mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#terraform

8 Beiträge6 Beteiligte0 Beiträge heute

so uh there's an #MCP server for #terraform now. it's in macOS homebrew, from the repo description for `tfmcp`:

> 🌍 Terraform Model Context Protocol (MCP) Tool - An experimental CLI tool that enables AI assistants to manage and operate Terraform environments. Supports reading Terraform configurations, analyzing plans, applying configurations, and managing state with Claude Desktop integration. ⚡

#claude once again waving back at me.
github.com/nwiizo/tfmcp

🌍 Terraform Model Context Protocol (MCP) Tool - An experimental CLI tool that enables AI assistants to manage and operate Terraform environments. Supports reading Terraform configurations, analyzin...
GitHubGitHub - nwiizo/tfmcp: 🌍 Terraform Model Context Protocol (MCP) Tool - An experimental CLI tool that enables AI assistants to manage and operate Terraform environments. Supports reading Terraform configurations, analyzing plans, applying configurations, and managing state with Claude Desktop integration. ⚡️🌍 Terraform Model Context Protocol (MCP) Tool - An experimental CLI tool that enables AI assistants to manage and operate Terraform environments. Supports reading Terraform configurations, analyzin...

New Open-Source Tool Spotlight 🚨🚨🚨

tfmcp simplifies Terraform management by letting AI assistants like Claude Desktop handle config, plans, and state via the Model Context Protocol (MCP). Built with Rust, it offers robust security, Docker support, and detailed analysis. ⚙️ #Terraform #DevOps

🔗 Project link on #GitHub 👉 github.com/nwiizo/tfmcp

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

I love #regex based tools like sed.

Customer wanted me to set up some automation to capture what it was they had previously been doing by hand. One of those hand-jammed components was a custom
#RDS parameter-group that they'd attached to their reference (#postgresql) database. There were a couple-hundred settings in it, so I wasn't jazzed about trying to hand-capture that into a #Terraform or #Ansible workflow.

However, I was able to automate ganking their hand-jammed content and replicate it in a
#Terraform template. First, I combined a couple, nested aws rds … queries to fetch the data. The I wrote a multi-line sed filter to reformat the aws rds … queries' JSON output into TF-compatible config stanzas. Ran the resulting TF module through terraform fmt, terraform validate and then a terraform apply and I suddenly had a new RDS parameter-group in my dev-account that seemingly mirrors what was in the customer's production account. All told, took about half an hour to get the aws queries and, especially, the sed commands worked out. It had initially looked like it might have taken me all day (had I not been able to pipeline it).