Chapter 29 · Part 5

Drift Detection and Infrastructure Changes Outside the Pipeline

A focused chapter on drift detection and infrastructure changes outside the pipeline, with practical delivery concerns, trade-offs, and the operational questions behind CI/CD work.

29-1

When Your Infrastructure Drifts Away From Code

You have your entire infrastructure defined in Terraform. Every security group, every instance size, every database parameter is written in code and

5 min
29-2

When Infrastructure Drift Makes Your Terraform Plan Useless

You run a pipeline to deploy a new application version. Terraform plan runs, and the output shows it wants to resize your production database instance

5 min
29-3

When Your Cloud Console and IaC Code Disagree: Detecting Infrastructure Drift Automatically

You have been managing infrastructure through Terraform for months. Everything is defined in code, reviewed through pull requests, and deployed through

7 min
29-4

When Infrastructure Drifts: How to Decide Whether to Fix It or Accept It

You open your infrastructure dashboard on a Monday morning. Everything looks fine at first glance. Then you notice it: the database instance size is

6 min
29-5

When Auto-Recovering Infrastructure Makes Things Worse

It's 2 AM. Your production application starts throwing connection pool errors. The on-call engineer jumps into the cloud console, tweaks a database

5 min
29-6

When Infrastructure Changes Outside Your Pipeline: Drift, Policy, and Practical Governance

Imagine this: you're on call at 2 AM. A production incident is unfolding, and someone on the team needs to open a security group port temporarily to debug

6 min
29-7

When Infrastructure Changes Outside Your Pipeline: A Drift Detection Exercise

You have a Terraform configuration that defines a security group. It has the right name, the correct inbound rules, and the proper tags. Your pipeline ran

7 min