Stack deletion status
Itโs a little weird that the stack deletion command is run and it then disappears while the process executes but later reappears if thereโs an error. Maybe the stack should be kept visible until itโs actually confirmed deleted?
๐ Feedback
9 days ago
UI/UX
Stack deletion status
Itโs a little weird that the stack deletion command is run and it then disappears while the process executes but later reappears if thereโs an error. Maybe the stack should be kept visible until itโs actually confirmed deleted?
๐ Feedback
9 days ago
UI/UX
โฌ๏ธ Gathering votes
Incorporating Atmos into Stack Creation
We currently utilize Atmos for our configurations and management. How difficult would it be to incorporate this tool into the choose a vendor for new stacks?
๐ Feedback
1 day ago
โฌ๏ธ Gathering votes
Incorporating Atmos into Stack Creation
We currently utilize Atmos for our configurations and management. How difficult would it be to incorporate this tool into the choose a vendor for new stacks?
๐ Feedback
1 day ago
โฌ๏ธ Gathering votes
Allow viewing long full plan logs directly from web UI
When the full plan logs are too long, you have to download the logs, then view them through a terminal if the logs have ANSI color codes in them. This is all around a confusing experience, between having to leave Spacelift, then figure out how to view the logs. A searchable log viewer that can handle really long log outputs would be nice. We have legacy Terraform stacks that we donโt want to shard before moving them to Spacelift, and sometimes you just end up with a really long plan, no matter how small your stack is.
๐ก Feature Requests
19 days ago
UI/UX
โฌ๏ธ Gathering votes
Allow viewing long full plan logs directly from web UI
When the full plan logs are too long, you have to download the logs, then view them through a terminal if the logs have ANSI color codes in them. This is all around a confusing experience, between having to leave Spacelift, then figure out how to view the logs. A searchable log viewer that can handle really long log outputs would be nice. We have legacy Terraform stacks that we donโt want to shard before moving them to Spacelift, and sometimes you just end up with a really long plan, no matter how small your stack is.
๐ก Feature Requests
19 days ago
UI/UX
Add a "default labels" setting to the Terraform povider
Similar to the AWS provider's default_tags provider config, the Spacelift provider should have a default_labels setting that would automatically attach a set of labels to all resources created by it (those that can be labelled, at least). Also submitted as an issue to the provider repo: https://github.com/spacelift-io/terraform-provider-spacelift/issues/606
๐ก Feature Requests
6 days ago
Provider
Add a "default labels" setting to the Terraform povider
Similar to the AWS provider's default_tags provider config, the Spacelift provider should have a default_labels setting that would automatically attach a set of labels to all resources created by it (those that can be labelled, at least). Also submitted as an issue to the provider repo: https://github.com/spacelift-io/terraform-provider-spacelift/issues/606
๐ก Feature Requests
6 days ago
Provider
Allow selecting folders without selecting its children
Sometimes I want to see things (stacks, policies, whatever) in the root space, but selecting the root space in the โSpacesโ filter also includes all its children. For the root space, that literally filters nothing (since everything is a child of the root space).
๐ก Feature Requests
13 days ago
UI/UX
Allow selecting folders without selecting its children
Sometimes I want to see things (stacks, policies, whatever) in the root space, but selecting the root space in the โSpacesโ filter also includes all its children. For the root space, that literally filters nothing (since everything is a child of the root space).
๐ก Feature Requests
13 days ago
UI/UX
Custom API Roles
Currently with the metrics exporter, a root admin API key is required. This poses a huge security risk for our company by needing to place this sort of key in the hands of a service that really only needs minimal read access. It would be great if a custom role could be defined or an admin read-only role could be created by Spacelift that would allow us to use a role with reduced permissions just for reading metrics and exporting to DD.
