Titan Core helps you provision, deploy, and secure resources in Snowflake. It replaces tools like Terraform, Schemachange, or Permifrost.
Deploy any Snowflake resource, including users, roles, schemas, databases, integrations, pipes, stages, functions, stored procedures, and more. Convert adhoc, bug-prone SQL management scripts into simple, repeatable configuration.
Titan Core is for:
- DevOps engineers looking to automate and manage Snowflake infrastructure.
- Analytics engineers working with dbt who want to manage Snowflake resources without macros.
- Data platform teams who need to reliably manage Snowflake with CI/CD.
- Organizations that prefer a git-based workflow for infrastructure management.
- Teams seeking to replace Terraform for Snowflake-related tasks.
╔══════════╗ ╔═══════════╗
║ CONFIG ║ ║ SNOWFLAKE ║
╚══════════╝ ╚═══════════╝
┏━━━━━━━━━━━┓ ┏━━━━━━━━━━━┓
┌─┫ WAREHOUSE ┣─────┐ ┌─┫ WAREHOUSE ┣───────────┐
│ ┗━━━━━━━━━━━┛ │ ALTER │ ┗━━━━━━━━━━━┛ │
│ name: ETL │─────┐ ┌─ WAREHOUSE ─▶│ name: ETL │
│ auto_suspend: 60 │ │ │ │ auto_suspend: 300 -> 60 │
└───────────────────┘ ╔══▼═══════════╩═╗ └─────────────────────────┘
║ ║
║ TITAN CORE ║
┏━━━━━━┓ ║ ║ ┏━━━━━━┓
┌─┫ ROLE ┣──────────┐ ╚══▲═══════════╦═╝ ┌─┫ ROLE ┣────────────────┐
│ ┗━━━━━━┛ │ │ │ │ ┗━━━━━━┛ │
│ name: TRANSFORMER │─────┘ └─ CREATE ────▶│ name: TRANSFORMER │
└───────────────────┘ ROLE └─────────────────────────┘
-
Declarative » Generates the right SQL to make your config and account match
-
Comprehensive » Nearly every Snowflake resource is supported
-
Flexible » Write resource configuration in YAML or Python
-
Fast » Titan Core runs 50-90% faster than Terraform and Permifrost
-
Migration-friendly » Generate config automatically with the export CLI
This project is licensed under the Apache 2.0 License - see LICENSE for details. The source code for Titan Core is available on Github.
You can find comprehensive Titan Core documentation on GitBook.
If you're new, the best place to start is with the Python package.
python -m venv .venv
source .venv/bin/activate
python -m pip install titan-core
python -m venv .venv
.\.venv\Scripts\activate
python -m pip install titan-core
import os
import snowflake.connector
from titan.blueprint import Blueprint, print_plan
from titan.resources import Grant, Role, Warehouse
# Configure resources by instantiating Python objects.
role = Role(name="transformer")
warehouse = Warehouse(
name="transforming",
warehouse_size="large",
auto_suspend=60,
)
usage_grant = Grant(priv="usage", to=role, on=warehouse)
# Titan compares your config to a Snowflake account. Create a Snowflake
# connection to allow Titan to connect to your account.
connection_params = {
"account": os.environ["SNOWFLAKE_ACCOUNT"],
"user": os.environ["SNOWFLAKE_USER"],
"password": os.environ["SNOWFLAKE_PASSWORD"],
"role": "SYSADMIN",
}
session = snowflake.connector.connect(**connection_params)
# Create a Blueprint and pass your resources into it. A Blueprint helps you
# validate and deploy a set of resources.
bp = Blueprint(resources=[
role,
warehouse,
usage_grant,
])
# Blueprint works like Terraform. Calling plan(...) will compare your config
# to the state of your Snowflake account and return a list of changes.
plan = bp.plan(session)
print_plan(plan) # =>
"""
» titan core
» Plan: 4 to add, 0 to change, 0 to destroy.
+ urn::ABCD123:warehouse/transforming {
+ name = "transforming"
+ owner = "SYSADMIN"
+ warehouse_type = "STANDARD"
+ warehouse_size = "LARGE"
...
}
+ urn::ABCD123:role/transformer {
+ name = "transformer"
+ owner = "USERADMIN"
+ tags = None
+ comment = None
}
+ urn::ABCD123:grant/TRANSFORMER?priv=USAGE&on=warehouse/TRANSFORMING {
+ priv = "USAGE"
+ on = "transforming"
+ on_type = "WAREHOUSE"
+ to = TRANSFORMER
...
}
"""
# Calling apply(...) will convert your plan into the right set of SQL commands
# and run them against your Snowflake account.
bp.apply(session, plan) # =>
"""
[TITAN_USER:SYSADMIN] > USE SECONDARY ROLES ALL
[TITAN_USER:SYSADMIN] > CREATE WAREHOUSE TRANSFORMING warehouse_type = STANDARD ...
