Solution

Your infrastructure state,
finally queryable

Stop grepping through JSON. Stategraph Console gives you SQL access to your state, visual dependency graphs, and real-time audit trails.

SQL Queries Visual Graphs
SQL Query Editor
SELECT r.name, r.type, COUNT(d.dependent_id) as dependents
FROM resources r
LEFT JOIN dependencies d ON r.id = d.resource_id
WHERE r.type LIKE 'aws_security_group%'
GROUP BY r.id
HAVING COUNT(d.dependent_id) > 5
ORDER BY dependents DESC;
Name Type Dependents
prod-api-sg aws_security_group 47
shared-rds-sg aws_security_group 23
alb-public-sg aws_security_group 18
3 rows returned in 0.042s

// SQL Query

SELECT r.name, COUNT(d.dependent_id)
FROM resources r
LEFT JOIN dependencies d
WHERE r.type = 'aws_security_group'
GROUP BY r.id
Result: 3 security groups found
prod-api-sg (47 deps), shared-rds-sg (23 deps)

// Dependency Graph

vpc.main
subnet.private
instance.api
6 nodes, 5 edges, max depth: 4

// Recent Audit

✓ APPLY
alice@example.com • 2m ago
aws_instance.web[0-2]
⚠ PLAN
bob@example.com • 5m ago
aws_rds_cluster.primary

// Live Metrics

Total Resources 2,847
Active Locks 3
Drift Detected 12
Last Plan 2m ago

SQL Queries

Query your infrastructure with standard SQL. Find unused resources, analyze dependencies, audit configuration drift.

Dependency Graphs

Visualize resource relationships. Understand blast radius before making changes. Navigate your infrastructure visually.

Real-time Metrics

Monitor plan times, lock contention, and resource drift. Set up alerts for unusual activity or compliance violations.

Powerful Query Examples

stategraph-console.sql
-- Find all resources that haven't been updated in 90 days
SELECT name, type, last_modified
FROM resources
WHERE last_modified < NOW() - INTERVAL '90 days'
ORDER BY last_modified ASC;
 
-- Identify security groups with overly permissive rules
SELECT r.name, jsonb_array_elements(r.attributes->'ingress') as rule
FROM resources r
WHERE r.type = 'aws_security_group'
AND r.attributes->'ingress' @> '[{"cidr_blocks": ["0.0.0.0/0"]}]';
 
-- Find resources with the most dependencies
SELECT
r.name, r.type,
COUNT(d.dependent_id) as dependent_count
FROM resources r
JOIN dependencies d ON r.id = d.resource_id
GROUP BY r.id, r.name, r.type
ORDER BY dependent_count DESC LIMIT 10;

Visual Dependency Explorer

Interactive dependency graph for aws_instance.api_server

aws_vpc.main
aws_subnet.private
aws_instance.api_server
aws_alb_target.api
aws_route53_record.api

Click any resource to explore its relationships, history, and current state

Use Cases

Compliance Auditing

Query for non-compliant resources, track configuration drift, and generate audit reports with full change history.

Impact Analysis

Understand the blast radius of changes, identify critical dependencies, and prevent cascading failures.

Incident Response

Quickly identify affected resources during incidents, trace dependencies, and understand change impact.

Drift Detection

Monitor for configuration drift, identify manual changes, and maintain infrastructure consistency.

Enterprise Features

  • ✓ RBAC with fine-grained permissions
  • ✓ Audit log with tamper-proof storage
  • ✓ Custom dashboards and saved queries
  • ✓ API access for automation
  • ✓ Slack/PagerDuty integrations

Stop coordinating. Start shipping.

Resource-level locking. Graph-based state. SQL queries on your infra.
Teams work in parallel. No more lock contention.

Get Updates Become a Design Partner

// Zero spam. Just progress updates as we build Stategraph.