๐ก Feature Requests
13 days ago
API
Custom API Roles
Currently with the metrics exporter, a root admin API key is required. This poses a huge security risk for our company by needing to place this sort of key in the hands of a service that really only needs minimal read access. It would be great if a custom role could be defined or an admin read-only role could be created by Spacelift that would allow us to use a role with reduced permissions just for reading metrics and exporting to DD.
๐ก Feature Requests
13 days ago
API
Add spacelift_policy_document data source to Provider
It would be nice to be able to reference a spacelift_policy_document data source for the body attribute of spacelift_policy instead of dropping out of terraform to read a file in the filesystem.
๐ Feedback
About 5 hours ago
Add spacelift_policy_document data source to Provider
It would be nice to be able to reference a spacelift_policy_document data source for the body attribute of spacelift_policy instead of dropping out of terraform to read a file in the filesystem.
๐ Feedback
About 5 hours ago
Drive a run entirely from runtime configuration (No Stack required!)
Similar to how GitHub Actions and Gitlab-CI work, I would really like to just write the expected stack config in the source code config, and have the runner execute it. Eliminate the need to create and manage Stacks as separate entities entirely! The runtime configuration is kinda halfway there already. We can drive Stack behavior from source code. But we still have to separately create the Stack first. Why? Letโs remove that limitation, and just drive the run entirely from source.
๐ก Feature Requests
About 9 hours ago
Stacks
Drive a run entirely from runtime configuration (No Stack required!)
Similar to how GitHub Actions and Gitlab-CI work, I would really like to just write the expected stack config in the source code config, and have the runner execute it. Eliminate the need to create and manage Stacks as separate entities entirely! The runtime configuration is kinda halfway there already. We can drive Stack behavior from source code. But we still have to separately create the Stack first. Why? Letโs remove that limitation, and just drive the run entirely from source.
๐ก Feature Requests
About 9 hours ago
Stacks
Disable color injected by Spacelift logger
I would like to be able to disable the color output in the Spacelift logs. Iโve already modified the tool commands to inject -no-color or โterragrunt-no-color, but the spacelift runner is still injecting color in its own log messages. [0;36m[01JKRCTRGDKMYA668V6YEXK3R6] [0mSuccessfully planned changes [0;36m[01JKRCTRGDKMYA668V6YEXK3R6] [0mRetrieving the dependency graph... This is irritating, because when I download the logs, the color codes clutter up the messages. I would like to just disable all color in the output.
๐ก Feature Requests
About 10 hours ago
Runs
Disable color injected by Spacelift logger
I would like to be able to disable the color output in the Spacelift logs. Iโve already modified the tool commands to inject -no-color or โterragrunt-no-color, but the spacelift runner is still injecting color in its own log messages. [0;36m[01JKRCTRGDKMYA668V6YEXK3R6] [0mSuccessfully planned changes [0;36m[01JKRCTRGDKMYA668V6YEXK3R6] [0mRetrieving the dependency graph... This is irritating, because when I download the logs, the color codes clutter up the messages. I would like to just disable all color in the output.
๐ก Feature Requests
About 10 hours ago
Runs
VCS Agent - self signed certificate configuration
Ability to pass a self-signed certificate into the vcs-agent Helm chart. This is important and will avoid the need to build a custom image.
๐ก Feature Requests
About 16 hours ago
Helm
VCS Agent - self signed certificate configuration
Ability to pass a self-signed certificate into the vcs-agent Helm chart. This is important and will avoid the need to build a custom image.
๐ก Feature Requests
About 16 hours ago
Helm
Registry module usage in stacks
To check whether a module/version is being used in a stack, it would be great to have a view in the module page similar to the Resources tab in a stack. This would help us identify is a stack is out of date or which versions of a module we could archive off.
๐ก Feature Requests
About 17 hours ago
Terraform registry
Registry module usage in stacks
To check whether a module/version is being used in a stack, it would be great to have a view in the module page similar to the Resources tab in a stack. This would help us identify is a stack is out of date or which versions of a module we could archive off.
