Need advice about which tool to choose?Ask the StackShare community!

Hashicorp Sentinel

26
28
+ 1
0
Terraform

17.9K
14.1K
+ 1
345
Add tool

Hashicorp Sentinel vs Terraform: What are the differences?

Introduction:

1. Integration with Terraform: HashiCorp Sentinel allows you to add policy as code enforcement to your Terraform plans and deployments, ensuring compliance and security at every stage of the infrastructure lifecycle. This integration helps in making sure that only compliant infrastructure configurations are applied.

2. Policy as Code vs. Infrastructure as Code: While Terraform focuses on defining and managing infrastructure as code, Sentinel focuses on defining and enforcing policy as code. This means that Terraform creates and manages infrastructure, while Sentinel ensures that the defined policies are adhered to during the provisioning process.

3. Granular Control: Sentinel provides more granular control over policies by enabling conditional checks, parameterized policies, and the ability to define policies based on specific criteria. This level of control allows organizations to tailor policies to their specific requirements and enforce them effectively.

4. Real-Time Observability: Sentinel offers real-time observability by providing detailed insights into policy evaluation, allowing users to track and monitor policy compliance during Terraform execution. This feature helps in identifying and addressing policy violations promptly, enhancing the security and compliance of the infrastructure.

5. Customization and Extensibility: Sentinel allows users to create custom functions, imports, and data sources to extend the capabilities of policy enforcement. This customization enables organizations to implement unique policies and integrations to meet their specific infrastructure requirements effectively.

6. Compliance Automation: HashiCorp Sentinel streamlines compliance automation by integrating with various compliance standards and frameworks, allowing organizations to automate policy enforcement and compliance checking seamlessly within their Terraform workflows.

In Summary, HashiCorp Sentinel and Terraform differ in their focus on policy as code enforcement, granular control, real-time observability, customization, and compliance automation within the infrastructure lifecycle.

Decisions about Hashicorp Sentinel and Terraform

Because Pulumi uses real programming languages, you can actually write abstractions for your infrastructure code, which is incredibly empowering. You still 'describe' your desired state, but by having a programming language at your fingers, you can factor out patterns, and package it up for easier consumption.

See more
Sergey Ivanov
Overview

We use Terraform to manage AWS cloud environment for the project. It is pretty complex, largely static, security-focused, and constantly evolving.

Terraform provides descriptive (declarative) way of defining the target configuration, where it can work out the dependencies between configuration elements and apply differences without re-provisioning the entire cloud stack.

Advantages

Terraform is vendor-neutral in a way that it is using a common configuration language (HCL) with plugins (providers) for multiple cloud and service providers.

Terraform keeps track of the previous state of the deployment and applies incremental changes, resulting in faster deployment times.

Terraform allows us to share reusable modules between projects. We have built an impressive library of modules internally, which makes it very easy to assemble a new project from pre-fabricated building blocks.

Disadvantages

Software is imperfect, and Terraform is no exception. Occasionally we hit annoying bugs that we have to work around. The interaction with any underlying APIs is encapsulated inside 3rd party Terraform providers, and any bug fixes or new features require a provider release. Some providers have very poor coverage of the underlying APIs.

Terraform is not great for managing highly dynamic parts of cloud environments. That part is better delegated to other tools or scripts.

Terraform state may go out of sync with the target environment or with the source configuration, which often results in painful reconciliation.

See more

I personally am not a huge fan of vendor lock in for multiple reasons:

  • I've seen cost saving moves to the cloud end up costing a fortune and trapping companies due to over utilization of cloud specific features.
  • I've seen S3 failures nearly take down half the internet.
  • I've seen companies get stuck in the cloud because they aren't built cloud agnostic.