[TITAN_USER:SYSADMIN] > USE ROLE USERADMIN
[TITAN_USER:USERADMIN] > CREATE ROLE TRANSFORMER
[TITAN_USER:USERADMIN] > USE ROLE SYSADMIN
[TITAN_USER:SYSADMIN] > GRANT USAGE ON WAREHOUSE transforming TO TRANSFORMER
"""
You can use the CLI to generate a plan, apply a plan, or export resources. To use the CLI, install the Python package and call python -m titan
from the command line.
The CLI allows you to plan
and apply
a Titan Core YAML config. You can specify a single input file or a directory of configs.
In addition to plan
and apply
, the CLI also allows you to export
resources. This makes it easy to generate a config for an existing Snowflake environment.
To connect with Snowflake, the CLI uses environment variables. The following `are supported:
SNOWFLAKE_ACCOUNT
SNOWFLAKE_USER
SNOWFLAKE_PASSWORD
SNOWFLAKE_DATABASE
SNOWFLAKE_SCHEMA
SNOWFLAKE_ROLE
SNOWFLAKE_WAREHOUSE
SNOWFLAKE_MFA_PASSCODE
SNOWFLAKE_AUTHENTICATOR
Show the help message
titan --help
# Usage: titan [OPTIONS] COMMAND [ARGS]...
#
# titan core helps you manage your Snowflake environment.
#
# Options:
# --help Show this message and exit.
#
# Commands:
# apply Apply a resource config to a Snowflake account
# connect Test the connection to Snowflake
# export Generate a resource config for existing Snowflake resources
# plan Compare a resource config to the current state of Snowflake
Apply a resource config to Snowflake
# Create a resource config file
cat <<EOF > titan.yml
roles:
- name: transformer
warehouses:
- name: transforming
warehouse_size: LARGE
auto_suspend: 60
grants:
- to_role: transformer
priv: usage
on_warehouse: transforming
EOF
# Set connection variables
export SNOWFLAKE_ACCOUNT="my-account"
export SNOWFLAKE_USER="my-user"
export SNOWFLAKE_PASSWORD="my-password"
# Generate a plan
titan plan --config titan.yml
# Apply the config
titan apply --config titan.yml
Export existing Snowflake resources to YAML.
titan export \
--resource=warehouse,grant,role \
--out=titan.yml
The Titan Core Python package installs the CLI script titan
. You can alternatively use Python CLI module syntax if you need fine-grained control over the Python environment.
python -m titan plan --config titan.yml
The Titan Core GitHub Action allows you to automate the deployment of Snowflake resources using a git-based workflow.
-- .github/workflows/titan.yml
name: Deploy to Snowflake with Titan
on:
push:
branches: [ main ]
paths:
- 'titan/**'
jobs:
deploy:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Deploy to Snowflake
uses: Titan-Systems/titan-core-action@main
with:
run-mode: 'create-or-update'
resource-path: './titan'
allowlist: 'warehouse,role,grant'
dry-run: 'false'
env:
SNOWFLAKE_ACCOUNT: ${{ secrets.SNOWFLAKE_ACCOUNT }}
SNOWFLAKE_USER: ${{ secrets.SNOWFLAKE_USER }}
SNOWFLAKE_PASSWORD: ${{ secrets.SNOWFLAKE_PASSWORD }}
SNOWFLAKE_ROLE: ${{ secrets.SNOWFLAKE_ROLE }}
SNOWFLAKE_WAREHOUSE: ${{ secrets.SNOWFLAKE_WAREHOUSE }}
- Titan Core uses names as unique identifiers. Renaming a resource will create a new one.
- Titan Core is not an ORM. It's not built to replace tools like SQLAlchemy.
- Titan Core is under active development. Some resources are not yet supported.
Feature | Titan Core | Terraform | Schemachange | Permifrost | SnowDDL |
---|---|---|---|---|---|
Plan and Execute Changes | ✅ | ✅ | ❌ | ✅ | ✅ |
Declarative Config | ✅ | ✅ | ❌ | ✅ | ✅ |
No State File Dependency | ✅ | ❌ | ✅ | ✅ | ✅ |
Python-Based Definitions | ✅ | w/ CDKTF | ❌ | ❌ | ✅ |
SQL Support | ✅ | ❌ | ✅ | ❌ | ❌ |
Dynamic Role Switching | ✅ | ❌ | N/A | ❌ | ❌ |
Export Snowflake resources | ✅ | ❌ | ❌ | ❌ | ❌ |
Terraform is an infrastructure-as-code tool using the HCL config language.
The Snowflake provider for Terraform is limited to 1 role per provider. This limitation is at odds with Snowflake's design, which is built to use multiple roles. This mismatch forces you into a complex multi-provider setup which can result in drift, permission errors, and broken plans.
Titan Core streamlines this with dynamic role switching. Titan Core automatically detects which role is needed for a given change, and switches to that role before making it. This speeds up development cycles and helps eliminate the use of ACCOUNTADMIN
.
