dragondrop docs
dragondrop.cloud
  • Welcome
  • Getting Started
    • How dragondrop Works
    • 🔒Security
    • Self-Hosted Runners
    • Cloud Perch - Cloud Footprint Visualizations
    • Jobs
      • What is a Job?
      • How Many Jobs Should We Use?
      • Creating a Job
      • Running a Job
      • Managed Drift Only Mode
      • Job Output
    • Setting Up CI/CD
    • Supported Tech Stack
    • Signing Up
    • Schedule a Demo
  • Deploying To Your Cloud
    • Infrastructure Requirements
      • Requirements
      • AWS
      • Azure
      • GCP
    • Environment Variables
    • Updating HTTPS Job Endpoints
    • FAQs
  • Setting Up CI/CD
    • GitHub Action
  • Pricing & Plans
    • Plans
    • FAQs
  • Trouble Shooting
    • Resource Coverage
      • AWS
      • Azure
      • GCP
    • Contact Support
Powered by GitBook
On this page
  • Terraform Drift and Unmanaged Resources
  • Cloud Costs
  • Cloud Security
  • Terraform Footprint
  • Double-Click For Details Presented as a Pull Request
Edit on GitHub
  1. Getting Started

Cloud Perch - Cloud Footprint Visualizations

Aggregate and compile results across Job executions to get an enterprise-style view of your entire cloud

PreviousSelf-Hosted RunnersNextJobs

Last updated 1 year ago

Quickly visualize and hone-in on hot-spots in your cloud environment across multiple dimensions, including drift, ummanaged resources, cost, security, and more with Cloud Perch visualizations.

All tiers of dragondrop offer visualizations for a single managed cloud-concierge instance over time. For enterprise tiers, Cloud Perch covers all managed Jobs.

Terraform Drift and Unmanaged Resources

Track over time identified resources that have drifted or are not managed by Terraform.

Cloud Costs

Cloud Security

Terraform Footprint

Double-Click For Details Presented as a Pull Request

Once ready to rectify weaknesses identified within your cloud environment, simply click through to the latest cloud-concierge executions, and see the specific resources that have raised graphical concerns and how, along with Terraform codification and import statements when relevant.

Identify when costs managed and unmanaged by Terraform arise in your environment.
Visually lock-in on potential security threats when they flare up, whether the resources are codified or not.
Track Terraform, Terraform provider, and module versions across your cloud environment to ensure compliance with the latest versions.

An example can be found here.

Pull Request