Titan Core: Snowflake infrastructure as code
Project description
titan core
- Snowflake infrastructure as code
Titan Core helps you provision, deploy, and secure resources in Snowflake. It replaces tools like Terraform, Schemachange, or Permifrost.
Deploy any Snowflake resource, including users, roles, schemas, databases, integrations, pipes, stages, functions, stored procedures, and more. Convert adhoc, bug-prone SQL management scripts into simple, repeatable configuration.
Titan Core is for:
- DevOps engineers looking to automate and manage Snowflake infrastructure.
- Analytics engineers working with dbt who want to manage Snowflake resources without macros.
- Data platform teams who need to reliably manage Snowflake with CI/CD.
- Organizations that prefer a git-based workflow for infrastructure management.
- Teams seeking to replace Terraform for Snowflake-related tasks.
╔══════════╗ ╔═══════════╗
║ CONFIG ║ ║ SNOWFLAKE ║
╚══════════╝ ╚═══════════╝
┏━━━━━━━━━━━┓ ┏━━━━━━━━━━━┓
┌─┫ WAREHOUSE ┣─────┐ ┌─┫ WAREHOUSE ┣───────────┐
│ ┗━━━━━━━━━━━┛ │ ALTER │ ┗━━━━━━━━━━━┛ │
│ name: ETL │─────┐ ┌─ WAREHOUSE ─▶│ name: ETL │
│ auto_suspend: 60 │ │ │ │ auto_suspend: 300 -> 60 │
└───────────────────┘ ╔══▼═══════════╩═╗ └─────────────────────────┘
║ ║
║ TITAN CORE ║
┏━━━━━━┓ ║ ║ ┏━━━━━━┓
┌─┫ ROLE ┣──────────┐ ╚══▲═══════════╦═╝ ┌─┫ ROLE ┣────────────────┐
│ ┗━━━━━━┛ │ │ │ │ ┗━━━━━━┛ │
│ name: TRANSFORMER │─────┘ └─ CREATE ────▶│ name: TRANSFORMER │
└───────────────────┘ ROLE └─────────────────────────┘
Key Features
-
Declarative » Generates the right SQL to make your config and account match
-
Comprehensive » Nearly every Snowflake resource is supported
-
Flexible » Write resource configuration in YAML or Python
-
Fast » Titan Core runs 50-90% faster than Terraform and Permifrost
-
Migration-friendly » Generate config automatically with the export CLI
Open Source
This project is licensed under the Apache 2.0 License - see LICENSE for details. The source code for Titan Core is available on Github.
Documentation
You can find comprehensive Titan Core documentation on GitBook.
Getting Started
If you're new, the best place to start is with the Python package.
Install from PyPi (MacOS, Linux)
python -m venv .venv
source .venv/bin/activate
python -m pip install titan-core
Install from PyPi (Windows)
python -m venv .venv
.\.venv\Scripts\activate
python -m pip install titan-core
Python example
import os
import snowflake.connector
from titan.blueprint import Blueprint, print_plan
from titan.resources import Grant, Role, Warehouse
# Configure resources by instantiating Python objects.
role = Role(name="transformer")
warehouse = Warehouse(
name="transforming",
warehouse_size="large",
auto_suspend=60,
)
usage_grant = Grant(priv="usage", to=role, on=warehouse)
# Titan compares your config to a Snowflake account. Create a Snowflake
# connection to allow Titan to connect to your account.
connection_params = {
"account": os.environ["SNOWFLAKE_ACCOUNT"],
"user": os.environ["SNOWFLAKE_USER"],
"password": os.environ["SNOWFLAKE_PASSWORD"],
"role": "SYSADMIN",
}
session = snowflake.connector.connect(**connection_params)
# Create a Blueprint and pass your resources into it. A Blueprint helps you
# validate and deploy a set of resources.
bp = Blueprint(resources=[
role,
warehouse,
usage_grant,
])
# Blueprint works like Terraform. Calling plan(...) will compare your config
# to the state of your Snowflake account and return a list of changes.
plan = bp.plan(session)
print_plan(plan) # =>
"""
» titan core
» Plan: 4 to add, 0 to change, 0 to destroy.
