Skip to main content

Titan Core: Snowflake infrastructure as code

Project description

titan core - Snowflake infrastructure as code

Titan Core helps you provision, deploy, and secure resources in Snowflake. It replaces tools like Terraform, Schemachange, or Permifrost.

Deploy any Snowflake resource, including users, roles, schemas, databases, integrations, pipes, stages, functions, stored procedures, and more. Convert adhoc, bug-prone SQL management scripts into simple, repeatable configuration.

Titan Core is for:

  • DevOps engineers looking to automate and manage Snowflake infrastructure.
  • Analytics engineers working with dbt who want to manage Snowflake resources without macros.
  • Data platform teams who need to reliably manage Snowflake with CI/CD.
  • Organizations that prefer a git-based workflow for infrastructure management.
  • Teams seeking to replace Terraform for Snowflake-related tasks.
    ╔══════════╗                                           ╔═══════════╗       
    ║  CONFIG  ║                                           ║ SNOWFLAKE ║       
    ╚══════════╝                                           ╚═══════════╝       
  ┏━━━━━━━━━━━┓                                        ┏━━━━━━━━━━━┓            
┌─┫ WAREHOUSE ┣─────┐                                ┌─┫ WAREHOUSE ┣───────────┐
│ ┗━━━━━━━━━━━┛     │                    ALTER       │ ┗━━━━━━━━━━━┛           │
│ name:         ETL │─────┐           ┌─ WAREHOUSE ─▶│ name:         ETL       │
│ auto_suspend: 60  │     │           │              │ auto_suspend: 300 -> 60 │
└───────────────────┘  ╔══▼═══════════╩═╗            └─────────────────────────┘
                       ║                ║                                      
                       ║   TITAN CORE   ║                                      
  ┏━━━━━━┓             ║                ║              ┏━━━━━━┓                
┌─┫ ROLE ┣──────────┐  ╚══▲═══════════╦═╝            ┌─┫ ROLE ┣────────────────┐
│ ┗━━━━━━┛          │     │           │              │ ┗━━━━━━┛                │
│ name: TRANSFORMER │─────┘           └─ CREATE ────▶│ name: TRANSFORMER       │
└───────────────────┘                    ROLE        └─────────────────────────┘

Key Features

  • Declarative » Generates the right SQL to make your config and account match

  • Comprehensive » Nearly every Snowflake resource is supported

  • Flexible » Write resource configuration in YAML or Python

  • Fast » Titan Core runs 50-90% faster than Terraform and Permifrost

  • Migration-friendly » Generate config automatically with the export CLI

Open Source

This project is licensed under the Apache 2.0 License - see LICENSE for details. The source code for Titan Core is available on Github.

Documentation

You can find comprehensive Titan Core documentation on GitBook.

Getting Started

If you're new, the best place to start is with the Python package.

Install from PyPi (MacOS, Linux)

python -m venv .venv
source .venv/bin/activate
python -m pip install titan-core

Install from PyPi (Windows)

python -m venv .venv
.\.venv\Scripts\activate
python -m pip install titan-core

Python example

import os
import snowflake.connector

from titan.blueprint import Blueprint, print_plan
from titan.resources import Grant, Role, Warehouse

# Configure resources by instantiating Python objects.

role = Role(name="transformer")

warehouse = Warehouse(
    name="transforming",
    warehouse_size="large",
    auto_suspend=60,
)

usage_grant = Grant(priv="usage", to=role, on=warehouse)

# Titan compares your config to a Snowflake account. Create a Snowflake 
# connection to allow Titan to connect to your account.

connection_params = {
    "account": os.environ["SNOWFLAKE_ACCOUNT"],
    "user": os.environ["SNOWFLAKE_USER"],
    "password": os.environ["SNOWFLAKE_PASSWORD"],
    "role": "SYSADMIN",
}
session = snowflake.connector.connect(**connection_params)

# Create a Blueprint and pass your resources into it. A Blueprint helps you
# validate and deploy a set of resources.

bp = Blueprint(resources=[
    role,
    warehouse,
    usage_grant,
])

# Blueprint works like Terraform. Calling plan(...) will compare your config
# to the state of your Snowflake account and return a list of changes.

plan = bp.plan(session)
print_plan(plan) # =>
"""
» titan core
» Plan: 4 to add, 0 to change, 0 to destroy.

+ urn::ABCD123:warehouse/transforming {
  + name                                = "transforming"
  + owner                               = "SYSADMIN"
  + warehouse_type                      = "STANDARD"
  + warehouse_size                      = "LARGE"
  ...
}

+ urn::ABCD123:role/transformer {
  + name    = "transformer"
  + owner   = "USERADMIN"
  + tags    = None
  + comment = None
}

+ urn::ABCD123:grant/TRANSFORMER?priv=USAGE&on=warehouse/TRANSFORMING {
  + priv         = "USAGE"
  + on           = "transforming"
  + on_type      = "WAREHOUSE"
  + to           = TRANSFORMER
  ...
}
"""

# Calling apply(...) will convert your plan into the right set of SQL commands
# and run them against your Snowflake account.
bp.apply(session, plan) # =>
"""
[TITAN_USER:SYSADMIN]  > USE SECONDARY ROLES ALL
[TITAN_USER:SYSADMIN]  > CREATE WAREHOUSE TRANSFORMING warehouse_type = STANDARD ...
[TITAN_USER:SYSADMIN]  > USE ROLE USERADMIN
[TITAN_USER:USERADMIN] > CREATE ROLE TRANSFORMER
[TITAN_USER:USERADMIN] > USE ROLE SYSADMIN
[TITAN_USER:SYSADMIN]  > GRANT USAGE ON WAREHOUSE transforming TO TRANSFORMER
"""

Using the CLI

You can use the CLI to generate a plan, apply a plan, or export resources. To use the CLI, install the Python package and call python -m titan from the command line.

