networking service that provides an alternative to using the internet to connect to AWS. Using AWS Direct Connect, data that would have previously been transported over the internet is delivered through a private network connection between private facilities and AWS.
ControlMonkey now supports one-click Terraform Import of the following Direct Connect resources:
Today ControlMonkey is pleased to announce that we have reinforced our Terraform Import Engine with the ability to Import AWS Code Pipeline resources to Terraform.
AWS CodePipeline is a continuous integration and continuous delivery (CI/CD) service provided by Amazon Web Services (AWS). It automates the build, test, and deployment phases of your release process for software applications.
AWS CodePipeline is commonly used to automate the software release process, ensuring that code changes are tested and deployed quickly and consistently, thus reducing manual errors and speeding up the delivery of features to end-users. It promotes best practices such as infrastructure as code, version control, and automated testing.
ControlMonkey now supports one-click Terraform Import of the following Code Pipeline resources:
Managing AWS CodePipeline with Terraform offers several benefits:
Infrastructure as Code (IaC): Terraform allows you to define your CodePipeline configuration in code, which can be version-controlled, reviewed, and managed just like your application code. This enables you to maintain consistency and reproducibility in your pipeline configurations.
Consistency: With Terraform, you can ensure that your CodePipeline setups are consistent across different environments (e.g., development, staging, production) by using the same Terraform configuration with appropriate variables for each environment.
Versioning and Rollbacks: Since Terraform configurations are version-controlled, you can track changes made to your CodePipeline setups over time and easily roll back to previous versions if needed. This helps in maintaining a history of changes and troubleshooting any issues that may arise.
Do you have Code Pipeline resources that you would like to shift to Terraform? Feel free to book an intro meeting with us to learn more!
A 30-min meeting will save your team 1000s of hours
A 30-min meeting will save your team 1000s of hours
Today ControlMonkey is pleased to announce that we have reinforced our Terraform Import Engine with the ability to Import Network Firewall resources to Terraform.
AWS Network Firewalls are leveraged in order to prevent malicious attacks on the application by defining multiple allow/deny rules on the networking layer.
However, in large-scale cloud environments with a lot of moving parts, the chance for mistakes misconfigurations rises. For example, downtimes can be caused for your application’s users by blocking your VPC to legitimate connections, and on the other hand, misconfigured firewall rules can expose your application to malicious attacks. On top of that, you would also want to track all the changes made to your Firewall rules and have the ability to roll back at any given moment to the previous state.
Therefore, managing your Network Firewall configuration with Terraform is highly important and is considered the ideal solution for scale. But what if you already have a running firewall that you span up manually from the AWS console? How do you import that to Terraform?
Luckily, ControlMonkey now supports one-click Terraform Import of the following Network Firewall resources:
ControlMonkey automatically generates the Terraform code + the Terraform state file so you can shift your Network Firewall management from ClickOps to GitOps in a few minutes with absolutely zero effort.
Managing AWS network firewalls with Terraform code offers several advantages:
Infrastructure as Code (IaC): Terraform allows you to define your AWS network firewall configurations as code, making it easier to manage, version control, and replicate across different environments (such as development, staging, and production). This approach enhances consistency and reduces the risk of configuration drift.
Automation: Terraform enables you to automate the provisioning, configuration, and management of AWS network firewalls. This automation can save time and reduce the potential for human error that may occur with manual configuration changes.
Scalability: With Terraform, you can easily scale your AWS network firewall configurations up or down based on changing requirements. You can dynamically adjust rules, add new firewall instances, or modify existing configurations as needed, without the need for manual intervention.
Visibility and Auditability: Using Terraform, you can maintain a clear and documented history of changes to your AWS network firewall configurations. This enhances visibility into your infrastructure and facilitates auditing and compliance efforts.
Collaboration: Terraform code can be easily shared and collaborated on by teams of developers and operations engineers. This collaborative approach promotes knowledge sharing, improves communication, and fosters best practices in managing AWS network firewalls.
Integration with CI/CD Pipelines: Terraform can be integrated into your continuous integration and continuous delivery (CI/CD) pipelines, allowing you to automate the deployment of changes to your AWS network firewall configurations as part of your software delivery process. This helps streamline the development lifecycle and ensures that infrastructure changes are tested and deployed consistently.
Overall, managing AWS network firewalls with Terraform code provides greater control, automation, scalability, and visibility, leading to more efficient and reliable infrastructure management in the cloud.
Today ControlMonkey is pleased to announce that we have reinforced our Terraform Import Engine with the ability to Import WAFV2 resources to Terraform.
AWS WAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded to various AWS services and also lets you control access to your content.
Managing WAFV2 in a manual ClickOps methodology and not through Terraform Code increases the risk of misconfigurations which may lead to security incidents.
