Marketplace

detecting-infrastructure-drift

Execute use when detecting infrastructure drift from desired state. Trigger with phrases like "check for drift", "infrastructure drift detection", "compare actual vs desired state", or "detect configuration changes". Identifies discrepancies between current infrastructure and IaC definitions using terraform plan, cloudformation drift detection, or manual comparison.

allowed_tools: Read, Write, Edit, Grep, Glob, Bash(terraform:*), Bash(aws:*), Bash(gcloud:*)

$ Installer

git clone https://github.com/jeremylongshore/claude-code-plugins-plus-skills /tmp/claude-code-plugins-plus-skills && cp -r /tmp/claude-code-plugins-plus-skills/plugins/devops/infrastructure-drift-detector/skills/detecting-infrastructure-drift ~/.claude/skills/claude-code-plugins-plus-skills

// tip: Run this command in your terminal to install the skill


name: detecting-infrastructure-drift description: | Execute use when detecting infrastructure drift from desired state. Trigger with phrases like "check for drift", "infrastructure drift detection", "compare actual vs desired state", or "detect configuration changes". Identifies discrepancies between current infrastructure and IaC definitions using terraform plan, cloudformation drift detection, or manual comparison. allowed-tools: Read, Write, Edit, Grep, Glob, Bash(terraform:), Bash(aws:), Bash(gcloud:*) version: 1.0.0 author: Jeremy Longshore jeremy@intentsolutions.io license: MIT

Infrastructure Drift Detector

This skill provides automated assistance for infrastructure drift detector tasks.

Prerequisites

Before using this skill, ensure:

  • Infrastructure as Code (IaC) files are up to date in {baseDir}
  • Cloud provider CLI is installed and authenticated
  • IaC tool (Terraform/CloudFormation/Pulumi) is installed
  • Remote state storage is configured and accessible
  • Appropriate read permissions for infrastructure resources

Instructions

  1. Identify IaC Tool: Determine if using Terraform, CloudFormation, Pulumi, or ARM
  2. Fetch Current State: Retrieve actual infrastructure state from cloud provider
  3. Load Desired State: Read IaC configuration from {baseDir}/terraform or equivalent
  4. Compare States: Execute drift detection command for the IaC platform
  5. Analyze Differences: Identify added, modified, or removed resources
  6. Generate Report: Create detailed report of drift with affected resources
  7. Suggest Remediation: Provide commands to resolve drift (apply or import)
  8. Document Findings: Save drift report to {baseDir}/drift-reports/

Output

Generates drift detection reports:

Terraform Drift Report:

Drift Detection Report - 2025-12-10 10:30:00
==============================================

Resources with Drift: 3

1. aws_instance.web_server
   Status: Modified
   Drift: instance_type changed from "t3.micro" to "t3.small"
   Action: Update IaC to match or revert instance type

2. aws_s3_bucket.assets
   Status: Modified
   Drift: versioning_enabled changed from true to false
   Action: Re-enable versioning or update IaC

3. aws_iam_role.lambda_exec
   Status: Deleted
   Drift: Role no longer exists in AWS
   Action: terraform apply to recreate

Remediation Command:
terraform plan -out=drift-fix.tfplan
terraform apply drift-fix.tfplan

CloudFormation Drift:

StackName: production-vpc
DriftStatus: DRIFTED
Resources:
  - LogicalResourceId: VPC
    ResourceType: AWS::EC2::VPC
    DriftStatus: IN_SYNC
  - LogicalResourceId: PublicSubnet
    ResourceType: AWS::EC2::Subnet
    DriftStatus: MODIFIED
    PropertyDifferences:
      - PropertyPath: /Tags
        ExpectedValue: [{Key: Env, Value: prod}]
        ActualValue: [{Key: Env, Value: production}]

Error Handling

Common issues and solutions:

State Lock Error

  • Error: "Error acquiring state lock"
  • Solution: Ensure no other terraform process is running, or force-unlock if safe

Authentication Failure

  • Error: "Unable to authenticate to cloud provider"
  • Solution: Refresh credentials with aws configure or gcloud auth login

Missing State File

  • Error: "No state file found"
  • Solution: Initialize terraform with terraform init or specify remote backend

Permission Denied

  • Error: "Access denied reading resource"
  • Solution: Grant read-only IAM permissions to service account

State Version Mismatch

  • Error: "State file version too new"
  • Solution: Upgrade Terraform version or use compatible state version

Resources

Overview

This skill provides automated assistance for the described functionality.

Examples

Example usage patterns will be demonstrated in context.

Repository

jeremylongshore
jeremylongshore
Author
jeremylongshore/claude-code-plugins-plus-skills/plugins/devops/infrastructure-drift-detector/skills/detecting-infrastructure-drift
878
Stars
101
Forks
Updated3d ago
Added4d ago