The CLI allows you to plan and apply a Titan Core YAML config. You can specify a single input file or a directory of configs.

In addition to plan and apply, the CLI also allows you to export resources. This makes it easy to generate a config for an existing Snowflake environment.

To connect with Snowflake, the CLI uses environment variables. The following `are supported:

  • SNOWFLAKE_ACCOUNT
  • SNOWFLAKE_USER
  • SNOWFLAKE_PASSWORD
  • SNOWFLAKE_DATABASE
  • SNOWFLAKE_SCHEMA
  • SNOWFLAKE_ROLE
  • SNOWFLAKE_WAREHOUSE
  • SNOWFLAKE_MFA_PASSCODE
  • SNOWFLAKE_AUTHENTICATOR

CLI Example

Show the help message

titan --help

# Usage: titan [OPTIONS] COMMAND [ARGS]...
# 
#   titan core helps you manage your Snowflake environment.
# 
# Options:
#   --help  Show this message and exit.
# 
# Commands:
#   apply    Apply a resource config to a Snowflake account
#   connect  Test the connection to Snowflake
#   export   Generate a resource config for existing Snowflake resources
#   plan     Compare a resource config to the current state of Snowflake

Apply a resource config to Snowflake

# Create a resource config file
cat <<EOF > titan.yml
roles:
  - name: transformer

warehouses:
  - name: transforming
    warehouse_size: LARGE
    auto_suspend: 60

grants:
  - to_role: transformer
    priv: usage
    on_warehouse: transforming
EOF

# Set connection variables
export SNOWFLAKE_ACCOUNT="my-account"
export SNOWFLAKE_USER="my-user"
export SNOWFLAKE_PASSWORD="my-password"

# Generate a plan
titan plan --config titan.yml

# Apply the config
titan apply --config titan.yml

Export existing Snowflake resources to YAML.

titan export \
  --resource=warehouse,grant,role \
  --out=titan.yml

The Titan Core Python package installs the CLI script titan. You can alternatively use Python CLI module syntax if you need fine-grained control over the Python environment.

python -m titan plan --config titan.yml

Using the GitHub Action

The Titan Core GitHub Action allows you to automate the deployment of Snowflake resources using a git-based workflow.

GitHub Action Example

-- .github/workflows/titan.yml
name: Deploy to Snowflake with Titan
on:
  push:
    branches: [ main ]
    paths:
    - 'titan/**'

jobs:
  deploy:
    runs-on: ubuntu-latest
    steps:
      - name: Checkout code
        uses: actions/checkout@v4

      - name: Deploy to Snowflake
        uses: Titan-Systems/titan-core-action@main
        with:
          run-mode: 'create-or-update'
          resource-path: './titan'
          allowlist: 'warehouse,role,grant'
          dry-run: 'false'
        env:
          SNOWFLAKE_ACCOUNT: ${{ secrets.SNOWFLAKE_ACCOUNT }}
          SNOWFLAKE_USER: ${{ secrets.SNOWFLAKE_USER }}
          SNOWFLAKE_PASSWORD: ${{ secrets.SNOWFLAKE_PASSWORD }}
          SNOWFLAKE_ROLE: ${{ secrets.SNOWFLAKE_ROLE }}
          SNOWFLAKE_WAREHOUSE: ${{ secrets.SNOWFLAKE_WAREHOUSE }}

Titan Core Limitations

  • Titan Core uses names as unique identifiers. Renaming a resource will create a new one.
  • Titan Core is not an ORM. It's not built to replace tools like SQLAlchemy.
  • Titan Core is under active development. Some resources are not yet supported.

titan core vs other tools

Feature Titan Core Terraform Schemachange Permifrost SnowDDL
Plan and Execute Changes
Declarative Config
No State File Dependency
Python-Based Definitions w/ CDKTF
SQL Support
Dynamic Role Switching N/A
Export Snowflake resources

titan core vs Terraform

Terraform is an infrastructure-as-code tool using the HCL config language.

The Snowflake provider for Terraform is limited to 1 role per provider. This limitation is at odds with Snowflake's design, which is built to use multiple roles. This mismatch forces you into a complex multi-provider setup which can result in drift, permission errors, and broken plans.

Titan Core streamlines this with dynamic role switching. Titan Core automatically detects which role is needed for a given change, and switches to that role before making it. This speeds up development cycles and helps eliminate the use of ACCOUNTADMIN.

