<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Selefra</title>
    <description>The latest articles on DEV Community by Selefra (@selefra).</description>
    <link>https://dev.to/selefra</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F6741%2F35447cb9-c7c4-4712-891b-dfdbf3b77b6f.png</url>
      <title>DEV Community: Selefra</title>
      <link>https://dev.to/selefra</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/selefra"/>
    <language>en</language>
    <item>
      <title>Introducing Selefra’s GPT Feature: Insight Multi-Cloud and SaaS by GPT</title>
      <dc:creator>Leonynn</dc:creator>
      <pubDate>Mon, 17 Apr 2023 10:52:13 +0000</pubDate>
      <link>https://dev.to/selefra/introducing-selefras-gpt-feature-insight-multi-cloud-and-saas-by-gpt-3h3i</link>
      <guid>https://dev.to/selefra/introducing-selefras-gpt-feature-insight-multi-cloud-and-saas-by-gpt-3h3i</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--qCYIkMoP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2q29feyvisxzizsiwqdu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--qCYIkMoP--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/2q29feyvisxzizsiwqdu.png" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;br&gt;
We are excited to introduce Selefra GPT Feature(beta), this is an exciting feature. It is supported by OpenAI's large language model GPT-3.5/GPT-4 and Selefra.&lt;/p&gt;

&lt;p&gt;In the past, it was very complicated for us to collect and analyze data centrally on the infrastructure, so we built Selefra to solve this problem. However, insight into infrastructure still requires expertise in areas such as security, compliance, cost, and so on. Until the recent arrival of generative AI, we found that the GPT4 model already has the basic expertise.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--v9UtSRLz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5thcii3oyk02kdjurop4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--v9UtSRLz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/5thcii3oyk02kdjurop4.png" alt="Image description" width="800" height="446"&gt;&lt;/a&gt;&lt;br&gt;
With Selefra GPT, you don't need to be an expert in areas such as security, cost analysis, architecture, and so on, to get the most basic risk insight from the data. By combining OpenAI and Selefra, we analyze the architectural data of the infrastructure through artificial intelligence technology to provide high-quality insights into business stability and security.&lt;/p&gt;

&lt;h2&gt;
  
  
  Exploring sample use cases
&lt;/h2&gt;

&lt;p&gt;In the following examples, We will show you how to analyze security, cost, and architecture through Selefra GPT.&lt;/p&gt;

&lt;h3&gt;
  
  
  Detection of AWS S3 for serious vulnerabilities
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;selefra gpt "Please help me analyze the vulnerabilities in AWS S3?"&lt;/code&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pfYF8E6Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9llh3209hv6jcfog6mz7.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pfYF8E6Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9llh3209hv6jcfog6mz7.gif" alt="Image description" width="800" height="411"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Check if there is a waste of cost in AWS EC2
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;selefra gpt "Help me query AWS EC2 volumes that are not attached to an instance"&lt;/code&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--b4qs2d6z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nsslj6z4goxgxsc9xmrq.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--b4qs2d6z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/nsslj6z4goxgxsc9xmrq.gif" alt="Image description" width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Check whether GCP has architecture design defects
&lt;/h3&gt;

&lt;p&gt;&lt;code&gt;selefra gpt "Help me search for GCP users who do not have MFA activated"&lt;/code&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--OzD6UYgQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qx7uljeiolmd86tudahp.gif" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--OzD6UYgQ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_66%2Cw_800/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/qx7uljeiolmd86tudahp.gif" alt="Image description" width="800" height="425"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  How to Get Started
&lt;/h2&gt;

&lt;p&gt;Read detailed documentation for how to Get Started with Selefra.&lt;/p&gt;

&lt;p&gt;For Quick Start, run this demo, it should take less than a few minutes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Install Selefra&lt;br&gt;
&lt;code&gt;brew install selefra/tap/selefra&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Initialization project&lt;br&gt;
&lt;code&gt;mkdir selefra-demo &amp;amp;&amp;amp; cd selefra-demo &amp;amp;&amp;amp; selefra init&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Execute the GPT command for analysis&lt;br&gt;
&lt;code&gt;selefra gpt "your prompt"&lt;/code&gt;&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Try Selefra GPT Today
&lt;/h2&gt;

&lt;p&gt;If you are interested in Selefra after reading this article, give us a star at: &lt;a href="https://github.com/selefra/selefra"&gt;https://github.com/selefra/selefra&lt;/a&gt; ✨&lt;/p&gt;