Titan Core doesn't use a state file. This provides more accurate plans and eliminates issues with stale state.
Schemachange is a database migration tool based on Flyway. It uses SQL scripts to deploy resources to different environments.
Schemachange is an imperative migration tool. For developers, that means you must know Snowflake's current state and the exact SQL commands needed to update it to the desired state. If environments get changed outside of the tool, your migration scripts may need significant adjustments.
Titan Core simplifies this with a declarative approach. With Titan Core, just define what an environment should look like, you don't need to know the detailed steps or SQL commands needed to get there.
Declarative config is less error-prone and more scalable, especially in dynamic and complex data environments.
Permifrost is an access-management tool for Snowflake. It helps you automate the creation of users, roles, and grants. Permifrost only manages permissions, it doesn't manage any other aspect of your Snowflake account.
Permifrost can be very slow. Running simple Permifrost configs can take minutes to run. Titan Core is designed to run in seconds, even with complex environments.
SnowDDL is a declarative object management tool for Snowflake, similar to Titan Core. It uses a streamlined permissions model that simplifies granting read and write access to databases and schemas.
SnowDDL takes a strongly opinionated stance on roles in Snowflake. If you don't need a 3-tier role heirarchy, SnowDDL may not be a good fit.
- ✅ Supported
- 🚧 Unstable
- ❌ Not Yet Supported
Name | Supported |
---|---|
Account Resources | |
Account Parameter | ✅ |
API Integration | ✅ |
Catalog Integration | |
↳ Glue | ✅ |
↳ Object Store | ✅ |
Compute Pool | ✅ |
Connection | ❌ |
Database | ✅ |
External Access Integration | ✅ |
External Volume | ✅ |
Failover Group | 🚧 |
Grant | |
↳ Future Grant | ✅ |
↳ Privilege Grant | ✅ |
↳ Role Grant | ✅ |
Network Policy | ✅ |
Notification Integration | |
🚧 | |
↳ AWS | 🚧 |
↳ Azure | 🚧 |
↳ GCP | 🚧 |
Replication Group | 🚧 |
Resource Monitor | ✅ |
Role | ✅ |
Role Grant | ✅ |
Scanner Package | ✅ |
Security Integration | |
↳ External API | ❌ |
↳ External OAuth | ❌ |
↳ Snowflake OAuth | 🚧 |
↳ SAML2 | ❌ |
↳ SCIM | ❌ |
Share | ✅ |
Storage Integration | |
↳ AWS | ✅ |
↳ Azure | ✅ |
↳ GCS | ✅ |
Tag Reference | ✅ |
User | ✅ |
Warehouse | ✅ |
Database Resources | |
Database Role | ✅ |
Schema | ✅ |
Schema Resources | |
Aggregation Policy | ✅ |
Alert | ✅ |
Authentication Policy | ✅ |
Dynamic Table | ✅ |
Event Table | ✅ |
External Function | 🚧 |
External Table | ❌ |
File Format | |
↳ CSV | ✅ |
↳ JSON | ✅ |
↳ AVRO | ❌ |
↳ ORC | ❌ |
↳ Parquet | ✅ |
Hybrid Table | 🚧 |
Iceberg Table | |
↳ Snowflake Catalog | ✅ |
↳ AWS Glue | ❌ |
↳ Iceberg files | ❌ |
↳ Delta files | ❌ |
↳ REST Catalog | ❌ |
↳ Open Catalog | ❌ |
Image Repository | ✅ |
Masking Policy | ❌ |
Materialized View | 🚧 |
Model | ❌ |
Network Rule | ✅ |
Notebook | ✅ |
Packages Policy | ✅ |
Password Policy | ✅ |
Pipe | ✅ |
Projection Policy | ❌ |
Row Access Policy | ❌ |
Secret | |
↳ Generic | ✅ |
↳ OAuth | ✅ |
↳ Password | ✅ |
Sequence | ✅ |
Service | ✅ |
Session Policy | 🚧 |
Stage | ✅ |
↳ External | ✅ |
↳ Internal | ✅ |
Stored Procedure | |
↳ Java | ❌ |
↳ Javascript | ❌ |
↳ Python | 🚧 |
↳ Scala | ❌ |
↳ SQL | ❌ |
Stream | |
↳ External Table | ❌ |
↳ Stage | ✅ |
↳ Table | ✅ |
↳ View | ✅ |
Streamlit | ❌ |
Table | 🚧 |
Tag | ✅ |
Task | ✅ |
User-Defined Function | |
↳ Java | ❌ |
↳ Javascript | 🚧 |
↳ Python | ✅ |
↳ Scala | ❌ |
↳ SQL | ❌ |
View | ✅ |
Please create a GitHub issue if there's a resource you need that isn't currently supported.
Contributions are welcome! Titan Core does not require a contributor license agreement.
If you got this far, don't forget to star this repo.