[HN Gopher] Launch HN: Massdriver (YC W22) - Self-serve cloud in...
       ___________________________________________________________________
        
       Launch HN: Massdriver (YC W22) - Self-serve cloud infra without the
       red tape
        
       Hi HN! We're Cory, Dave, and Chris, the founders of Massdriver
       (https://www.massdriver.cloud/), an infrastructure automation
       platform. Massdriver enforces organizational standards and delivers
       consistent, compliant deployments--no more endless approvals, red
       tape, or broken Terraform plans.  Here's a demo video:
       https://www.youtube.com/watch?v=m6T5p0qXcFE&t=4s  Infrastructure as
       Code (IaC) workflows were designed to help developers and work fine
       for small teams, but as organizations scale, they create
       bottlenecks, complexity, and endless firefighting.  After decades
       in ops and platform engineering, we kept running into the same
       problems: brittle pipelines (Terraform variables and input checks
       don't catch errors until it's too late), poor compliance
       integration (issues are caught during CI/CD, but by then, delays
       and rework are already inevitable), and a patchwork of tools that
       developers are forced to learn (Terraform, Kubernetes manifests,
       cloud APIs), adding more work and turning them into junior devops
       engineers when they should be shipping value.  We were working on a
       side project and ended up doing the Spider-Man pointing-meme: two
       experienced ops guys, neither wanting to touch the infrastructure.
       We started asking why. The "boring parts" weren't just boring--they
       were time-consuming and error-prone, especially at scale. What if
       we didn't just automate provisioning but handled all the messy
       stuff (permissions, compliance, networking, security groups)
       upfront? That's when we realized we could encode ops knowledge
       directly into modules and let developers work off those.  The hard
       part isn't just technical, it's socio-technical. Conway's Law is
       inescapable, and nowhere is its impact more painful than at the
       intersection of development, operations, and cloud APIs. Everyone
       talks about cloud complexity, but the real challenge is navigating
       the messy intersection of tools, teams, and processes. Ops teams
       want control, devs want speed, and compliance creates friction
       between them.  The traditional answer has been patchwork solutions
       like GitOps or retroactive guardrails, but these tend to shift
       complexity around instead of eliminating it. This often results in
       an ever-expanding CI/CD toolchain, where teams must maintain
       complex workflows just to enforce policies and validate
       infrastructure, adding friction rather than reducing it. We think
       the real challenge is designing abstractions that are simple enough
       for developers but powerful enough for ops.  Massdriver lets ops
       teams define reusable infrastructure modules that handle
       everything: provisioning, permissions, compliance, and cost
       constraints. Developers don't write IaC or navigate cloud APIs--
       they draw a diagram to describe their architecture, and Massdriver
       provisions resources using those modules. Compliance and security
       rules are enforced proactively, and ephemeral CI/CD pipelines are
       spun up automatically. The result: no more brittle pipelines or
       last-minute guardrails.  How it works:  (1) We turn IaC into
       functional modules: use tools like Terraform/OpenTofu, Helm, or
       CloudFormation to create reusable modules with built-in validation,
       policies, and metadata for visualization and self-service.  (2)
       Stop pushing IaC code through pipelines: Instead of managing
       configuration changes in Git repos, create modules as releases--
       packaged and ready to deploy. Each release bundles both the IaC and
       policy tooling (e.g., Checkov, OPA), so developers don't have to
       copy and maintain separate workflows. These checks are enforced
       automatically as part of Massdriver's ephemeral CI/CD process,
       making it impossible to bypass them.  (3) Self-service with APIs
       and visual tools: provision infrastructure by interacting with pre-
       approved modules, without dealing directly with low-level IaC code
       or brittle YAML pipelines.  Massdriver is live, and we'd love to
       hear your thoughts on our approach to the IaC problem. If you're
       interested in learning more about how we simplify configuration
       management, check out our demo video--here's the link again:
       https://www.youtube.com/watch?v=m6T5p0qXcFE&t=4s  Thanks for
       reading. We're excited to hear what you think!
        
