Terraback: Universal infrastructure scanning and Terraform generation tool
Project description
๐ Terraback
Multi-Cloud Infrastructure as Code Tool
Terraback is an advanced CLI tool that reverse-engineers existing cloud infrastructure into clean, production-ready Terraform code with intelligent dependency discovery.
Transform legacy cloud environments into infrastructure-as-code in minutes, not months.
โจ Why Terraback?
- ๐ฏ 90% Faster: Reduce infrastructure documentation time from weeks to hours
- ๐ง Intelligent Discovery: Automatic dependency mapping across 50+ cloud services
- ๐ข Enterprise-Ready: Production-ready templates with lifecycle management
- Multi-Cloud: Full support for AWS, Azure, and GCP
- ๐ Security-First: Read-only permissions, no credential storage, enterprise compliance
๐ Features
๐ Comprehensive Cloud Coverage
Core Infrastructure (Community Edition - Free):
- AWS: EC2 Instances, VPCs, Subnets, Security Groups, S3 Buckets, IAM Roles
- Azure: Virtual Machines, Virtual Networks, Subnets, Network Security Groups, Storage Accounts
- GCP: Compute Instances, Networks, Subnets, Storage Buckets
- Basic Commands: list, import, scan
- โจ Unlimited core resources
- Basic dependency mapping
Advanced Services (Professional & Enterprise):
AWS Services:
- Container Platform: ECS Clusters, Services, Task Definitions, ECR Repositories
- Advanced Networking: CloudFront CDN, Route 53 DNS, NAT/Internet Gateways, VPC Endpoints
- Database & Caching: RDS instances, ElastiCache Redis/Memcached clusters
- Monitoring & Security: CloudWatch, Auto Scaling, ACM Certificates
- Serverless & APIs: Lambda Functions, API Gateway, SQS, SNS
- Storage: EFS, EBS Volumes/Snapshots, S3 advanced features
- Load Balancing: ALB/NLB with advanced features, listener rules, SSL policies
Azure Services:
- Compute: Virtual Machines with OS detection, Managed Disks, SSH Keys
- Networking: Virtual Networks, Subnets with delegations, NSGs with rules
- Storage: Storage Accounts with blob properties, static websites, encryption
- Load Balancing: Application Gateway, Load Balancers
- Database: Azure SQL, Cosmos DB
- Container: AKS, Container Instances
GCP Services:
- Compute: VM Instances, Persistent Disks, Machine Images
- Networking: VPC Networks, Subnets, Firewall Rules
- Storage: Cloud Storage, Persistent Disks
- Container: GKE Clusters, Node Pools
๐ Intelligent Dependency Discovery
The --with-deps flag automatically discovers and maps complete infrastructure stacks:
# AWS Example
terraback ec2 scan --with-deps
# Automatically finds and scans:
# โโโ VPC and networking (subnets, security groups)
# โโโ Load balancers (ALB, target groups, listeners)
# โโโ Storage (EBS volumes, snapshots)
# โโโ Security (IAM roles, certificates)
# โโโ Monitoring (CloudWatch logs, alarms)
# โโโ All interconnected dependencies
# Azure Example
terraback vm scan --with-deps
# Automatically finds and scans:
# โโโ Virtual Networks and Subnets
# โโโ Network Security Groups with rules
# โโโ Managed Disks and Snapshots
# โโโ Network Interfaces and Public IPs
# โโโ Storage Accounts
# โโโ All interconnected dependencies
๐ Advanced Features
- Performance Optimization: API response caching, parallel scanning, smart dependency resolution
- Multi-Account/Subscription: Scan across multiple AWS accounts or Azure subscriptions
- Module Generation: Create reusable Terraform modules automatically