With ControlMonkey, DevOps can easily import and manage their WAFV2:
Modular Deployment: Terraform allows for the creation and management of AWS WAFconfigurations in a modular and reproducible manner, making it easier to deploy and manage security policies across different projects.
Code Reusability: Using Terraform, you can define WAF configurations as code, making it possible to reuse these configurations in multiple projects. This is particularly useful when dealing with both global and regional WAF instances, allowing for efficient code reuse and consistency.
Improved Visibility and Monitoring: Terraform enables the definition of CloudWatch metrics and sampled requests for better visibility into web traffic inspection. This allows for improved monitoring and analysis of the effectiveness of WAF rules.
Flexibility in Scope Definition: Terraform provides flexibility in defining the scope of WAF configurations, such as specifying whether it is for CloudFront (global) or regional resources (e.g., API Gateway). This flexibility ensures that WAF configurations align with the specific needs and architecture of different services.
Today we are excited to announce the launch of our enhanced resource explorer. ControlMonkey’s resource explorer is a simplified dashboard that helps DevOps teams discover and investigate all of their AWS resources.
With Resource Explorer, you can:
Search for AWS resources per account, region, Resource Type, VPC, and even by tags.
Get an indication of whether this resource is managed by Terraform alongside a 1-click button that opens the resource’s corresponding code in your GIT repository.
Get an indication of whether this resource is unmanaged by Terraform alongside a 1-click remediation button for a quick resolution.
Easily see the resource’s ARN alongside a 1-click button that opens the resource in the AWS console.
Find related resources. For example: who’s using a security group? what IAM users are using an IAM policy?
Resource Explorer provides you with complete visibility into your Cloud Infrastructure, saves precious time when searching for resources, and makes sure your Terraform coverage is maximized.
With ControlMonkey, you can seamlessly detect resources that are not managed by Terraform, and in a few clicks you can import those into Terraform code using our ‘Terraform Import Engine’. Our ‘Smart Stacking Algorithm’ automatically identifies related resources and proactively allows the user to import the entire related stack, rather than importing them one by one.
1-click import of unmanaged resources to Terraform
ControlMonkey’s Resource Explorer also serves as your Terraform knowledge base, providing your team an easy way to locate Terraform code across your Git repositories regardless of specific team member seniority or tenure within the organization.
Harness terraform to its full potential, maximize your terraform coverage, and achieve secure and compliant AWS environments.
A 30-min meeting will save your team 1000s of hours
A 30-min meeting will save your team 1000s of hours
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Animi architecto consequuntur dicta dolor, excepturi ipsam iste laudantium, magnam molestiae obcaecati odio quam quas repellendus sed, sint magnam molestiae.
Today ControlMonkey is pleased to announce that we have reinforced our “Import to Terraform” solution with the capability to Import AWS CodeBuild resources to Terraform.
AWS CodeBuild is a fully managed integration service that compiles source code, runs tests, and produces ready-to-use software packages.
However, when managing CodeBuild in a manual ClickOps methodology, and not through Terraform Code, the risk factor of misconfigurations increases.
Since CodeBuild is a crucial component for delivering applications and services to production, any misconfiguration of it may critically affect the Software Delivery process, which in turn slows down business.
With ControlMonkey, DevOps can easily import and manage their CodeBuild:
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Animi architecto consequuntur dicta dolor, excepturi ipsam iste laudantium, magnam molestiae obcaecati odio quam quas repellendus sed, sint magnam molestiae.
Today ControlMonkey is pleased to announce that we have reinforced our “Import to Terraform” solution with the capability to Import CloudWatch Alarms and Dashboards to Terraform.
AWS CloudWatch is a great solution to monitor your Application and Infrastructure health with collected metrics.
However, configuring the alerts and dashboards can be a long and mundane process, so shifting the configuration to Terraform is an easy way to manage and replicate your CloudWatch alarms and metrics.
The benefits of managing the alarm and dashboard configuration with Terraform:
Every change in the configuration goes through a structured review process that prevents issues in monitoring production environments.
The ability to easily replicate configured alarms to other resources. e.g. Let’s say you’re spinning up 5 new load balancers, rather than manually configuring the CloudWatch metrics for each one individually, With Terraform you can easily replicate the configuration to all load balancers simultaneously.
In case someone changes the dashboard configuration and you want to roll it back, if the configuration is managed by Terraform, you can do that swiftly.
So if you’re running CloudWatch with multiple alarms and dashboards, now’s the time to manage it with Terraform.
A 30-min meeting will save your team 1000s of hours
A 30-min meeting will save your team 1000s of hours
Lorem ipsum dolor sit amet, consectetur adipisicing elit. Animi architecto consequuntur dicta dolor, excepturi ipsam iste laudantium, magnam molestiae obcaecati odio quam quas repellendus sed, sint magnam molestiae.