๐ก Feature Requests
About 17 hours ago
Terraform registry
โฌ๏ธ Gathering votes
Sign spacectl.exe
spacectl.exe is being blocked by Defender because it isnโt signed and its a recent build exe. My security team has put an exception in for a couple of months but are asking that you sign your windows exes
๐ก Feature Requests
About 20 hours ago
โฌ๏ธ Gathering votes
Sign spacectl.exe
spacectl.exe is being blocked by Defender because it isnโt signed and its a recent build exe. My security team has put an exception in for a couple of months but are asking that you sign your windows exes
๐ก Feature Requests
About 20 hours ago
SCIM Support
We manage privileges via Okta (and Opal). This makes it so that we have to logout/login again to get updated permissions. Recently, during an outage, a new engineer on the team got bit by this โtribal knowledgeโ and it extended the outage. Having SCIM or at least faster role update times would be amazing!
๐ก Feature Requests
1 day ago
Authentication
SCIM Support
We manage privileges via Okta (and Opal). This makes it so that we have to logout/login again to get updated permissions. Recently, during an outage, a new engineer on the team got bit by this โtribal knowledgeโ and it extended the outage. Having SCIM or at least faster role update times would be amazing!
๐ก Feature Requests
1 day ago
Authentication
Support for native remote plan triggering
It would be nice if Spacelift, via the Spacelift backend, could natively support triggering a remote plan run using the relevant terraform or tofu command, similarly to what TFC and Env0 support. In other platforms, assuming you have the correct backend configured and have run the correct terraform login command then you can run `terraform plan` from a local machine and have it trigger a remote run of the plan and stream the logs back to the local instance.
๐ก Feature Requests
2 days ago
Stacks
Support for native remote plan triggering
It would be nice if Spacelift, via the Spacelift backend, could natively support triggering a remote plan run using the relevant terraform or tofu command, similarly to what TFC and Env0 support. In other platforms, assuming you have the correct backend configured and have run the correct terraform login command then you can run `terraform plan` from a local machine and have it trigger a remote run of the plan and stream the logs back to the local instance.
๐ก Feature Requests
2 days ago
Stacks
โฌ๏ธ Gathering votes
Way to send Notification Inbox internal errors to Slack/elsewhere
Weโd like to get these alerts in our normal alerting flows via Slack and/or Pagerduty, so itโd be nice if we could get them in a notification policy or something like that.
๐ก Feature Requests
6 days ago
Notifications
โฌ๏ธ Gathering votes
Way to send Notification Inbox internal errors to Slack/elsewhere
Weโd like to get these alerts in our normal alerting flows via Slack and/or Pagerduty, so itโd be nice if we could get them in a notification policy or something like that.
๐ก Feature Requests
6 days ago
Notifications
support Auth type "AWS_IAM" for lambda webhooks
I want notification policy to trigger lambda function that receives webhooks. For some use cases, we want a lambda function to trigger step functions that perform - pre - track run (start, approve, watch until done) - post I want to reuse the spacelift webhooks as opposed to building out a github integration b/c spacelift tracking webhooks are already getting fired off when we want and contain all of the information that our lambda function needs. I have a POC for this today that does: - named webhook that connects to our lambda function via a public url - approval policy for a stack (so that it will get enqueued, but not be executed, the lambda function will do the approval to control when plan/apply happens) - this is a bit of a workaround that I canโt use an event that happens just when the commit it updated without triggering a stack, but that is a less important ticket for later :)) - tag stacks that should be managed by the step functions - global notificaiton policy that looks for our tagged stacks in QUEUED state to fire off lambda function - lamda function calls a step function that does pre stuff, then approves the stack, then watches until done, then calls post stuff The current approach has the following issues: - if I use a public lambda url I must set auth type to None (unclear if this is going to fly with security beyond POC) - I may need to build out my own auth via api gateway via the shared secret (Iโd prefer not to invent this pattern) - Secrets used for auth are readable in spacelift Ideally, I could integrate with lambda using a webhook that can authorize via Auth type AWS_IAM - this should be possible using either the role assigned to the worker or a stack - although I would prefer using the workers role