- State Management: Import existing resources directly into Terraform state
- Compliance Ready: Generate code following HashiCorp and cloud provider best practices
- Name Deduplication: Automatically append numeric suffixes to resource names when duplicates are detected
- SSH Key Sanitization: Generated public keys are collapsed to a single line automatically
๐ฆ Installation
Prerequisites
- Python 3.8+ (for pip installation)
- Terraform 1.0+ (for import functionality)
- Cloud CLI tools:
- AWS:
awsCLI configured - Azure:
azCLI configured and logged in - GCP:
gcloudCLI configured
- AWS:
- (Optional)
xxhashfor faster cache hashing
Install via pip (Recommended)
pip install terraback
Install via Binary
Linux/macOS:
# Linux
curl -L https://dist.terraback.dev.io/releases/latest/terraback-linux -o terraback
chmod +x terraback
sudo mv terraback /usr/local/bin/
# macOS
curl -L https://dist.terraback.dev.io/releases/latest/terraback-macos -o terraback
chmod +x terraback
sudo mv terraback /usr/local/bin/
Windows: Download from releases
๐ Quick Start
AWS Scanning
# Configure AWS credentials (if not already done)
aws configure
# Scan EC2 instances
terraback ec2 scan
# Scan VPC with all dependencies
terraback vpc scan --with-deps
# Scan specific region
terraback ec2 scan --region eu-west-1
# Scan with specific profile
terraback s3 scan --profile production
Azure Scanning
# Login to Azure (if not already done)
az login
# Scan Virtual Machines
terraback vm scan
# Scan entire resource group
terraback vm scan --resource-group production-rg
# Scan specific subscription
terraback vnet scan --subscription-id YOUR-SUBSCRIPTION-ID
# Scan with location filter
terraback storage scan --location westeurope
Multi-Cloud Commands
# Scan all resources (cloud-specific)
terraback scan-all aws --region us-east-1
terraback scan-all azure --resource-group my-rg
terraback scan-all gcp --region us-central1 --cache-ttl 30
# Check authentication status
terraback auth-check
# Use caching for large infrastructures
terraback scan-recursive ec2 --use-cache --cache-ttl 120
terraback scan-recursive vm --use-cache --parallel-workers 10
After scanning completes, Terraback automatically runs terraform fmt, terraform init and terraform validate on the generated code. Use --skip-check with any scan-all command to bypass this validation step. If you skip the checks, run terraback aws scan-all --check (or python -m terraback.utils.template_syntax_fixer <output_dir>) before invoking terraform init manually.
๐ Supported Resources
AWS Resources (Full Support)
| Service | Resources | Status |
|---|---|---|
| EC2 | Instances, Volumes, Snapshots, AMIs, Key Pairs, Launch Templates, Network Interfaces | โ Full Support |
| VPC | VPCs, Subnets, Security Groups, Internet/NAT Gateways, Route Tables, VPC Endpoints | โ Full Support |
| IAM | Roles, Policies, Instance Profiles | โ Full Support |
| S3 | Buckets, Versioning, Lifecycle, ACLs, Policies | โ Full Support |
| RDS | Instances, Subnet Groups, Parameter Groups | โ Full Support |
| Load Balancing | ALB, NLB, CLB, Target Groups, Listeners, SSL Policies | โ Full Support |
| Lambda | Functions, Layers, Permissions | โ Full Support |
| Route 53 | Hosted Zones, Records | โ Full Support |
| CloudWatch | Log Groups, Alarms, Dashboards | โ Full Support |
| Auto Scaling | Groups, Launch Templates, Policies | โ Full Support |