       Author : coryodaniel
       Score  : 48 points
       Date   : 2025-02-21 16:19 UTC (6 hours ago)
        
       | JojoFatsani wrote:
       | How much do you have to pay Hightower and Majors to show up on
       | the About Us page?
        
         | zellyn wrote:
         | Kelsey is a technical advisor to MassDriver. He introduced them
         | on this live chat: https://www.youtube.com/watch?v=LKmKxKafdS0
        
           | zellyn wrote:
           | fwiw, the part in that demo where they add one type of
           | object, and it automatically added the necessary related
           | objects due to the inputs and outputs being typed is :chefs-
           | kiss:
        
       | hkwerf wrote:
       | Just an FYI: If I select "Features" / "API First" on your page, I
       | end up at a 404.
        
         | coryodaniel wrote:
         | Thanks, restructured the docs site recently. Updating now!
        
       | written-beyond wrote:
       | Congrats on the launch!
       | 
       | I'm not a seasoned DevOps professional but I'm usually the one
       | who ends up provisioning or setting up VMs, serverless stuff and
       | DBs. I just don't understand the product.
       | 
       | You make reusable TF modules that have security and policies
       | baked in. Engineers use a UI to hookup those modules and
       | Massdriver does the deployment work for you.
       | 
       | Sounds like a godsend for big teams but I don't see pre-funded
       | Startups being able to afford a $500/mo fee. For funded ones
       | that's highly approachable but their problems with their IaC
       | wouldn't be as visible.
       | 
       | Honestly, in smaller teams you can get pretty far with just
       | setting thing sup through your cloud providers web console and
       | just focus on what your building.
       | 
       | Since the fee is kind of steep, what's the justification for
       | this. Is it that the workflow improvements would significantly
       | improve productivity which would justify the cost or is the
       | service itself expensive to run and maintain.
        
         | coryodaniel wrote:
         | Thanks! And ... you're right!
         | 
         | Massdriver isn't aimed at pre-funded startups. Early-stage
         | teams are often better off with a PaaS or setting things up
         | manually until ops challenges become a bottleneck.
         | 
         | Our pricing (5-seat minimum) is intentional to dissuade smaller
         | teams. The real value kicks in when teams need self-service.
         | Ops teams build the modules (not us), and Massdriver acts as
         | the interface. Developers diagram what they need, and
         | Massdriver provisions using the ops team's standards. This
         | keeps developers focused on building while giving ops
         | visibility and control over what's deployed.
        
           | written-beyond wrote:
           | So does mass driver become a single source of truth for all
           | information about my companies entire cloud or does it only
           | maintain a track of what's been deployed through it.
           | 
           | I have a friend whos a manager at a large e-commerce company
           | who's teams entire responsibility is to oversee all matters
           | regarding their private and public cloud usage. They also
           | manage and maintain services for internal use.
           | 
           | I would love to recommend you guys to them because managing
           | deployments from over a dozen teams located around the world
           | is hell for them. However they have an extensive private
           | cloud setup, would your solution be as applicable to them as
           | it is to companies running on public clouds?
        
             | coryodaniel wrote:
             | It is a single source of truth, but only what is managed
             | through the platform.
             | 
             | Private cloud isn't the best experience right now, its
             | possible, but it requires our platform being able to 'get
             | inside' so we either need a control plane exposed to us or
             | a VPN connection in.
             | 
             | Self-hosted is our #1 requested feature, so we are cranking
             | away at it. Its in alpha, and we're looking for
             | testers/feedback. Would love an intro!
        
             | reachableceo wrote:
             | If this is for the company I think it is for, they won't
             | use this as they have a very strong NIH culture.
        
       | ge96 wrote:
       | damn thought it'd be a space launch platform
        
         | coryodaniel wrote:
         | If I become a billionaire from this, that's my next startup.
        
       | tnolet wrote:
       | Wanted to check your status page to get a feeling for stability.
       | Is your status icon in the footer hard coded, or is there an
       | actual status page?
        
         | coryodaniel wrote:
         | It hits our public health check. We don't have a dedicated page
         | for our different systems, but this is on our radar.
        
       | varun_chopra wrote:
       | Oh boy, I have so many questions...
       | 
       | * You want to simplify infrastructure, but there's a new learning
       | curve here. Why did you decide to go with diagramming as a
       | solution? What other methods did you evaluate and discard?
       | 
       | * How does an organization with existing infrastructure implement
       | Massdriver?
       | 
       | * How do you handle edge cases, custom configurations, complex
       | logic, etc.? For example, workflows that use custom scripts or
       | some other form of band-aid.
       | 
       | * The visual approach could make it too easy to piece together
       | infrastructure without understanding the implications. How do you
       | prevent developers from creating poorly architected systems just
       | because you make it simple to connect components?
       | 
       | * When things go wrong, how do developers debug issues at the
       | infrastructure level? Do they reach out to ops?
        