๐ก Feature Requests
7 days ago
Integrations
support Auth type "AWS_IAM" for lambda webhooks
I want notification policy to trigger lambda function that receives webhooks. For some use cases, we want a lambda function to trigger step functions that perform - pre - track run (start, approve, watch until done) - post I want to reuse the spacelift webhooks as opposed to building out a github integration b/c spacelift tracking webhooks are already getting fired off when we want and contain all of the information that our lambda function needs. I have a POC for this today that does: - named webhook that connects to our lambda function via a public url - approval policy for a stack (so that it will get enqueued, but not be executed, the lambda function will do the approval to control when plan/apply happens) - this is a bit of a workaround that I canโt use an event that happens just when the commit it updated without triggering a stack, but that is a less important ticket for later :)) - tag stacks that should be managed by the step functions - global notificaiton policy that looks for our tagged stacks in QUEUED state to fire off lambda function - lamda function calls a step function that does pre stuff, then approves the stack, then watches until done, then calls post stuff The current approach has the following issues: - if I use a public lambda url I must set auth type to None (unclear if this is going to fly with security beyond POC) - I may need to build out my own auth via api gateway via the shared secret (Iโd prefer not to invent this pattern) - Secrets used for auth are readable in spacelift Ideally, I could integrate with lambda using a webhook that can authorize via Auth type AWS_IAM - this should be possible using either the role assigned to the worker or a stack - although I would prefer using the workers role
๐ก Feature Requests
7 days ago
Integrations
Clear worker pool queue to prioritize a run
There should be an easy way to clear the worker pool queue so as to prioritize a critical run to fix a broken environment or to release a hotfix.
๐ก Feature Requests
22 days ago
Clear worker pool queue to prioritize a run
There should be an easy way to clear the worker pool queue so as to prioritize a critical run to fix a broken environment or to release a hotfix.
๐ก Feature Requests
22 days ago
โ๏ธ In Progress
Runs need a "Cancel all previous runs"
In Terraform Cloud if there were a number of queued up plans. You could pick any plan (usually latest) and cancel all previous. This doesnโt seem possible in Spacelift.
๐ก Feature Requests
26 days ago
โ๏ธ In Progress
Runs need a "Cancel all previous runs"
In Terraform Cloud if there were a number of queued up plans. You could pick any plan (usually latest) and cancel all previous. This doesnโt seem possible in Spacelift.
๐ก Feature Requests
26 days ago
โก๏ธ Planned
Move the "Mark for Deletion" button
The โMark for Deletionโ in โOrganization Settingsโ is awfully close to other buttons in the menu. It seems very dangerous to have this option so close to other buttons without confirmation if clicked. Iโd suggest moving this button so mewhere else and adding a confirmation after clicking
๐ก Feature Requests
2 months ago
โก๏ธ Planned
Move the "Mark for Deletion" button
The โMark for Deletionโ in โOrganization Settingsโ is awfully close to other buttons in the menu. It seems very dangerous to have this option so close to other buttons without confirmation if clicked. Iโd suggest moving this button so mewhere else and adding a confirmation after clicking
๐ก Feature Requests
2 months ago
Allow Git Submodules Init
Spacelift really needs to allow for git submodule init by default. Itโs tedious to go through this process to do it: https://docs.spacelift.io/vendors/terraform/external-modules#using-ssh
๐ก Feature Requests
12 days ago
VCS
Allow Git Submodules Init
Spacelift really needs to allow for git submodule init by default. Itโs tedious to go through this process to do it: https://docs.spacelift.io/vendors/terraform/external-modules#using-ssh
๐ก Feature Requests
12 days ago
VCS