| ECS/ECR | Clusters, Services, Task Definitions, Repositories | โ Full Support |
| CloudFront | Distributions, Origin Access Controls, Cache Policies | โ Full Support |
| ElastiCache | Redis/Memcached Clusters, Parameter Groups | โ Full Support |
| ACM | Certificates | โ Full Support |
| EFS | File Systems, Mount Targets, Access Points | โ Full Support |
| API Gateway | REST APIs, Resources, Methods, Deployments | โ Full Support |
| SQS/SNS | Queues, Topics, Subscriptions | โ Full Support |
| Secrets Manager | Secrets, Versions | โ Full Support |
| Systems Manager | Parameters, Documents | โ Full Support |
Azure Resources
| Service | Resources | Status |
|---|---|---|
| Compute | Virtual Machines, Managed Disks, Availability Sets, SSH Keys | โ Full Support |
| Networking | Virtual Networks, Subnets, Network Security Groups, Network Interfaces | โ Full Support |
| Storage | Storage Accounts, Blob Storage, File Shares | โ Full Support |
| Load Balancing | Load Balancers, Application Gateways | โ Full Support |
| Database | SQL Database, Cosmos DB | โ Full Support |
| Container | AKS, Container Instances | โ Full Support |
| Identity | Managed Identities, Service Principals | โ Full Support |
GCP Resources
| Service | Resources | Status |
|---|---|---|
| Compute Engine | Instances, Disks, Images | โ Full Support |
| VPC | Networks, Subnets, Firewalls | โ Full Support |
| Cloud Storage | Buckets, Objects | โ Full Support |
| GKE | Clusters, Node Pools | โ Full Support |
๐ฏ Advanced Usage
Dependency Scanning
# AWS: Scan EC2 with all dependencies
terraback ec2 scan --with-deps --output-dir ./infrastructure
# Azure: Scan VM with all dependencies
terraback vm scan --with-deps --output-dir ./infrastructure
# Result: Complete infrastructure graph
# โโโ compute/
# โ โโโ instances.tf
# โ โโโ launch_templates.tf
# โโโ networking/
# โ โโโ vpc.tf
# โ โโโ subnets.tf
# โ โโโ security_groups.tf
# โโโ storage/
# โโโ volumes.tf
# โโโ snapshots.tf
Enterprise Module Generation
Transform generated Terraform into production-ready enterprise modules with standardized structure:
# Generate enterprise modules (requires Enterprise license)
terraback scan all aws --enterprise-modules
# Result: Organized module structure
# modules/
# โโโ alb/
# โ โโโ lb.tf
# โ โโโ listeners.tf
# โ โโโ global-accelerator.tf
# โ โโโ variables.tf
# โ โโโ outputs.tf
# โ โโโ locals.tf
# โโโ ecs/
# โ โโโ service/
# โ โโโ ecs-service.tf
# โ โโโ ecs-task-definition.tf
# โ โโโ autoscaling.tf
# โ โโโ variables.tf
# โ โโโ outputs.tf
# โ โโโ locals.tf
# โโโ rds-aurora-postgresql/
# โ โโโ cluster.tf
# โ โโโ instances.tf
# โ โโโ parameter-groups.tf
# โ โโโ variables.tf
# โ โโโ outputs.tf
# โ โโโ locals.tf
# โโโ s3-bucket/
# โโโ bucket.tf
# โโโ policy.tf
# โโโ versioning.tf
# โโโ lifecycle-configuration.tf
# โโโ variables.tf
# โโโ outputs.tf
# โโโ locals.tf
# Works with all providers
terraback scan all azure --enterprise-modules
terraback scan all gcp --enterprise-modules
Features:
- Automatically groups related resources into logical modules
- Creates standard module files (variables.tf, outputs.tf, locals.tf)
- Follows Terraform best practices and naming conventions
- Supports 150+ AWS, Azure, and GCP resource types
- Maintains proper resource dependencies
- Production-ready module structure out of the box
Supported Module Types:
