May 2022 Monthly Updates
June 6, 2022
Welcome to CloudQuery’s latest product news! This month we’ve been heads-down working on some new features but most importantly making CloudQuery easier to use no matter if you are a developer/contributor or an operator i.e - DevOps/SRE/Security team.
📈 High Level Metrics
- Number of Releases: 26
- New Resources: 12
- AWS: 9
- GCP: 3
- Bug fixes: 100+
GCP Provider Improvements
Project Auto Discovery: The GCP Provider can now auto-discover all projects under your organization and recursively fetch all the configuration from each project (and project sprawl in GCP is common!). This should significantly simplify CloudQuery configuration and maintenance as well as open-up opportunity to build new workflows and alert on things like project creation.
History and Migration Removal
Sometimes we also remove features instead of adding to ensure we are able to move fast and with quality. This should increase developer velocity, both internally and externally, remove 🐛 as well as open the door to support more databases! Checkout our blog (opens in a new tab) for full explanation.
Store Policy Data in The Database
CloudQuery supports six open-source security & compliance policies implemented in SQL so you can codify your security and compliance posture. With this release you can also store the result in PostgreSQL and enable more workflows downstream like monitoring security results in your favorite BI tool, alerting and much more! To see more checkout the documentation.
Running CloudQuery locally is cool but what is even better is running it remotely with non-ephermal database so everyone in your team can use it, build custom workflows on top, access it directly or via your favorite BI tool. To easy the deployment we release:
- Terraform Module (opens in a new tab) to deploy CloudQuery on AWS
- Terraform Module (opens in a new tab) to deploy CloudQuery on GCP
- Or deploy it directly on k8s with a Helm Chart (opens in a new tab)
Recreating a Deleted SSO IDP (opens in a new tab): A tutorial on how to recover when you accidentally delete your AWS SSO Identity Provider from an important account
AWS Resource View (opens in a new tab): Utilizing CloudQuery data create a view that allows you to see data from all of your AWS Accounts
Connecting CloudQuery Database to a BI Tool: