Times are changing and more and more organizations are shifting workloads to the cloud, accelerating the cycle of ever-evolving technologies in the cloud. The cloud makes it extremely easy to manage and provision infrastructure in speed and scale, but it comes with its own complexities. As cloud service providers offer such a vast array of options, selecting the right resources for applications gets more complex, stress inducing, time-consuming, and costly.
Infrastructure as Code (IaC) tools such as Terraform are used to simplify and automate infrastructure changes. Terraform provides a simple yet powerful way to request cloud infrastructure at the code level, but it also comes with a cost – Infrastructure changes at any level can cause havoc and chaos if done wrong. Wrong means making small mistakes that might seem minute but can have serious consequences on your entire cloud platform.
Using the right tool to simulate and make sure there are no mistakes means being responsible in the cloud. There are many factors that may cause unexpected behaviors and outages. In fact, most outages are caused by human error in configuration changes.
Lightlytics innovative CloudTwin engine creates a real-time simulated model of the cloud environment and dynamically correlates the dependencies between configurations, services, infrastructure and activity logs.
Our simulation engine merges the current configuration state of your cloud in combination with the Terraform code proposed change, to determine how your cloud is going to be impacted if the code will be deployed, helping you to check if intent is met, prevent downtime and other misconfigurations to eliminate critical mistakes before they are deployed by continuously simulating changes as part of the GitOps flow. Lightlytics comes out of the box with dozens of predefined best practices for Availability, Security, Compliance and Cost (Architectural Standards). Each best practice is validated every time a change is made.
Amazon Relational Database Service is a distributed relational database service by Amazon Web Services. It is a web service running "in the cloud" designed to simplify the setup, operation, and scaling of a relational database for use in applications.
The example below contains a non-encrypted publicly accessible RDS instance in a single AZ using a default port for accepting DB connections. RDS database instances should be encrypted to fulfill compliance requirements for data-at-rest encryption.It's significantly important in production databases that store sensitive information. This configuration is critical and is often overlooked and results in data leaks, which can be your worst nightmare.
When your RDS instance is public, it provides unrestricted access for anyone and everyone to establish a connection to your database. Having this misconfiguration is an open invitation to brute-force attacks, DDoS attacks, and SQL injections.
Misconfigured Terraform code for simulation:
In the left sidebar, you will find general details and meta-data of the simulation run such as time and date, the Version Control or CI platform the simulation was triggered from, PR and Commit ID, source and dest branches, and a summary of the number of resources that will be changed on apply.
The change summary tab shows details about the changes that are about to be made to a resource configuration and the impact the change will have on a given environment.
In our example, we can see various changes affecting the RDS instance, making it having common misconfigurations:
The simulation alerts us about common RDS misconfiguration such as:
(Critical) Ensure RDS database instances have storage encryption enabled
(Critical) Ensure RDS database instances are not accessible via Internet (Network and API)
(Warning) Ensure RDS instances have Storage AutoScaling feature enabled
(Warning) Ensure RDS instances have Multi-AZ enabled
(Info) Resource has access to RDS database
(Info) Ensure RDS database instances have Copy Tags to Snapshots enabled
(Info) Ensure RDS is not using the default port 3306
(Info) Ensure RDS MySQL and PostgreSQL database instances have Performance Insights feature enabled
A summary of all of the impacts that the configuration change will have on the environment.
You can click on any group of resources to view all the relevant paths.
In the example below, we can see the RDS instance is internet exposed via the allowed default port (3306)
In addition, we can explore new connections from various resources within the cloud environment, such as Lambda function, Auto Scaling groups, EC2 instances, EKS cluster and more:
To get more context and understand how these changes is going to impact your cloud environment in terms of reachability, network connectivity, exposure paths and accessibility, you can review the impacts by Topology:
Or by Edges:
A real time CloudTwin is the most efficient way to simulate changes and predict the outcome. This series will explore just a few of the ways a CloudTwin can solve complexities in your cloud and help you prevent mistakes before they happen. In the next part of this series we will explore more simulation strategies on a CloudTwin to enable you to get a better understanding of your cloud.
To test-drive our system and see how we make cloud deployment simple and efficient click here