         | coryodaniel wrote:
         | I'm here for the questions!
         | 
         | > * You want to simplify infrastructure, but there's a new
         | learning curve here. Why did you decide to go with diagramming
         | as a solution? What other methods did you evaluate and discard?
         | 
         | We try to make it so both teams have to learn as little as
         | possible. For the ops team, we are built on the tools those
         | teams are familiar with terraform, helm, ansible, etc. Our
         | extension model is also ops-oriented. You add add'l
         | provisioners by writing Dockerfiles, you enforce pre-
         | validations with JSON Schema (this is the best we could come up
         | w/, but figured it was a safe bet ops-wise since its a part of
         | OpenAPI). For devs, they dont have to learn the ops teams tools
         | to provision infrastructure, they just diagram. Massdriver was
         | originally a wall of YAML to connect all the pieces, but it
         | felt fumbly (and like everything else).
         | 
         | I wanted to make a VR version like something youd see in a bad
         | hacker movie, but Dave told me not to get ahead of myself. :D
         | 
         | > * How does an organization with existing infrastructure
         | implement Massdriver?
         | 
         | Depends on if they have IaC or not. If they have IaC, they
         | publish the modules. If their IaC has a state backend, its
         | usually just good to go, if they are using localfiles for
         | state, we offer a state server they can push state into.
         | 
         | If teams dont have IaC, we run workshops on "reverse
         | terraforming" or "tofuing" and also offer professional services
         | to codify that stuff for you.
         | 
         | > * How do you handle edge cases, custom configurations,
         | complex logic, etc.? For example, workflows that use custom
         | scripts or some other form of band-aid.
         | 
         | As noted above, its all based off common ops tooling. Lets say
         | you wanted to use a new sec scanning tool for IaC and we don't
         | have it in our base provisioners, you can write a dockerfile,
         | build the image, then you can include that scanning tool in any
         | of your massdriver configs. We also have folks doing day-2
         | operations with the platform. Things like database migrations
         | and whatnot. The lines in the graph actually carry information
         | and can push that info across different tools, so you can do
         | things like have helm charts get information from a terraform
         | run. You can build a provisioner with say the psql tool or a
         | helm chart running bucardo and use it to set up replication
         | between an old and new postgres instance.
         | 
         | > * The visual approach could make it too easy to piece
         | together infrastructure without understanding the implications.
         | How do you prevent developers from creating poorly architected
         | systems just because you make it simple to connect components?
         | 
         | The lines and connections are actually a type system that you
         | can extend (also based on JSON Schema). That way ops teams can
         | encode common things into the platform once. ie. this is how we
         | authenticate to postgres, its an AWS secret, security gruops
         | and these IAM policies. All of that information flows across
         | the line into the other module. The modules reject invalid
         | types so common misconfigurations _cant_ happen. It also lets
         | you "autocomplete" infrastructure. Lets say I'm a dev and I
         | want to deploy a database. I can drop it on the canvas, since
         | massdriver understands the types, it'll automatically connect
         | it to a subnet that dev has access to.
         | 
         | > * When things go wrong, how do developers debug issues at the
         | infrastructure level? Do they reach out to ops?
         | 
         | They may, we have a lot of stuff built in though to make the
         | system as truly self-service (through day 2) as possible. There
         | are runbooks per module so ops teams that have built out a
         | module around a use case can put in common trouble shooting
         | steps and its all accessible from the same graph. Alarms and
         | metrics also show up there. Ops teams can also publish day-2
         | modules to the catalog, so developers can drag and drop common
         | one-off tasks for maintenance onto their canvas and perform it.
        
           | varun_chopra wrote:
           | > You add add'l provisioners by writing Dockerfiles, you
           | enforce pre-validations with JSON Schema
           | 
           | That's really neat! Thank you for answering my questions and
           | all the best with your launch!
        
             | coryodaniel wrote:
             | Thanks, I appreciated the questions!
        
