How IaC drift detection works
InfraAudit parses the declarations
InfraAudit statically parses the file and extracts declared resource types, names, and configuration attributes.
Resources are matched to live inventory
Each declared resource is matched to a corresponding live resource already discovered by your connected providers.
Attributes are compared
InfraAudit diffs the declared configuration attributes against the live values.
InfraAudit parses
.tf files statically. It does not run terraform plan, connect to your Terraform state backend, or require Terraform to be installed.Upload Terraform files
- UI
- CLI
- API
Upload the file
Upload your
.tf file or a ZIP containing multiple .tf files. Optionally add a name like main/vpc for easy identification.View IaC drift results
After uploading, click the definition in the IaC list. Each uploaded definition shows:- Upload timestamp and parse status (success, or parse error with line details)
- Number of resources declared in the file
- Number of resources successfully matched to live inventory
- Number of IaC drift findings
Supported resource types
InfraAudit matches Terraform resources to live inventory by type and identifier:| Terraform resource type | Matched on |
|---|---|
aws_instance | Instance ID or name tag |
aws_s3_bucket | Bucket name |
aws_db_instance | DB identifier |
aws_lambda_function | Function name |
aws_security_group | Security group ID |
google_compute_instance | Instance name |
azurerm_virtual_machine | VM name |
CI/CD integration
Run IaC drift detection automatically in your Terraform deployment pipeline to catch drift before it causes problems:Notes
- Variables and dynamic references in
.tffiles are resolved where possible (literal values only). Expressions that depend onterraform.tfvarsor runtime data are left unresolved and excluded from comparison. - Sensitive attributes such as passwords and secrets are redacted in drift reports.
- For continuous monitoring, upload updated
.tffiles as part of your CI/CD pipeline after each deployment.