&lt;p&gt;Join Our Slack Community and talk with Community: &lt;a href="https://selefra.io/community/join"&gt;https://selefra.io/community/join&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;More Selefra Links:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Official Website: &lt;a href="https://selefra.io"&gt;https://selefra.io&lt;/a&gt;&lt;br&gt;
Blog: &lt;a href="https://selefra.io/blog"&gt;https://selefra.io/blog&lt;/a&gt;&lt;br&gt;
Slack: &lt;a href="https://selefra.io/community/join"&gt;https://selefra.io/community/join&lt;/a&gt;&lt;br&gt;
Twitter: &lt;a href="https://twitter.com/SelefraCorp"&gt;https://twitter.com/SelefraCorp&lt;/a&gt;&lt;br&gt;
Reddit: &lt;a href="https://reddit.com/r/Selefra"&gt;https://reddit.com/r/Selefra&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are very excited to see what scenarios you will build using Selefra, and to grow together with Selefra!&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Selefra: The Open-Source Policy-as-Code Tool for Terraform and Multi-Cloud</title>
      <dc:creator>Leonynn</dc:creator>
      <pubDate>Tue, 21 Mar 2023 16:05:25 +0000</pubDate>
      <link>https://dev.to/selefra/selefra-the-open-source-policy-as-code-tool-for-terraform-and-muti-cloud-n4p</link>
      <guid>https://dev.to/selefra/selefra-the-open-source-policy-as-code-tool-for-terraform-and-muti-cloud-n4p</guid>
      <description>&lt;p&gt;We are excited to share the launch of Selefra with everyone, open-source policy-as-code software that provides analytics for multi-cloud and SaaS.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7JfI-Rcz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hm8edvpqkq5yp69j15f8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7JfI-Rcz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/hm8edvpqkq5yp69j15f8.png" alt="Selefra product positioning" width="880" height="587"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Why Selefra
&lt;/h2&gt;

&lt;p&gt;Several years ago, when I was researching new security attack techniques in public clouds, I had conversations with friends in positions such as CTO, CISO, and SRE. I found that everyone was using different tools, either self-developed or off-the-shelf, to solve various problems in multi-cloud scenarios, such as resource management and cost analysis. However, we all relied on the same basic principle of collecting data using APIs and SDKs provided by cloud service providers or SaaS vendors. I wondered if it was possible to build a multi-cloud analysis infrastructure tool since all cloud analysis scenarios in different fields require the same type of data. This tool could provide standard data collection and more flexible data analysis frameworks, allowing experts in different fields to focus on building analysis scenarios, rather than duplicating data development and learning different analysis languages. Just as Terraform has solved the problem of multi-cloud infrastructure construction as a representative Infrastructure as Code product, we hope to have a product that can solve the unified analysis problem of multi-cloud infrastructure.&lt;/p&gt;

&lt;p&gt;Our tool can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Meet the data analysis requirements of multi-cloud and SaaS services, and can customize data sources.&lt;/li&gt;
&lt;li&gt;Provide a simple analysis language.&lt;/li&gt;
&lt;li&gt;Manage analysis strategies in code.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;To meet these requirements, my team and I have spent the past year building an open-source tool for infrastructure analysis that supports common public cloud resource types. We hope to achieve our vision of providing customers with the ability to analyze all infrastructure through open-source means. We are excited to announce that today we are releasing this product as open-source. Selefra is a combination of Select and Infrastructure, and we hope customers can use Selefra to analyze infrastructure more easily, without spending too much time learning about data and specifications.&lt;/p&gt;

&lt;h2&gt;
  
  
  What’s Selefra
&lt;/h2&gt;

&lt;p&gt;Selefra means "select * from infrastructure". It is an open-source infrastructure-as-code software that provides analysis for multi-cloud and SaaS environments, including over 30 services such as AWS, GCP, Azure, Alibaba Cloud, Kubernetes, Github, Cloudflare, and Slack.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wDaiLjsU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lf3vhyf0nnzvpnxya9ji.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wDaiLjsU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/lf3vhyf0nnzvpnxya9ji.png" alt="Selefra Architecture Diagram" width="880" height="587"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;
  
  
  SQL is Simply Policy *&lt;strong&gt;&lt;em&gt;Language&lt;/em&gt;&lt;/strong&gt;*
&lt;/h3&gt;

&lt;p&gt;Selefra uses SQL+YAML to define policies, which means developers can easily define policies using familiar SQL syntax without having to learn new specific policy syntax. Based on the Terraform Provider, Selefra has built a rich data integration ecosystem. As a developer, you can easily develop and analyze policies for any infrastructure.&lt;/p&gt;

