Core Exercises (Required)
- Drift Detection: Manually change a label on a Kubernetes namespace using
kubectland runterraform plan. Observe how Terraform detects the drift. - Review a Plan: Generate a plan for the
kind_clusterand identify every resource that Terraform proposes to create or modify. - Trigger a Lock: Open two terminal windows and try to run
terraform planat the exact same time. Document the behavior of the state lock.
Challenge Exercise (Optional)
Drift Remediation Without the Playbook: Introduce intentional configuration drift in your Kind cluster by manually editing a resource label. Then write a complete remediation plan using only Terraform commands, without consulting the drift playbook.
Done When
You have completed this chapter when:
- You can explain and demonstrate the
plan -> review -> applyworkflow. - You have successfully provisioned a 3-node Kind cluster using Terraform.
- You can identify infrastructure drift and explain the reconciliation path.
- You understand the “deny-by-default” policy for destructive actions.
Knowledge Check
Before finishing this chapter, complete the Quiz to verify your understanding of the guardrail principles.