Titan Core doesn't use a state file. This provides more accurate plans and eliminates issues with stale state.

titan core vs Schemachange

Schemachange is a database migration tool based on Flyway. It uses SQL scripts to deploy resources to different environments.

Schemachange is an imperative migration tool. For developers, that means you must know Snowflake's current state and the exact SQL commands needed to update it to the desired state. If environments get changed outside of the tool, your migration scripts may need significant adjustments.

Titan Core simplifies this with a declarative approach. With Titan Core, just define what an environment should look like, you don't need to know the detailed steps or SQL commands needed to get there.

Declarative config is less error-prone and more scalable, especially in dynamic and complex data environments.

titan core vs Permifrost

Permifrost is an access-management tool for Snowflake. It helps you automate the creation of users, roles, and grants. Permifrost only manages permissions, it doesn't manage any other aspect of your Snowflake account.

Permifrost can be very slow. Running simple Permifrost configs can take minutes to run. Titan Core is designed to run in seconds, even with complex environments.

titan core vs SnowDDL

SnowDDL is a declarative object management tool for Snowflake, similar to Titan Core. It uses a streamlined permissions model that simplifies granting read and write access to databases and schemas.

SnowDDL takes a strongly opinionated stance on roles in Snowflake. If you don't need a 3-tier role heirarchy, SnowDDL may not be a good fit.

Resource support

Legend

  • ✅ Supported
  • 🚧 Unstable
  • ❌ Not Yet Supported
Name Supported
Account Resources
Account Parameter
API Integration
Catalog Integration
↳ Glue
↳ Object Store
Compute Pool
Connection
Database
External Access Integration
External Volume
Failover Group 🚧
Grant
↳ Future Grant
↳ Privilege Grant
↳ Role Grant
Network Policy
Notification Integration
↳ Email 🚧
↳ AWS 🚧
↳ Azure 🚧
↳ GCP 🚧
Replication Group 🚧
Resource Monitor
Role
Role Grant
Scanner Package
Security Integration
↳ External API
↳ External OAuth
↳ Snowflake OAuth 🚧
↳ SAML2
↳ SCIM
Share
Storage Integration
↳ AWS
↳ Azure
↳ GCS
Tag Reference
User
Warehouse
Database Resources
Database Role
Schema
Schema Resources
Aggregation Policy
Alert
Authentication Policy
Dynamic Table
Event Table
External Function 🚧
External Table
File Format
↳ CSV
↳ JSON
↳ AVRO
↳ ORC
↳ Parquet
Hybrid Table 🚧
Iceberg Table
↳ Snowflake Catalog
↳ AWS Glue
↳ Iceberg files
↳ Delta files
↳ REST Catalog
↳ Open Catalog
Image Repository
Masking Policy
Materialized View 🚧
Model
Network Rule
Notebook
Packages Policy
Password Policy
Pipe
Projection Policy
Row Access Policy
Secret
↳ Generic
↳ OAuth
↳ Password
Sequence
Service
Session Policy 🚧
Stage
↳ External
↳ Internal
Stored Procedure
↳ Java
↳ Javascript
↳ Python 🚧
↳ Scala
↳ SQL
Stream
↳ External Table
↳ Stage
↳ Table
↳ View
Streamlit
Table 🚧
Tag
Task
User-Defined Function
↳ Java
↳ Javascript 🚧
↳ Python
↳ Scala
↳ SQL
View

What if I need a type of resource isn't supported?

Please create a GitHub issue if there's a resource you need that isn't currently supported.

Contributing

Contributions are welcome! Titan Core does not require a contributor license agreement.

The End

If you got this far, don't forget to star this repo.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

titan_core-0.10.17.tar.gz (171.9 kB view details)

Uploaded Source

Built Distribution

titan_core-0.10.17-py3-none-any.whl (189.0 kB view details)

Uploaded Python 3

File details

Details for the file titan_core-0.10.17.tar.gz.

File metadata

  • Download URL: titan_core-0.10.17.tar.gz
  • Upload date:
  • Size: 171.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.9.20

File hashes

Hashes for titan_core-0.10.17.tar.gz
Algorithm Hash digest
SHA256 4e601df20043a0338258f3564bff6234bdfcf4b9b93191b459b0d52aa7f40cc8
MD5 8cf74e4a225bbacfb0d5292a108de4a7
BLAKE2b-256 d9e0cdf823938733bbed5013ec5bfd1461cf9f00337f4d74b2253b534979c18d

See more details on using hashes here.

File details

Details for the file titan_core-0.10.17-py3-none-any.whl.

File metadata

  • Download URL: titan_core-0.10.17-py3-none-any.whl
  • Upload date:
  • Size: 189.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.9.20

File hashes

Hashes for titan_core-0.10.17-py3-none-any.whl
Algorithm Hash digest
SHA256 ed76249f96a04aca3fcd8f4c802ed190ad0d10a95d18db2c5a730cc1299940a6
MD5 6ccbdadf98b22bbaf45d9879270c0f9a
BLAKE2b-256 9ae0ef065afbf6e40b73dc5d1f295e0bad4c6c15e8927fd65077a41b43dd8bcb

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page