Pulumi Agent Skills: Best practices and more for AI coding assistants

Pulumi Neo Team Pulumi Neo Team
Pulumi Agent Skills: Best practices and more for AI coding assistants

AI coding assistants have transformed how developers write software, including infrastructure code. Tools like Claude Code, Cursor, and GitHub Copilot can generate code, explain complex systems, and automate tedious tasks. But when it comes to infrastructure, these tools often produce code that works but misses the mark on patterns that matter: proper secret handling, correct resource dependencies, idiomatic component structure, and the dozens of other details that separate working infrastructure from production-ready infrastructure.

Read more →

Manage Cloud Visibility and Governance with Infrastructure as Code

Pulumi Insights Team Pulumi Insights Team
Manage Cloud Visibility and Governance with Infrastructure as Code

Do you know what cloud resources are running in your environment right now? Many organizations struggle to maintain visibility across their cloud estate, especially for resources created outside of infrastructure as code. Without complete visibility, you can’t enforce compliance, optimize costs, or identify security risks.

Today, we’re excited to announce new resources in the Pulumi Service Provider that solve this problem by enabling you to discover all cloud resources and enforce governance policies programmatically using infrastructure as code.

Read more →

Deploy Moltbot on AWS or Hetzner Securely with Pulumi and Tailscale

Engin Diri Engin Diri
Deploy Moltbot on AWS or Hetzner Securely with Pulumi and Tailscale

Update (January 2026): Clawdbot is now Moltbot (and Clawd is now Molty). Anthropic asked for the change due to trademark issues. The CLI command is now moltbot and the new handle is @moltbot.

Moltbot is everywhere right now. The open-source AI assistant gained 9,000 GitHub stars in a single day, received public praise from former Tesla AI head Andrej Karpathy, and has sparked a global run on Mac Minis as developers scramble to give this “lobster assistant” a home. Users are calling it “Jarvis living in a hard drive” and “Claude with hands”—the personal AI assistant that Siri promised but never delivered.

Read more →

New in Pulumi IaC: `replacementTrigger` Resource Option

Tom Harding Tom Harding
New in Pulumi IaC: `replacementTrigger` Resource Option

Pulumi IaC gives us a declarative interface to updates. When we perform an update, Pulumi calculates the difference between your currently deployed infrastructure and what is being proposed, then deploys only what is required to migrate from the old state to the new state. Normally, this is exactly what we want: we minimize the amount of work required to perform the update, and don’t recreate anything unnecessarily. However, every now and then, we want to override this behavior.

Read more →

Neo: Zero-downtime migration from CDK, Terraform & Azure ARM

Pulumi Neo Team Pulumi Neo Team
Neo: Zero-downtime migration from CDK, Terraform & Azure ARM

The barrier to migrating to Pulumi has always been the infrastructure you already have. Your existing resources can’t be disrupted, and manually importing them into a new tool is risky and time-consuming. Today, we’re excited to share how Neo removes this barrier entirely with automated, zero-downtime migration to Pulumi from AWS CDK, AWS CloudFormation, Terraform, CDKTF, and Azure ARM templates.

Read more →

Introducing the new and improved ESC Editor

Introducing the new and improved ESC Editor

Pulumi ESC is Pulumi Cloud’s centralized solution for managing secrets and configuration across every vault and cloud provider you use. It helps teams secure their configuration while adopting modern best practices like short-lived credentials with OIDC and automated secret rotation.

Whether you’re configuring Pulumi programs, powering applications and services, or managing credentials for tools like the AWS CLI, ESC provides a single, consistent way to do it safely and at scale.

Behind the scenes, ESC integrates with multiple cloud providers and secret managers, supports composable environments, and offers rich built-in functions, from simple value transformations to encoding files as Base64.

With this level of power, usability matters more than ever. That’s why today we’re introducing the new and improved Pulumi ESC Web Editor, designed to make managing secrets and configuration easier, faster, and more intuitive.

Read more →

How Ralph Wiggum Built a Serverless SaaS with Pulumi

Engin Diri Engin Diri
How Ralph Wiggum Built a Serverless SaaS with Pulumi

I was about to do something that felt either genius or completely reckless: hand over my AWS credentials to an AI and step away from my computer. The technique is called “Ralph Wiggum,” named after the Simpsons character who eats glue and says “I’m in danger” while everything burns around him. And honestly, that felt about right for what I was attempting.

Read more →

Kubernetes ConfigMap Revisions with Pulumi

Matan Baruch Matan Baruch
Kubernetes ConfigMap Revisions with Pulumi

ConfigMaps in Kubernetes don’t have built-in revision support, which can create challenges when deploying applications with canary strategies. When using Argo Rollouts with AWS Spot instances, ConfigMap deletions during canary deployments can cause older pods to fail when they try to reload configuration. We solved this by implementing a custom ConfigMap revision system using Pulumi’s ConfigMapPatch and Kubernetes owner references.

Read more →