+ urn::ABCD123:warehouse/transforming {
+ name = "transforming"
+ owner = "SYSADMIN"
+ warehouse_type = "STANDARD"
+ warehouse_size = "LARGE"
...
}
+ urn::ABCD123:role/transformer {
+ name = "transformer"
+ owner = "USERADMIN"
+ tags = None
+ comment = None
}
+ urn::ABCD123:grant/TRANSFORMER?priv=USAGE&on=warehouse/TRANSFORMING {
+ priv = "USAGE"
+ on = "transforming"
+ on_type = "WAREHOUSE"
+ to = TRANSFORMER
...
}
"""
# Calling apply(...) will convert your plan into the right set of SQL commands
# and run them against your Snowflake account.
bp.apply(session, plan) # =>
"""
[TITAN_USER:SYSADMIN] > USE SECONDARY ROLES ALL
[TITAN_USER:SYSADMIN] > CREATE WAREHOUSE TRANSFORMING warehouse_type = STANDARD ...
[TITAN_USER:SYSADMIN] > USE ROLE USERADMIN
[TITAN_USER:USERADMIN] > CREATE ROLE TRANSFORMER
[TITAN_USER:USERADMIN] > USE ROLE SYSADMIN
[TITAN_USER:SYSADMIN] > GRANT USAGE ON WAREHOUSE transforming TO TRANSFORMER
"""
Using the CLI
You can use the CLI to generate a plan, apply a plan, or export resources. To use the CLI, install the Python package and call python -m titan
from the command line.
The CLI allows you to plan
and apply
a Titan Core YAML config. You can specify a single input file or a directory of configs.
In addition to plan
and apply
, the CLI also allows you to export
resources. This makes it easy to generate a config for an existing Snowflake environment.
To connect with Snowflake, the CLI uses environment variables. The following `are supported:
SNOWFLAKE_ACCOUNT
SNOWFLAKE_USER
SNOWFLAKE_PASSWORD
SNOWFLAKE_DATABASE
SNOWFLAKE_SCHEMA
SNOWFLAKE_ROLE
SNOWFLAKE_WAREHOUSE
SNOWFLAKE_MFA_PASSCODE
SNOWFLAKE_AUTHENTICATOR
CLI Example
Show the help message
titan --help
# Usage: titan [OPTIONS] COMMAND [ARGS]...
#
# titan core helps you manage your Snowflake environment.
#
# Options:
# --help Show this message and exit.
#
# Commands:
# apply Apply a resource config to a Snowflake account
# connect Test the connection to Snowflake
# export Generate a resource config for existing Snowflake resources
# plan Compare a resource config to the current state of Snowflake
Apply a resource config to Snowflake
# Create a resource config file
cat <<EOF > titan.yml
roles:
- name: transformer
warehouses:
- name: transforming
warehouse_size: LARGE
auto_suspend: 60
grants:
- to_role: transformer
priv: usage
on_warehouse: transforming
EOF
# Set connection variables
export SNOWFLAKE_ACCOUNT="my-account"
export SNOWFLAKE_USER="my-user"
export SNOWFLAKE_PASSWORD="my-password"
# Generate a plan
titan plan --config titan.yml
# Apply the config
titan apply --config titan.yml
Export existing Snowflake resources to YAML.
titan export \
--resource=warehouse,grant,role \
--out=titan.yml
The Titan Core Python package installs the CLI script titan
. You can alternatively use Python CLI module syntax if you need fine-grained control over the Python environment.
python -m titan plan --config titan.yml
Using the GitHub Action
The Titan Core GitHub Action allows you to automate the deployment of Snowflake resources using a git-based workflow.
