CloudShip Tools
A comprehensive suite of automation tools that handle the high-stakes parts of DevOps—so your team can focus on building great software.
System Monitoring Dashboard
Real-time monitoring of system metrics and performance
System Metrics
Resource Usage
Performance
Recent Alerts
• Service: api-server
• Threshold: 80%
• Duration: 5 minutes
• Memory leak fixed
• Database connection restored
• Cache performance optimized
Incident Response
Automated incident response and resolution
Payment Service Degradation - Response Time > 2s
Recent Changes Analysis
Changes: Updated payment processing logic
Added new index on transactions table
Root Cause Identified
New index causing increased DB connections
Updated logic not handling concurrent transactions properly
Resolution Steps
Updated HikariCP maxPoolSize from 10 to 20
Added proper transaction isolation level
Removed problematic index temporarily
System Recovery
Drift Detection
Detect and report infrastructure drift
Drift Detection Summary
Security Group Rule Modified
Web Server SG - Port 443 opened
High Priority
Instance Type Changed
App Server - t3.small → t3.medium
Medium Priority
Resource Timeline
Cost Analysis
Analyze and optimize cloud spending
Monthly Cloud Spend
Optimization Recommendations
Right-size EC2 instances
Switch from t3.large to t3.medium for non-critical workloads
Enable RDS auto-scaling
Scale down during non-peak hours
Implement S3 lifecycle policies
Move infrequently accessed data to cheaper storage tiers
Plan Summarizer
Summarize and analyze infrastructure changes
Plan Summary
Resource Changes
Cost Impact
Detailed Changes
• Instance Type: t2.micro
• AMI: ami-0c55b159cbfafe1f0
• Tags: Environment=prod, Name=web-server
• Adding port 443 for HTTPS
• Updating CIDR blocks for SSH access
Documentation Manager
Generate and manage technical documentation
Infrastructure Diagram
Recent Changes
Added auto-scaling group
2 minutes ago
Updated security group rules
15 minutes ago
Created RDS instance
1 hour ago
Script Runner
Execute and manage automation scripts
Script Editor
Output
Script Info
Terraform Documentation
Generate and manage Terraform documentation
Module Documentation
Description
Creates a VPC with public and private subnets across multiple AZs.
Inputs
Outputs
Code Analyzer
Static code analysis and best practices
Code Analysis Summary
Memory Leak
src/components/DataTable.tsx:156 - Event listener not cleaned up
Error
Type Safety
src/utils/api.ts:89 - Implicit any type
Warning
Code Duplication
src/hooks/useAuth.ts - Similar logic in multiple places
Warning
Code Quality Metrics
Code Diff
Compare and analyze code changes
Code Changes
Review Comments
Consider adding retry logic
Line 45 - Error handling could be more robust
Add type annotations
Line 78 - Missing return type for processData()
Infrastructure Map Generator
Visualize your cloud infrastructure with interactive diagrams
Infrastructure Map
Resource Details
• CIDR: 10.0.0.0/16
• Availability Zones: 2
• DNS Support: Enabled
• CIDR: 10.0.1.0/24
• Auto-assign IP: Enabled
• Route Table: Public
VPC Designer
Design and configure Virtual Private Clouds
Public Subnet
Private Subnet
Security Groups
Three-Tier Architecture
Deploy scalable three-tier applications
resource "aws_instance" "web_server" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t3.micro"
tags = {
Name = "CloudShip-WebServer"
Environment = "Production"
}
vpc_security_group_ids = [aws_security_group.web.id]
subnet_id = aws_subnet.public[0].id
user_data = <<-EOF
#!/bin/bash
echo "Deployed via CloudShip conversation"
EOF
}
Web Tier
App Tier
Data Tier
Database Tools
Manage and optimize cloud databases
Table Structure
Query Results
id | created_at | |
---|---|---|
123e4567-e89b-12d3-a456-426614174000 | john@example.com | 2025-03-15 10:30:00 |
987fcdeb-51a2-43d7-9b56-254415f67890 | jane@example.com | 2025-03-14 15:45:00 |
Filesystem Tools
Manage cloud storage and filesystems
Directory Structure
Recent Operations
Created new directory
/src/hooks
Moved file
Button.tsx → components/Button.tsx
Updated file
api.ts - Added error handling
Infrastructure Provisioner
Automated infrastructure provisioning
resource "aws_instance" "web_server" {
ami = "ami-0c55b159cbfafe1f0"
instance_type = "t3.micro"
tags = {
Name = "CloudShip-WebServer"
Environment = "Production"
}
vpc_security_group_ids = [aws_security_group.web.id]
subnet_id = aws_subnet.public[0].id
user_data = <<-EOF
#!/bin/bash
echo "Deployed via CloudShip conversation"
EOF
}
Security Groups
Network ACLs
Terraform Scanner
Security and compliance scanning for Terraform
Security Scan Results
S3 Bucket Public Access
main.tf:45 - S3 bucket has public access enabled
High Priority
EC2 Security Group