- AWS: ALB, ASG, ECS, RDS, Lambda, S3, CloudFront, OpenSearch, and 40+ more
- Azure: VMs, AKS, App Services, Databases, Networking, Storage, and 30+ more
- GCP: Compute, GKE, Cloud Run, Cloud SQL, Networking, Storage, and 30+ more
Caching & Performance
# Enable caching for large infrastructures
terraback scan-all aws --cache-ttl 45
terraback scan-recursive ec2 --use-cache --cache-ttl 60
# View cache statistics
terraback cache stats
# Clear cache
terraback cache clear
# ``--cache-ttl`` sets how long scan results stay in the on-disk cache
# (in minutes) before expiring. This can dramatically speed up repeated
# ``scan-all`` operations on very large environments.
# For even faster cache hashing install ``xxhash`` (optional). Without it
# Terraback gracefully falls back to ``blake2s``.
# Parallel scanning
terraback scan-recursive vm --parallel-workers 10
Import to Terraform
# List discovered resources
terraback list all
# Import specific resource
terraback ec2 import i-1234567890abcdef0
# Import Azure VM
terraback vm import /subscriptions/xxx/resourceGroups/my-rg/providers/Microsoft.Compute/virtualMachines/my-vm
# Bulk import all resources asynchronously with a progress bar
terraback import-all --async --progress
# Verify account and region before importing
terraback import-all --verify
# Set the Terraform lock timeout to 600 seconds
terraback import-all --lock-timeout 600
# Import using Terraform 1.5+ import blocks
terraback import-all --workflow import-blocks
# Automatically select the optimal workflow
terraback import-all --workflow auto --parallel=8
# Import via Terraform workspaces with 8 parallel workers
terraback import-all --workflow workspaces --parallel=8
# Import using enhanced import blocks in batches of 25
terraback import-all --workflow import-blocks-enhanced --batch-size=25
# Import using parallel workspaces with 10 workers
terraback import-all --workflow parallel-workspaces --parallel=10
Template Formatting Check
After scanning or when editing .tf files manually, run one of the following commands before running terraform init:
terraback aws scan-all --check
# or
python -m terraback.utils.template_syntax_fixer <output_dir>
Before executing these validation commands, ensure the base Python dependencies
are installed. The template checker relies on packages from requirements.txt,
including Jinja2. Install them with:
pip install -r requirements.txt
This prevents "Missing newline after argument" errors.
Example command sequence:
terraback scan-all aws --skip-check --output-dir ./generated
terraback aws scan-all --check
cd generated
terraform init
The --workflow option controls how state is imported:
-
autoโ automatically selects the fastest strategy based on your Terraform version. -
import-blocksโ for Terraform 1.5+ with a local backend, Terraback generatesimportblocks that Terraform applies in a single workspace. -
import-blocks-enhancedโ groups resources into batches and applies each with Terraform. Use--batch-sizeand--parallelto control batch size and parallelism. -
workspacesโ for Terraform <1.5 or when using a remote state backend (S3, GCS, etc.), Terraback imports each resource in its own workspace. -
parallel-workspacesโ runs workspace imports concurrently in temporary directories and merges their state automatically. Controlled by--parallel.
If --workflow is not specified, Terraback automatically chooses the best workflow based on your Terraform version.
Fast & Parallel Workspace Workflows
Terraback provides two high-speed import strategies. The fast workflow
is the default. Resources are processed in batches (controlled by
--batch-size) and the tool automatically chooses between Terraform import
blocks (for Terraform 1.5+) and the temporary workspace approach. When
workspaces are used, each batch is imported concurrently using the number of
workers set by --parallel. The resulting state files are merged together with
merge_states and all workspace_* folders along with plan/debug files are
removed using clean_import_artifacts.
The parallel-workspaces workflow exposes the workspace method directly.
Each resource is imported in its own temporary directory. Once all imports
finish, the states are merged and the temporary directories are deleted.
# Fast workflow with batching and 8 parallel workers
terraback import-all --workflow fast --batch-size=50 --parallel=8
# Parallel workspaces with 10 workers
terraback import-all --workflow parallel-workspaces --parallel=10
โ๏ธ License & Pricing
Terraback uses a multi-tier licensing model:
Community Edition (Free)
- โ Core resources for AWS, Azure, GCP
- โ EC2, VPC, S3 (AWS)
- โ VMs, VNets, Storage (Azure)
- โ Compute, Networks, Storage (GCP)
- โ โจ Unlimited core resources
- โ Basic dependency mapping
- โ Community support via GitHub
- โ Advanced services (RDS, Lambda, etc.)
- โ Multi-account support
Professional License ($499 one-time, lifetime access)
- All 50+ cloud services
- Unlimited resources and accounts
- Advanced dependency mapping
- Multi-account/subscription scanning
- RDS, Lambda, EKS, and more
- Module generation and best practices
- State file management
- Priority email support
- API access for automation
- Lifetime updates included
Enterprise Edition (Coming Soon)
- Everything in Professional
- โ Enterprise Module Generation - Automatic organization into production-ready modules
- โ Annual/multi-year licensing
- โ SSO integration (SAML, OIDC)
- โ Custom resource scanners
- โ On-premise deployment options
- โ SLA with guaranteed uptime
- โ Dedicated training & onboarding
- โ Dedicated customer success manager
- โ Volume licensing & team management
- โ Compliance reporting
๐ Documentation
- Full Documentation
- AWS Scanning Guide
- Azure Scanning Guide
- GCP Scanning Guide
- API Reference
- Examples & Tutorials
- AWS Secrets Manager templates
- Scanning Secrets Manager resources automatically creates a
variables.tffile with asecret_valuevariable stub. - The stub provides a default placeholder so Terraform doesn't prompt during imports.