         | TYPE_FASTER wrote:
         | > Why did you decide to go with diagramming as a solution?
         | 
         | I had a similar idea. I have enough experience with visual
         | programming environments to be wary. Here are my thoughts on
         | why it might be a good approach here: * It would be possible to
         | take a whiteboard scribble and turn it into a real system.
         | Combining this with the services available in the cloud, you
         | end up with something really powerful. It all comes down to the
         | level of abstraction supported. You have to be able to draw
         | boxes at a level that adds value, but also zoom in to
         | parameters at the service/API level as necessary. * I've worked
         | on a team that was responsible for designing and maintaining
         | its own AWS infrastructure. Along with that comes the
         | responsibility for controlling cost. The idea of having a
         | living architectural diagram that also reported cost in near
         | real-time is really helpful, especially if you could start to
         | do things like project cost given a level of traffic or some
         | other measure.
         | 
         | Once you have a decent library of TF modules, and an
         | understanding of the networking and compute fundamentals, and
         | an understanding of the services offered by your cloud
         | provider, you have something really powerful. If a service can
         | help accelerate that, it's worth it IMHO.
        
           | dwill-mdcloud wrote:
           | You have really hit the nail on the head with what we were
           | going for! Cory and I, very early on said "We draw this
           | stuff, agree on it, then go build it in TF which is where the
           | problems start".
           | 
           | We imagined a world where you could go into architecture
           | review and come out of that meeting with staging stood up and
           | ready to run your application.
           | 
           | This makes sense for infra because it's mostly config
           | management and API calls. Visual programming is rough because
           | control structures are soo hard to visualize.
        
       | backyardflock wrote:
       | Infrastructure is ofc the first thing i associate with a mass
       | driver./s
        
         | coryodaniel wrote:
         | Hey, we're just trying to accelerate your launch ;)
         | 
         | I actually have a boilerplating tool I use to set up projects
         | and it picks a random name from a text file at ~/cool-names.txt
         | ...
        
           | generalizations wrote:
           | Kinda reminds me of Canonical MAAS? This seems to operate at
           | a different level though.
        
             | coryodaniel wrote:
             | I've never seen this. Very cool!
        
         | zellyn wrote:
         | At one point I planned to tease the team about the name being
         | in the same category as "Blade Runner" -- 300% cool-sounding,
         | 0% unrelated to the thing itself -- when I realized that it's a
         | way of Driving IaC at Mass scale. So, not bad.
        
       | MadsRC wrote:
       | This is quite interesting.
       | 
       | What does a seat entail? You talk about self serve (I love it!),
       | but would the users that self-serve take up a seat? Or are seats
       | just for the folks creating the modules?
        
         | coryodaniel wrote:
         | Seats are for any user of the UI and they aren't bound to a
         | person, so you can reassign them as necessary.
         | 
         | For larger teams we do buckets of seats with price reductions
         | per-seat as the team size goes up.
         | 
         | We don't rate limit deploys - as that would make you less
         | agile, we don't charge based on resources because that
         | penalizes teams with stable infrastructure.
         | 
         | We know ops budgets can be tight, we're ops engineers, so we
         | try our best to make the pricing work well for those budgets.
        
       | jedberg wrote:
       | Is there any way for me to submit a module or co-author one with
       | you guys for my cloud service?
        
         | coryodaniel wrote:
         | Yeah, there definitely is. Ping me @ cory @ massdriver.cloud
        
       | zellyn wrote:
       | Having watched and participated in an online call (mentioned in
       | another comment here), there were two big things that were
       | strikingly cool about MassDriver:
       | 
       | * It turns the connections between components owned by different
       | IaC tools/systems into _typed_ JSON. Think patch panels, where
       | the connections are fully typed.
       | 
       | * Kelsey mentioned that you can introspect on the metadata in the
       | live system using absolutely anything you want, down to just bash
       | scripts. So it's _very_ hackable
        
         | coryodaniel wrote:
         | Hey! How's it been? I followed you on bsky a few days ago!
         | 
         | Glad you liked it! Yeah, the typed connections are a big part
         | of what makes Massdriver powerful. It makes sure infrastructure
         | components integrate right without devs having to worry about
         | all the low-level details.
         | 
         | We're expanding the graph metadata with a querying system
         | coming out of alpha soon that lets you ask stuff like "Where
         | are all my t3 instances in production?" or "Which services are
         | using a kubernetes version less than 1.25" Makes it way easier
         | to understand what's running where.
         | 
         | And since it's all API-first, it's easy to write quick scripts
         | for reporting or automating changes across environments.
        