security.tf:12 - Open port 22 to 0.0.0.0/0
Medium Priority
IAM Policy
iam.tf:78 - Policy allows wildcard actions
Low Priority
Recommended Fixes
Restrict S3 Access
Add bucket policy to block public access
Limit SSH Access
Restrict port 22 to specific IP ranges
Refine IAM Policy
Replace wildcard with specific actions
State Pruner
Clean up and optimize your Terraform state files
State Analysis
Resource Summary
State Size
Resources to Prune
• aws_instance.old_web_server
• aws_security_group.legacy_web
• aws_route_table.old_public
• aws_iam_role.unused_role
• aws_s3_bucket.temp_storage
• aws_cloudwatch_log_group.old_logs
State Mover
Safely move resources between state files
State Move Preview
Resource to Move
Move Details
Resource Dependencies
• aws_security_group.web_server_sg
• Will be moved automatically
• aws_iam_role.web_server_role
• Will be moved automatically
State Splitter
Split large state files into manageable components
State Analysis
Resource Distribution
Split Configuration
Split Preview
• VPC Resources
• Subnets
• Route Tables
• Security Groups
• EC2 Instances
• Auto Scaling Groups
• Load Balancers
• Launch Templates
• S3 Buckets
• EBS Volumes
• EFS File Systems
• RDS Instances
State Merger
Combine multiple state files into a single state
State Analysis
State Files
Merge Configuration
Resource Dependencies
• Subnets depend on VPC
• Security Groups depend on VPC
• Route Tables depend on VPC
• EC2 instances depend on Subnets
• EC2 instances depend on Security Groups
• Auto Scaling Groups depend on Launch Templates
State Validator
Validate state file integrity and consistency
State Analysis
Validation Results
State Integrity
Validation Issues
• aws_instance.web_server references missing security group
• aws_route_table.public references missing VPC
• aws_subnet.public references invalid availability zone
• aws_iam_role.web_server references invalid policy
State Backup
Automated state file backup and versioning
Backup Configuration
Backup Details
Backup Settings
Backup History
• Date: 2025-03-15 14:30 UTC
• Size: 2.4MB
• Status: Completed
• 2025-03-14 14:30 UTC (2.3MB)
• 2025-03-13 14:30 UTC (2.2MB)
• 2025-03-12 14:30 UTC (2.1MB)
State Restore
Restore state files from backups
Restore Configuration
Backup Details
Restore Settings
Resource Comparison
• 24 Resources
• Last Modified: 2025-03-16 10:00 UTC
• State Size: 2.4MB
• 24 Resources
• Backup Date: 2025-03-15 14:30 UTC
• State Size: 2.4MB
State Lock Manager
Manage state file locks and concurrent access
Lock Status
Lock Details
Lock Settings
Lock History
• User: johndoe
• Operation: terraform apply
• Duration: 15 minutes
• janesmith - terraform plan (10:00 UTC)
• bobwilson - terraform apply (09:30 UTC)
• alicebrown - terraform plan (09:00 UTC)
State Import
Import existing resources into state
Import Configuration
Resource Details
Import Settings
Resource Dependencies
• aws_security_group.web_server_sg
• aws_subnet.public
• aws_iam_role.web_server_role
• Instance Type: t2.micro
• AMI: ami-0123456789abcdef0
• Tags: Name=web-server, Environment=prod
State Export
Export state data in various formats
Export Configuration
Export Details
Export Settings
Resource Summary
• aws_instance: 4 resources
• aws_security_group: 3 resources
• aws_subnet: 6 resources
• aws_iam_role: 2 resources
• Total Resources: 24
• Sensitive Values: 8
• Dependencies: 12
• Outputs: 4
State Cleanup
Remove unused and orphaned resources
Cleanup Analysis
Resource Analysis
Cleanup Settings
Resources to Clean
• aws_s3_bucket.temp_storage
• aws_iam_role.unused_role
• aws_cloudwatch_log_group.old_logs
• aws_instance.old_web_server
• aws_security_group.legacy_web
• aws_route_table.old_public
State Diff
Compare different versions of state files
Diff Analysis
State Comparison
Diff Settings
Changes Detected
• aws_instance.new_web_server
• aws_security_group.new_web_sg
• aws_instance.old_web_server
• aws_security_group.old_web_sg
• aws_subnet.public (tags updated)
• aws_route_table.public (routes modified)
State Auditor
Security and compliance auditing for state files
Audit Analysis
Resource Analysis
Audit Settings
Audit Findings
• aws_security_group.web_sg allows all inbound traffic
• aws_s3_bucket.data has public access enabled
• aws_iam_role.admin has excessive permissions
• aws_instance.web_server uses outdated AMI
• aws_route_table.public has unused routes
• aws_cloudwatch_log_group.logs has no retention policy
• aws_vpc.main has proper CIDR configuration
• aws_subnet.private has correct routing
• aws_iam_role.app has least privilege access
Ready to Transform Your DevOps?
Get access to our comprehensive suite of tools and revolutionize your cloud operations with CloudShip.
Join Waitlist