Serialized Terraform applies.
Automatic plan invalidation.
Encrypted plan file storage for applies.
Readable Terraform plan and apply output.
Cost estimation, drift detection, access controls, and more.
Terraform by commenting on Pull Requests.
Required status checks and reviewers.
Organization teams and members for access controls.
Custom GitHub Actions are chaotic. The Terrateam GitHub Action workflow file is easy to understand.
Terraform plan and apply workflow and third-party integrations immediately available. No tinkering in a UI necessary.
Satisfy complex workspace and directory workflow requirements with custom scripts based on plan and apply exit status.
Granular permissions with GitHub Organization teams and members to control who can trigger Terraform operations.
Visibility into cloud spend before launching resources. No extra configuration necessary.
Automatically detect infrastructure changes applied outside of Terraform and get alerted with GitHub Issues.
Run Terragrunt on all operations or only against specific directories and workspaces.
Same-day business support and private Slack Connect for all customers.
Terrateam is the best price per deploy money can buy.
30-day free trial. No credit card required.
Kick the tires with unlimited usage and access to all features.
A user is anyone who interacts with a pull request that results in a Terrateam operation.
An operation is any event that triggers a Terrateam GitHub Actions workflow. This includes plans, applies, and drift detection runs.
No. Your source code never reaches our servers. GitHub Actions runtime environments are isolated to your GitHub organization. The Terrateam GitHub Action is open-source and can be found here.
Plan files are deleted as soon as they are used by their respective apply, after an unlock is performed, or after 14 days.
Terrateam takes security very seriously. See our Security page for details.
Self-hosted agents and single-tenant hosting is available when signing up for our Enterprise plan.