Skip to content

Commit 3b6661b

Browse files
committed
Apply critical fact-checking updates based on verification
- Replace deprecated Google Cloud Deployment Manager with Infrastructure Manager - Add deprecation notice for CDM (EOL December 31, 2025) - Update Google Cloud Infrastructure Manager as modern Terraform-based replacement - Refine Crossplane description for accuracy (Cloud-Native Framework for Platform Engineering) - Update KICS statistics (2400+ queries, 15+ platforms vs previous claims) - Add Terraform code example for Infrastructure Manager - Remove redundant deprecated tool section for cleaner organization All changes based on systematic fact-checking of official documentation and repositories.
1 parent a706faa commit 3b6661b

File tree

1 file changed

+41
-29
lines changed
  • content/blog/infrastructure-as-code-tools

1 file changed

+41
-29
lines changed

content/blog/infrastructure-as-code-tools/index.md

Lines changed: 41 additions & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ This guide covers the following infrastructure as code tools and platforms:
7070
- **[AWS CloudFormation](#aws-cloudformation)** - Native AWS integration
7171
- **[Terragrunt](#terragrunt)** - Terraform orchestration wrapper
7272
- **[Azure Resource Manager](#azure-resource-manager)** - Azure-native templates
73-
- **[Google Cloud Deployment Manager](#google-cloud-deployment-manager)** - GCP-native IaC
73+
- **[Google Cloud Infrastructure Manager](#google-cloud-infrastructure-manager)** - Modern GCP IaC with Terraform
7474
- **[Crossplane](#crossplane)** - Kubernetes as universal control plane
7575
- **[Kubernetes Operators](#kubernetes-operators)** - Application-specific controllers
7676
- **[Ansible](#ansible)** - Agentless automation platform
@@ -430,49 +430,61 @@ Code Example:
430430
}
431431
```
432432

433-
### Google Cloud Deployment Manager
433+
### Google Cloud Infrastructure Manager
434434

435435
License: Proprietary (Google Service)
436-
Best For: Google Cloud Platform deployments requiring native integration
436+
Best For: Google Cloud Platform deployments using Terraform
437437

438-
Google Cloud Deployment Manager enables infrastructure as code specifically for Google Cloud Platform resources using YAML, Python, or Jinja2 templates.
438+
Google Cloud Infrastructure Manager automates the deployment and management of Google Cloud infrastructure resources using Terraform configurations, representing Google's modern approach to infrastructure as code. Infrastructure Manager replaces the deprecated Google Cloud Deployment Manager (which reaches end of support on December 31, 2025).
439439

440440
Key Features:
441441

442-
- **GCP-native**: Full Google Cloud Platform service support
443-
- **Multiple template formats**: YAML, Python, or Jinja2
444-
- **Deployment previews**: Preview changes before applying
445-
- **Integration**: Works with other Google Cloud tools and services
442+
- **Terraform-based**: Uses standard Terraform configurations declaratively
443+
- **Automated workflows**: Handles Terraform init, validate, and apply operations
444+
- **Version control integration**: Supports Git repositories and Cloud Storage
445+
- **Deployment tracking**: Comprehensive metadata storage and logging
446+
- **Multiple Terraform versions**: Flexibility in Terraform version selection
447+
- **Cloud Build integration**: Leverages Google Cloud Build for execution environment
448+
- **Migration path**: Provides upgrade path from legacy Cloud Deployment Manager
446449

447450
Code Example:
448451

449-
```yaml
450-
resources:
451-
- name: my-vm
452-
type: compute.v1.instance
453-
properties:
454-
zone: us-central1-a
455-
machineType: zones/us-central1-a/machineTypes/n1-standard-1
456-
disks:
457-
- deviceName: boot
458-
type: PERSISTENT
459-
boot: true
460-
autoDelete: true
461-
initializeParams:
462-
sourceImage: projects/debian-cloud/global/images/family/debian-11
463-
networkInterfaces:
464-
- network: global/networks/default
465-
accessConfigs:
466-
- name: External NAT
467-
type: ONE_TO_ONE_NAT
452+
```hcl
453+
# main.tf - Terraform configuration for Infrastructure Manager
454+
resource "google_compute_instance" "vm_instance" {
455+
name = "my-vm"
456+
machine_type = "e2-medium"
457+
zone = "us-central1-a"
458+
459+
boot_disk {
460+
initialize_params {
461+
image = "debian-cloud/debian-11"
462+
}
463+
}
464+
465+
network_interface {
466+
network = "default"
467+
access_config {
468+
// Ephemeral public IP
469+
}
470+
}
471+
472+
metadata = {
473+
startup-script = "echo Hello from Infrastructure Manager!"
474+
}
475+
}
476+
477+
output "instance_ip" {
478+
value = google_compute_instance.vm_instance.network_interface[0].access_config[0].nat_ip
479+
}
468480
```
469481

470482
### Crossplane
471483

472484
License: Apache 2.0
473485
Best For: Kubernetes-first organizations managing multi-cloud infrastructure
474486

475-
Crossplane transforms Kubernetes into a universal control plane for infrastructure, allowing teams to provision and manage cloud resources using Kubernetes APIs and patterns.
487+
Crossplane is a Cloud-Native Framework for Platform Engineering that extends Kubernetes to help organizations build custom infrastructure management platforms, allowing teams to provision and manage cloud resources using Kubernetes APIs and patterns.
476488

477489
Key Features:
478490

@@ -871,7 +883,7 @@ While the tools above focus on provisioning and managing infrastructure, a compl
871883
Static analysis tool for infrastructure as code that scans cloud infrastructure configurations for security and compliance issues. Supports Terraform, CloudFormation, Kubernetes, Helm, ARM templates, and more. Integrates with CI/CD pipelines and provides over 1000+ built-in policies covering CIS benchmarks, PCI DSS, and GDPR compliance.
872884
873885
**KICS (Keeping Infrastructure as Code Secure)** - License: Apache 2.0
874-
Open-source static analysis tool that finds security vulnerabilities and compliance issues in infrastructure code. Supports 25+ platforms including Terraform, CloudFormation, Kubernetes, Docker, and Ansible. Features over 2000+ queries for detecting misconfigurations and security vulnerabilities.
886+
Open-source static analysis tool that finds security vulnerabilities and compliance issues in infrastructure code. Supports 15+ platforms including Terraform, CloudFormation, Kubernetes, Docker, and Ansible. Features over 2400 queries for detecting misconfigurations and security vulnerabilities.
875887
876888
**Terrascan** - License: Apache 2.0
877889
Static code analyzer for Infrastructure as Code that detects compliance and security violations across cloud native technologies. Supports 500+ policies for security best practices and compliance standards including SOC 2, PCI DSS, GDPR, and HIPAA. Integrates with admission controllers for Kubernetes.

0 commit comments

Comments
 (0)