GitHub Action Example
-- .github/workflows/titan.yml
name: Deploy to Snowflake with Titan
on:
push:
branches: [ main ]
paths:
- 'titan/**'
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Deploy to Snowflake
uses: Titan-Systems/titan-core-action@main
with:
run-mode: 'create-or-update'
resource-path: './titan'
allowlist: 'warehouse,role,grant'
dry-run: 'false'
env:
SNOWFLAKE_ACCOUNT: ${{ secrets.SNOWFLAKE_ACCOUNT }}
SNOWFLAKE_USER: ${{ secrets.SNOWFLAKE_USER }}
SNOWFLAKE_PASSWORD: ${{ secrets.SNOWFLAKE_PASSWORD }}
SNOWFLAKE_ROLE: ${{ secrets.SNOWFLAKE_ROLE }}
SNOWFLAKE_WAREHOUSE: ${{ secrets.SNOWFLAKE_WAREHOUSE }}
Titan Core Limitations
- Titan Core uses names as unique identifiers. Renaming a resource will create a new one.
- Titan Core is not an ORM. It's not built to replace tools like SQLAlchemy.
- Titan Core is under active development. Some resources are not yet supported.
titan core
vs other tools
Feature | Titan Core | Terraform | Schemachange | Permifrost | SnowDDL |
---|---|---|---|---|---|
Plan and Execute Changes | ✅ | ✅ | ❌ | ✅ | ✅ |
Declarative Config | ✅ | ✅ | ❌ | ✅ | ✅ |
No State File Dependency | ✅ | ❌ | ✅ | ✅ | ✅ |
Python-Based Definitions | ✅ | w/ CDKTF | ❌ | ❌ | ✅ |
SQL Support | ✅ | ❌ | ✅ | ❌ | ❌ |
Dynamic Role Switching | ✅ | ❌ | N/A | ❌ | ❌ |
Export Snowflake resources | ✅ | ❌ | ❌ | ❌ | ❌ |
titan core
vs Terraform
Terraform is an infrastructure-as-code tool using the HCL config language.
The Snowflake provider for Terraform is limited to 1 role per provider. This limitation is at odds with Snowflake's design, which is built to use multiple roles. This mismatch forces you into a complex multi-provider setup which can result in drift, permission errors, and broken plans.
Titan Core streamlines this with dynamic role switching. Titan Core automatically detects which role is needed for a given change, and switches to that role before making it. This speeds up development cycles and helps eliminate the use of ACCOUNTADMIN
.
Titan Core doesn't use a state file. This provides more accurate plans and eliminates issues with stale state.
titan core
vs Schemachange
Schemachange is a database migration tool based on Flyway. It uses SQL scripts to deploy resources to different environments.
Schemachange is an imperative migration tool. For developers, that means you must know Snowflake's current state and the exact SQL commands needed to update it to the desired state. If environments get changed outside of the tool, your migration scripts may need significant adjustments.
Titan Core simplifies this with a declarative approach. With Titan Core, just define what an environment should look like, you don't need to know the detailed steps or SQL commands needed to get there.
Declarative config is less error-prone and more scalable, especially in dynamic and complex data environments.
titan core
vs Permifrost
Permifrost is an access-management tool for Snowflake. It helps you automate the creation of users, roles, and grants. Permifrost only manages permissions, it doesn't manage any other aspect of your Snowflake account.
Permifrost can be very slow. Running simple Permifrost configs can take minutes to run. Titan Core is designed to run in seconds, even with complex environments.
titan core
vs SnowDDL
SnowDDL is a declarative object management tool for Snowflake, similar to Titan Core. It uses a streamlined permissions model that simplifies granting read and write access to databases and schemas.
SnowDDL takes a strongly opinionated stance on roles in Snowflake. If you don't need a 3-tier role heirarchy, SnowDDL may not be a good fit.