&lt;p&gt;For example, you can use SQL to analyze whether AWS S3 Buckets have a security risk of public write access:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;selefra&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;selefra-demo&lt;/span&gt;
  &lt;span class="na"&gt;cli_version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;latest&lt;/span&gt;
  &lt;span class="na"&gt;providers&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;aws&lt;/span&gt;
      &lt;span class="na"&gt;source&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;aws&lt;/span&gt;
      &lt;span class="na"&gt;version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;latest&lt;/span&gt;
&lt;span class="na"&gt;rules&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;bucket_resources&lt;/span&gt;
    &lt;span class="na"&gt;query&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;|&lt;/span&gt;
      &lt;span class="s"&gt;SELECT&lt;/span&gt;
        &lt;span class="s"&gt;DISTINCT(a1.*)&lt;/span&gt;
      &lt;span class="s"&gt;FROM&lt;/span&gt;
        &lt;span class="s"&gt;aws_s3_buckets a1,&lt;/span&gt;
        &lt;span class="s"&gt;aws_s3_bucket_grants a2&lt;/span&gt;
      &lt;span class="s"&gt;WHERE&lt;/span&gt;
       &lt;span class="s"&gt;a1.selefra_id = a2.aws_s3_buckets_selefra_id&lt;/span&gt;
        &lt;span class="s"&gt;AND a2.grantee :: jsonb -&amp;gt;&amp;gt; 'URI' = 'http://acs.amazonaws.com/groups/global/AllUsers'&lt;/span&gt;
        &lt;span class="s"&gt;AND a2.permission IN ('WRITE_ACP', 'FULL_CONTROL')&lt;/span&gt;
    &lt;span class="na"&gt;output&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;S3&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;bucket&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;acl&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;public&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;writable,&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;arn:&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;{{.arn}}&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;,&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;bucket&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;name:&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;{{.name}}"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;Additionally, you can use it to analyze whether the logging function is enabled for GCP Storage service:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight yaml"&gt;&lt;code&gt;&lt;span class="na"&gt;selefra&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;selefra-demo&lt;/span&gt;
  &lt;span class="na"&gt;cli_version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;latest&lt;/span&gt;
  &lt;span class="na"&gt;providers&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
    &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;gcp&lt;/span&gt;
      &lt;span class="na"&gt;source&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;gcp&lt;/span&gt;
      &lt;span class="na"&gt;version&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;latest&lt;/span&gt;
&lt;span class="na"&gt;rules&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt;
  &lt;span class="pi"&gt;-&lt;/span&gt; &lt;span class="na"&gt;name&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s"&gt;bucket_logging_disable&lt;/span&gt;
    &lt;span class="na"&gt;query&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="pi"&gt;|&lt;/span&gt;
      &lt;span class="s"&gt;SELECT&lt;/span&gt;
        &lt;span class="s"&gt;*&lt;/span&gt;
      &lt;span class="s"&gt;FROM&lt;/span&gt;
        &lt;span class="s"&gt;gcp_storage_buckets&lt;/span&gt;
      &lt;span class="s"&gt;WHERE&lt;/span&gt;
        &lt;span class="s"&gt;logging IS NULL&lt;/span&gt;
    &lt;span class="na"&gt;output&lt;/span&gt;&lt;span class="pi"&gt;:&lt;/span&gt; &lt;span class="s2"&gt;"&lt;/span&gt;&lt;span class="s"&gt;Bucket&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;logging&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;disable,&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;bucket&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;name:&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;{{.name}},&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;region:&lt;/span&gt;&lt;span class="nv"&gt; &lt;/span&gt;&lt;span class="s"&gt;{{.location}}"&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;For more examples of strategies, you can click to view the Selefra open-source example repository at &lt;a href="https://github.com/selefra/selefra-modules-aws-s3"&gt;https://github.com/selefra/selefra-modules-aws-s3&lt;/a&gt; or write the strategy you need based on the Selefra documentation at &lt;a href="https://www.selefra.io/docs/build-projects/overview"&gt;https://www.selefra.io/docs/build-projects/overview&lt;/a&gt;.&lt;/p&gt;

&lt;h3&gt;
  