I choose to use terraform for my cloud provisioning for these reasons:

  • It's cloud agnostic so I can use it no matter where I am.
  • It isn't difficult to use and uses a relatively easy to read language.
  • It tests infrastructure before running it, and enables me to see and keep changes up to date.
  • It runs from the same CLI I do most of my CM work from.
See more

Context: I wanted to create an end to end IoT data pipeline simulation in Google Cloud IoT Core and other GCP services. I never touched Terraform meaningfully until working on this project, and it's one of the best explorations in my development career. The documentation and syntax is incredibly human-readable and friendly. I'm used to building infrastructure through the google apis via Python , but I'm so glad past Sung did not make that decision. I was tempted to use Google Cloud Deployment Manager, but the templates were a bit convoluted by first impression. I'm glad past Sung did not make this decision either.

Solution: Leveraging Google Cloud Build Google Cloud Run Google Cloud Bigtable Google BigQuery Google Cloud Storage Google Compute Engine along with some other fun tools, I can deploy over 40 GCP resources using Terraform!

Check Out My Architecture: CLICK ME

Check out the GitHub repo attached

See more
Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of Hashicorp Sentinel
Pros of Terraform
    Be the first to leave a pro
    • 122
      Infrastructure as code
    • 73
      Declarative syntax
    • 45
      Planning
    • 28
      Simple
    • 24
      Parallelism
    • 8
      Well-documented
    • 8
      Cloud agnostic
    • 6
      It's like coding your infrastructure in simple English
    • 6
      Immutable infrastructure
    • 5
      Platform agnostic
    • 4
      Extendable
    • 4
      Automation
    • 4
      Automates infrastructure deployments
    • 4
      Portability
    • 2
      Lightweight
    • 2
      Scales to hundreds of hosts

    Sign up to add or upvote prosMake informed product decisions

    Cons of Hashicorp Sentinel
    Cons of Terraform
      Be the first to leave a con
      • 1
        Doesn't have full support to GKE

      Sign up to add or upvote consMake informed product decisions

      - No public GitHub repository available -

      What is Hashicorp Sentinel?

      Sentinel is an embeddable policy as code framework to enable fine-grained, logic-based policy decisions that can be extended to source external information to make decisions.

      What is Terraform?

      With Terraform, you describe your complete infrastructure as code, even as it spans multiple service providers. Your servers may come from AWS, your DNS may come from CloudFlare, and your database may come from Heroku. Terraform will build all these resources across all these providers in parallel.

      Need advice about which tool to choose?Ask the StackShare community!

      What companies use Hashicorp Sentinel?
      What companies use Terraform?
      See which teams inside your own company are using Hashicorp Sentinel or Terraform.
      Sign up for StackShare EnterpriseLearn More

      Sign up to get full access to all the companiesMake informed product decisions

      What tools integrate with Hashicorp Sentinel?
      What tools integrate with Terraform?

      Sign up to get full access to all the tool integrationsMake informed product decisions

      Blog Posts

      GitHubGitPython+22
      17
      14209
      JavaScriptGitHubPython+42
      53
      21867
      What are some alternatives to Hashicorp Sentinel and Terraform?
      AWS CloudFormation
      You can use AWS CloudFormation’s sample templates or create your own templates to describe the AWS resources, and any associated dependencies or runtime parameters, required to run your application. You don’t need to figure out the order in which AWS services need to be provisioned or the subtleties of how to make those dependencies work.
      Packer
      Packer automates the creation of any type of machine image. It embraces modern configuration management by encouraging you to use automated scripts to install and configure the software within your Packer-made images.
      Pulumi
      Pulumi is a cloud development platform that makes creating cloud programs easy and productive. Skip the YAML and just write code. Pulumi is multi-language, multi-cloud and fully extensible in both its engine and ecosystem of packages.
      AWS Cloud Development Kit
      It is an open source software development framework to model and provision your cloud application resources using familiar programming languages. It uses the familiarity and expressive power of programming languages for modeling your applications. It provides you with high-level components that preconfigure cloud resources with proven defaults, so you can build cloud applications without needing to be an expert.
      Yocto
      It is an open source collaboration project that helps developers create custom Linux-based systems regardless of the hardware architecture. It provides a flexible set of tools and a space where embedded developers worldwide can share technologies, software stacks, configurations, and best practices that can be used to create tailored Linux images for embedded and IOT devices, or anywhere a customized Linux OS is needed.
      See all alternatives