
Product
Introducing Data Exports
Export Socket alert data to your own cloud storage in JSON, CSV, or Parquet, with flexible snapshot or incremental delivery.
cloudbender
Advanced tools
CloudBenderCloudBender is an Infrastructure-as-Code orchestration tool for deploying and maintaining AWS infrastructure in an automated, traceable, and version-controlled manner.
It provides a unified CLI with first-class support for two IaC backends:
refresh command for Pulumi stackspodman or docker (for container-based tasks)~/.aws/config)The preferred way to run CloudBender is via the public container image. This ensures all tools and dependencies are in sync and tested.
Note: Requires Linux with kernel >= 5.12, Cgroups V2, and podman for rootless nested containers.
Verify your setup supports nested containers:
podman run --rm -v .:/workspace -v $HOME/.aws/config:/workspace/.aws/config \
public.ecr.aws/zero-downtime/cloudbender:latest \
podman run -q --rm docker.io/busybox:latest echo "Rootless container inception works!"
If successful, add an alias to your shell profile:
alias cloudbender="podman run --rm -v .:/workspace \
-v $HOME/.aws/config:/home/cloudbender/.aws/config \
public.ecr.aws/zero-downtime/cloudbender:latest cloudbender"
pip3 install -U cloudbender
curl -fsSL https://get.pulumi.com | sh
cloudbender version
Expected output:
CloudBender: 0.x.x
Pulumi: v3.228.0
Podman/Docker: podman version 5.x.x
A CloudBender project follows this directory structure:
my-project/
├── config/ # Configuration tree
│ ├── config.yaml # Global settings (profile, region, options)
│ ├── production/ # Stack group
│ │ ├── config.yaml # Group-level overrides (deep-merged with parent)
│ │ ├── us-east-1/ # Nested stack group (e.g. per-region)
│ │ │ ├── config.yaml # Region-level overrides
│ │ │ └── vpc.yaml # Stack definition
│ │ └── networking.yaml # Stack definition
│ └── staging/
│ ├── config.yaml
│ └── app.yaml
├── cloudformation/ # CloudFormation Jinja2 templates
│ └── vpc.yaml.jinja
└── artifacts/ # Artifacts (Pulumi programs, scripts, etc.)
└── pulumi/
└── vpc.py # Pulumi Python program
Configuration is hierarchically merged from parent to child. Lower-level config files override higher-level values, with deep merging for dictionaries and arrays. This enables DRY configuration across accounts, regions, and environments.
Each stack operates in one of three modes:
| Mode | Description |
|---|---|
CloudBender (default) | CloudFormation with Jinja2 rendering |
pulumi | Pulumi Python IaC |
Piped | CloudFormation with inter-stack reference injection |
Usage: cloudbender [OPTIONS] COMMAND [ARGS]...
Options:
--profile TEXT Use named AWS .config profile, overwrites any stack config
--region TEXT Use region, overwrites any stack config
--dir TEXT Specify cloudbender project directory.
--debug Turn on debug logging.
--help Show this message and exit.
| Command | Description |
|---|---|
provision <stack|group> [--multi] | Create or update stacks/stack groups |
delete <stack|group> [--multi] | Delete stacks/stack groups (reverse dependency order) |
preview <stack> | Preview Pulumi stack changes before applying |
refresh <stack> | Drift detection — refreshes Pulumi stack state against actual cloud resources |
| Command | Description |
|---|---|
render <stack> [--multi] | Render Jinja2 templates to CloudFormation YAML |
validate <stack> [--multi] | Validate rendered templates using cfn-lint |
create-change-set <stack> <name> | Create a CloudFormation change set |
sync <stack> [--multi] | Render + provision in a single step |
| Command | Description |
|---|---|
get-config <stack> <key> | Retrieve a config value (decrypted if secret) |
set-config <stack> <key> <value> [--secret] | Store a config value (encrypted if --secret) |
| Command | Description |
|---|---|
outputs <stack> [--include regex] [--values] | Print stack outputs, optionally filtered |
docs <stack> [--multi] | Generate documentation for stacks |
list-stacks <group> | List all Pulumi stacks in a group |
version | Display CloudBender, Pulumi, and Podman/Docker versions |
| Command | Description |
|---|---|
export <stack> [-r] | Export Pulumi stack state (optionally remove pending operations) |
import <stack> <file> | Import a Pulumi state file |
assimilate <stack> | Import existing AWS resources into a Pulumi stack |
execute <stack> [function] [args] | Run custom Python functions within a stack context |
| Command | Description |
|---|---|
wrap <group> <cmd> | Execute an external program with stack group context |
clean | Delete all previously rendered template files |
Pulumi — State is stored in S3 within your own AWS account, in the same region as the deployed resources. No data is shared with Pulumi Cloud APIs. CloudBender creates temporary, isolated workspaces per stack operation and injects configuration (account ID, region, parameters) automatically.
CloudFormation — State is managed natively by the AWS CloudFormation service. Templates can optionally be stored in S3 via the template_bucket_url setting.
Pulumi — Uses native Pulumi secret handling with passphrase-based or custom encryption keys. See Pulumi Secrets docs.
CloudFormation — Supports SOPS for encrypted config files. Encrypted files are automatically detected and decrypted at runtime. All required decryption metadata must be embedded in the SOPS config or set via environment variables. SOPS support can be disabled by setting the DISABLE_SOPS environment variable.
Stacks support lifecycle hooks defined in artifact metadata:
pre_create, post_create — before/after stack creationpre_update, post_update — before/after stack updateBuilt-in hook type:
cmd — execute arbitrary shell commands via subprocessStacks can declare dependencies on other stacks. CloudBender resolves these into a dependency graph and provisions stacks in the correct order, parallelizing independent stacks where possible (CloudFormation stacks run in parallel; Pulumi stacks run sequentially due to thread-safety constraints).
| Variable | Description |
|---|---|
CLOUDBENDER_PROJECT_ROOT | Override the project root directory |
DISABLE_SOPS | Disable SOPS decryption for config files |
PULUMI_SKIP_UPDATE_CHECK | Set automatically in the container image |
# Install dependencies
just prepare
# Format code
just fmt
# Lint
just lint
# Run tests
just test
# Build distribution
just build
public.ecr.aws/zero-downtime/cloudbender:latestpip install cloudbenderFAQs
Deploy and maintain infrastructure in automated and trackable manner
We found that cloudbender demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Export Socket alert data to your own cloud storage in JSON, CSV, or Parquet, with flexible snapshot or incremental delivery.

Research
/Security News
Bitwarden CLI 2026.4.0 was compromised in the Checkmarx supply chain campaign after attackers abused a GitHub Action in Bitwarden’s CI/CD pipeline.

Research
/Security News
Docker and Socket have uncovered malicious Checkmarx KICS images and suspicious code extension releases in a broader supply chain compromise.