- Be sure to update this value in a
.tfvarsfile before applying.
Logging
Terraback respects two environment variables for logging:
TERRABACK_LOG_LEVELcontrols the log verbosity (e.g.DEBUGorINFO).TERRABACK_LOG_FILEcan specify a path to write logs to a file.
Set these variables before running any command to adjust log output.
๐ Troubleshooting
AWS Issues
# Check AWS credentials
aws sts get-caller-identity
# Use specific profile
export AWS_PROFILE=production
# Debug mode
terraback ec2 scan --debug
Azure Issues
# Check Azure login
az account show
# Set subscription
az account set --subscription "My Subscription"
# List available subscriptions
az account list --output table
Common Issues
- Permission Denied: Ensure your cloud credentials have read access to resources
- Rate Limiting: Use
--use-cacheflag for large infrastructures - Module Not Found: Install with
pip install -e .for development
๐ Roadmap
- AWS support (50+ services)
- Azure support (Core services)
- GCP support (Core services)
- Terraform module generation
- Web UI dashboard
- CI/CD integrations
๐๏ธ Template System
Terraback generates Terraform files from a collection of Jinja2 templates. All
provider templates inherit from templates/common/base_resource.tf.j2, giving
them a shared set of helper macros and a common block to override. To create a
new template, extend the base file and implement the resources block:
{% extends "common/base_resource.tf.j2" %}
{% from "common/base_resource.tf.j2" import render_common_tags %}
{% block resources %}
resource "aws_my_service" "{{ item.name | tf_resource_name }}" {
name = "{{ item.name }}"
{{ render_common_tags(item, indent=2) }}
}
{% endblock %}
Complex-data macros
templates/common/macros.j2 exposes utilities for rendering lists and nested
structures. Examples include:
render_block_listโ iterate over complex objects and emit nested blocksrender_json_listโ output JSON formatted listsrender_depends_onโ add adepends_onarray when dependencies exist
These macros keep templates concise while handling deeply nested data.
Automatic dependency generation
During scanning Terraback records relationships between resources. When a
template uses render_depends_on, the discovered dependencies are inserted
automatically. For example:
resource "aws_launch_template" "example" {
...
{{ macros.render_depends_on(template.depends_on, indent=2) }}
}
If an IAM role and security group were detected as dependencies, the rendered Terraform code becomes:
depends_on = [
aws_iam_role.example_role,
aws_security_group.example_sg,
]
Terraback calculates these relationships automatically, but you can still supply
additional items in the depends_on list to enforce custom ordering.
๐งช Development & Testing
Install the additional packages used by the test suite:
pip install -r requirements-dev.txt
Then run all tests from the project root:
pytest
๐ Line Endings
This project enforces LF line endings for all text files. Git uses .gitattributes to normalize line endings and a pre-commit hook (end-of-file-fixer) ensures files end with a single newline.
๐ Support
- Community: GitHub Discussions
- Issues & Feature Requests: GitHub Issues
- Professional Support: support@terraback.io
- Enterprise Sales: sales@terraback.io
๐ Acknowledgments
Built with โค๏ธ by DevOps engineers who understand the pain of manual cloud documentation.
Copyright ยฉ 2025 Terraback
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file terraback-0.5.0.tar.gz.
File metadata
- Download URL: terraback-0.5.0.tar.gz
- Upload date:
- Size: 551.7 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.14
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
62c782d5593a61542759ff5a5f93d332a37597b471b9c7c1baa77a9cb50fd16d
|
|
| MD5 |
cbda0008f0bfcb35220e599d0160d2e4
|
|
| BLAKE2b-256 |
70a269abac791bc3f753479095fb2ab8d74c6a6a9ff5f0dde23b111679979be1
|
File details
Details for the file terraback-0.5.0-py3-none-any.whl.
File metadata
- Download URL: terraback-0.5.0-py3-none-any.whl
- Upload date:
- Size: 874.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.14
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
1dbd9ee5bd351085d527f270b156cbfc7a99560d59900ebbcb273496a64d038d
|
|
| MD5 |
d6eef2ade91fe9478b1598b160efeb59
|
|
| BLAKE2b-256 |
5e01a3ed8da181d35ce8e479ac0c2c5bf5c5de83c08e3e67f3b9a7faaea74b4d
|