  
  Feature of Selefra
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Policy-as-Code&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Custom analysis policies (security, compliance, cost) can be written through a combination of SQL and YAML.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Configuration of Multi-Cloud, Multi-SaaS&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Unified multi-cloud configuration data integration capabilities that can support analysis of configuration data from any cloud service via SQL.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Version Control&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Analysis policies can be managed through VCS such as GitHub/Gitlab.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Automation&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Policies can be automated to enforce compliance, security, and cost optimization rules through Scheduled tasks and cloud automation tools.&lt;/p&gt;

&lt;h2&gt;
  
  
  How to use
&lt;/h2&gt;

&lt;p&gt;Read detailed documentation for how to &lt;a href="https://selefra.io/docs/get-started/"&gt;Get Started&lt;/a&gt; with Selefra.&lt;/p&gt;

&lt;p&gt;For Quick Start, run this demo, it should take less than a few minutes:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Install Selefra&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For non-macOS users, other &lt;a href="https://www.selefra.io/docs/get-started"&gt;installation methods&lt;/a&gt; for Selefra.  &lt;/p&gt;

&lt;p&gt;On macOS, tap Selefra with Homebrew:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;brew tap selefra/tap
&lt;/code&gt;&lt;/pre&gt;


&lt;p&gt;Next, install Selefra:&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;brew install selefra/tap/selefra
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Initialization project&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;mkdir selefra-demo &amp;amp;&amp;amp; cd selefra-demo &amp;amp;&amp;amp; selefra init
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Build code&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;selefra apply
&lt;/code&gt;&lt;/pre&gt;

&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Selefra Roadmap
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Scale provider coverage for AWS, GCP, Azure, K8S, etc. to aim for 100% resource coverage.&lt;/li&gt;
&lt;li&gt;Support Terraform, Pulumi, Crossplane, and other mainstream IaC tools to enable rules during deployment and in production.&lt;/li&gt;
&lt;li&gt;Scale to 30 more SaaS providers, reaching a total of 70 providers.&lt;/li&gt;
&lt;li&gt;We welcome your feedback on our roadmap regarding requirements and bugs: &lt;a href="https://github.com/orgs/selefra/projects/1"&gt;https://github.com/orgs/selefra/projects/1&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;Supporting Quotes&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Salamanka,  Senior Information Security Manager, Advance Group&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Selefra effectively detects and identifies security risks in cloud platforms, helping to ensure their security compliance and establish a secure baseline, thereby reducing our concerns about using cloud platforms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Jay, CTO, Airgram&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Selefra can help us analyze AWS IAM, which we believe is the most difficult part of AWS, and it greatly improves our efficiency.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Zijie He, HashiCorp Ambassador&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Selefra is an ambitious and imaginative open-source software tool that creatively converts IaC resources into SQL tables, making it possible to establish superstructures based on any multi-cloud infrastructure resources, including but not limited to compliance policy, FinOps, etc.&lt;/p&gt;

&lt;h2&gt;
  
  
  Wrapping Up
&lt;/h2&gt;

&lt;p&gt;If you are interested in Selefra after reading this article, please click here to know more: &lt;a href="https://github.com/toeverything/AFFiNE"&gt;https://github.com/selefra/selefra&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;If you have any questions about productivity tools or Selefra products, please feel free to ask questions on Reddit: &lt;a href="https://www.reddit.com/r/Selefra/"&gt;https://www.reddit.com/r/Selefra&lt;/a&gt;  or report a bug on our &lt;a href="https://github.com/selefra/selefra/issues/new/choose"&gt;GitHub&lt;/a&gt; and join our &lt;a href="https://selefra.io/community/join"&gt;Slack Community&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We are eager to work with excellent individuals who are passionate about infrastructure development, data engineering, and other related fields to build our products together, and we welcome all kinds of contributions.&lt;/p&gt;

&lt;p&gt;Join us on Slack and at our weekly open-source community meetups: &lt;a href="https://selefra.io/community/join"&gt;https://selefra.io/community/join&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;More Selefra Links:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Official Website: &lt;a href="https://selefra.io"&gt;https://selefra.io&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Blog: &lt;a href="https://selefra.io/blog"&gt;https://selefra.io/blog&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Slack: &lt;a href="https://selefra.io/community/join"&gt;https://selefra.io/community/join&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Twitter: &lt;a href="https://twitter.com/AffineOfficial"&gt;https://twitter.com/SelefraCorp&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Reddit: &lt;a href="https://reddit.com/r/Selefra/"&gt;https://reddit.com/r/Selefra&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;We are very excited to see what scenarios you will build using Selefra, and to grow together with Selefra!&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>aws</category>
      <category>cloud</category>
      <category>terraform</category>
    </item>
  </channel>
</rss>