       | siliconc0w wrote:
       | What we've developed that is similar is a meta-layer above
       | terraform to take high-level intent and use that to generate
       | terraform which is then committed to git and auto-actuated.
       | 
       | This is nice because it's still all using git and you can
       | continuously merge in updates as the 'best practice' definitions
       | in the intent get updated. It allows teams to maintain their own
       | customizations and eventually promote them to up to the intent
       | level to capture them as a best practice so other teams can
       | benefit from them.
        
         | coryodaniel wrote:
         | I love the idea of high-level intents and abstractions. They're
         | tough to get right, but when they click, they make dev teams
         | move way faster.
         | 
         | Cloud APIs mix operational and developer concerns, which is
         | part of the problem. A single API call for something like a
         | database forces you to think about instance types, failover
         | strategies, and security settings when all a developer really
         | cares about is, "I need a database that can handle X traffic
         | and supports Y extensions."
         | 
         | I'm actually working on a write-up about abstractions for a
         | CNCF infra white paper and would love to get your thoughts. A
         | lot of teams struggle with the balance between standardization
         | and flexibility, and it sounds like you've thought a lot about
         | this too. Let me know if you'd be up for a chat.
         | 
         | Also, here's a post I wrote about it recently:
         | 
         | https://www.massdriver.cloud/blogs/the-case-for-abstractions...
        
       | stackskipton wrote:
       | As SRE/DevOps/Ops type, I took a look because I've sat with
       | salespeople with your competitors. It looks like a functional
       | platform and another "Cloud defaults are too scary? Here is a
       | sane default option."
       | 
       | >The hard part isn't just technical, it's socio-technical. Ops
       | teams want control, devs want speed, and compliance creates
       | friction between them.
       | 
       | You got that right and I'm not sure another tool is going to fix
       | it.
       | 
       | I wouldn't say Ops wants control, it's we want to stop being
       | paged after hours because Devs yolo stuff into production without
       | a care in the world. Not sure tooling will fix that.
       | 
       | I love your (https://www.massdriver.cloud/blogs/devops-is-
       | bullshit) blog article though. It prompted a great discussion.
        
         | dwill-mdcloud wrote:
         | > I wouldn't say Ops wants control, it's we want to stop being
         | paged after hours because Devs yolo stuff into production
         | without a care in the world. Not sure tooling will fix that.
         | 
         | You have hit the nail on the head here. Our base hypothesis is
         | the only way to solve this problem is to start with a self-
         | service approach. If I deploy an RDS instance and nobody ever
         | connects to it, it will never have an issue. The moment a Dev
         | starts firing N+1's at it, I have to get up at 1am. Developers
         | need to have ownership and accountability for their
         | infrastructure without having to become absolute cloud experts.
         | 
         | Our goal is to enable Ops teams to build catalogs of solid
         | building blocks that developers can build into novel
         | architectures and safely own and operate. The collaboration
         | between Ops and Dev is delegated to software and eases this
         | friction.
         | 
         | > It looks like a functional platform and another "Cloud
         | defaults are too scary? Here is a sane default option."
         | 
         | I would push back on this notion. An Ops team builds reusable
         | modules that match their reliability and compliance
         | requirements. You _can_ use modules we have created but we
         | expect that you own your IaC modules. They will conform and
         | evolve with your organization's best practices.
         | 
         | The DevOps is bullshit article is the inspiration for making a
         | platform that manages the relationship between Dev and Ops
         | which I think separates us from our competitors in the space.
        
         | dang wrote:
         | Discussed a couple times here:
         | 
         |  _DevOps Is Bullshit (2022)_ -
         | https://news.ycombinator.com/item?id=36354049 - June 2023 (278
         | comments)
         | 
         |  _DevOps is broken_ -
         | https://news.ycombinator.com/item?id=33274988 - Oct 2022 (348
         | comments)
        
       | bzmrgonz wrote:
       | YOU SHOULD KNOW AVG flags the site with malvertisement, one of
       | the api calls I think. You might wanna do a site scan to make
       | sure.
        
         | dwill-mdcloud wrote:
         | Thanks for letting us know! We will look into that.
        
       ___________________________________________________________________
       (page generated 2025-02-21 23:00 UTC)