Resource support
Legend
- ✅ Supported
- 🚧 Unstable
- ❌ Not Yet Supported
Name | Supported |
---|---|
Account Resources | |
Account Parameter | ✅ |
API Integration | ✅ |
Catalog Integration | |
↳ Glue | ✅ |
↳ Object Store | ✅ |
Compute Pool | ✅ |
Connection | ❌ |
Database | ✅ |
External Access Integration | ✅ |
External Volume | ✅ |
Failover Group | 🚧 |
Grant | |
↳ Future Grant | ✅ |
↳ Privilege Grant | ✅ |
↳ Role Grant | ✅ |
Network Policy | ✅ |
Notification Integration | |
🚧 | |
↳ AWS | 🚧 |
↳ Azure | 🚧 |
↳ GCP | 🚧 |
Replication Group | 🚧 |
Resource Monitor | ✅ |
Role | ✅ |
Role Grant | ✅ |
Scanner Package | ✅ |
Security Integration | |
↳ External API | ❌ |
↳ External OAuth | ❌ |
↳ Snowflake OAuth | 🚧 |
↳ SAML2 | ❌ |
↳ SCIM | ❌ |
Share | ✅ |
Storage Integration | |
↳ AWS | ✅ |
↳ Azure | ✅ |
↳ GCS | ✅ |
Tag Reference | ✅ |
User | ✅ |
Warehouse | ✅ |
Database Resources | |
Database Role | ✅ |
Schema | ✅ |
Schema Resources | |
Aggregation Policy | ✅ |
Alert | ✅ |
Authentication Policy | ✅ |
Dynamic Table | ✅ |
Event Table | ✅ |
External Function | 🚧 |
External Table | ❌ |
File Format | |
↳ CSV | ✅ |
↳ JSON | ✅ |
↳ AVRO | ❌ |
↳ ORC | ❌ |
↳ Parquet | ✅ |
Hybrid Table | 🚧 |
Iceberg Table | |
↳ Snowflake Catalog | ✅ |
↳ AWS Glue | ❌ |
↳ Iceberg files | ❌ |
↳ Delta files | ❌ |
↳ REST Catalog | ❌ |
↳ Open Catalog | ❌ |
Image Repository | ✅ |
Masking Policy | ❌ |
Materialized View | 🚧 |
Model | ❌ |
Network Rule | ✅ |
Notebook | ✅ |
Packages Policy | ✅ |
Password Policy | ✅ |
Pipe | ✅ |
Projection Policy | ❌ |
Row Access Policy | ❌ |
Secret | |
↳ Generic | ✅ |
↳ OAuth | ✅ |
↳ Password | ✅ |
Sequence | ✅ |
Service | ✅ |
Session Policy | 🚧 |
Stage | ✅ |
↳ External | ✅ |
↳ Internal | ✅ |
Stored Procedure | |
↳ Java | ❌ |
↳ Javascript | ❌ |
↳ Python | 🚧 |
↳ Scala | ❌ |
↳ SQL | ❌ |
Stream | |
↳ External Table | ❌ |
↳ Stage | ✅ |
↳ Table | ✅ |
↳ View | ✅ |
Streamlit | ❌ |
Table | 🚧 |
Tag | ✅ |
Task | ✅ |
User-Defined Function | |
↳ Java | ❌ |
↳ Javascript | 🚧 |
↳ Python | ✅ |
↳ Scala | ❌ |
↳ SQL | ❌ |
View | ✅ |
What if I need a type of resource isn't supported?
Please create a GitHub issue if there's a resource you need that isn't currently supported.
Contributing
Contributions are welcome! Titan Core does not require a contributor license agreement.
The End
If you got this far, don't forget to star this repo.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file titan_core-0.10.16.tar.gz
.
File metadata
- Download URL: titan_core-0.10.16.tar.gz
- Upload date:
- Size: 172.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.9.20
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c0a3f29e96cd0c1738a9cb228ed676a073a279444ce022f628f68b697680bd7f |
|
MD5 | dc9b2cd3b9fc9cf1da347804b4b1f894 |
|
BLAKE2b-256 | b9e8a3a670e87a38be7faa6933838cd36354ac2ca8bc9f8a4b4c7216adab3383 |
File details
Details for the file titan_core-0.10.16-py3-none-any.whl
.
File metadata
- Download URL: titan_core-0.10.16-py3-none-any.whl
- Upload date:
- Size: 189.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.1 CPython/3.9.20
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7664e33e2b71e556e10a2d9c4a1795bac7c33caa67c74d4fd058293b33d4e459 |
|
MD5 | 761163cd09e2c8898ee53bbe4ed2ad5e |
|
BLAKE2b-256 | 115a8896ebcc2f634035877c05ab20d5e1270943e9caab1fb41bf4fdff505bcd |