Same-day business support and private Slack Connect for all plans.
How do we work?
Terrateam allowed Navlungo to quickly create Terraform changes alongside our other GitHub workflows. Terrateam gives me the ability to provide a safe environment for other software developers to create infrastructure without needing any credentials. Terrateam is an easy win for the Navlungo team and we're now very confident in how we deploy changes to our infrastructure.
Our team started out running Terraform from a single server with elevated privileges which wasn't ideal. Once we set upTerrateam, their quick GitHub integration made everything easier. Just a simple `terrateam plan` command and it just worked with our pull requests. It even estimates how much the changes were going to cost us! We love using Terrateam because it just works!
I am always looking for opportunities to streamline our processes and bring visibility to infrastructure changes. I recently started using Terrateam instead of writing custom Github Actions, and I couldn’t be more impressed. Working at an agency means managing lots of resources across various clients, and Terrateam has made that much easier. The setup is straightforward, and any time I need assistance I receive excellent support almost instantly. I also love that our team, which doesn’t specialize in DevOps, is able to easily visualize changes in pull requests.
Terrateam allows us to leverage all of the benefits of Terraform (auditability, repeatability, tighter IAM controls) in a GitOps fashion, without having to build or run something ourselves. The Access Control feature allows us to maintain all of our code in one place, while still being able to restrict management of sensitive resources to certain users.
Short-lived credentials for Terraform plan and apply operations. Only let credentials live as long as they need to.
Specify rules for when Terraform apply operations can be performed based on GitHub status checks, merge conflicts, and number of approvals.
Satisfy complex workspace and directory workflow requirements with custom scripts based on plan and apply exit status.
Granular permissions with GitHub Organization teams and members to control who can trigger Terraform operations.
Visibility into cloud spend before launching resources. No extra configuration necessary.
Automatically detect infrastructure changes applied outside of Terraform and get alerted with GitHub Issues.
Run Terragrunt on all operations or only against specific directories and workspaces.
Terrateam is a GitHub application that turns pull requests into Terraform executions using GitHub Actions.
The Terrateam server receives GitHub events and makes decisions using the event payload. The Terrateam GitHub Actions workflow executes the Terraform jobs that the server creates. Your data stays encrypted.
Terrateam is the best price per deploy money can buy.
Free forever. Simple deployment.
Full feature parity with Cloud.
$145/ month (paid annually) or
$175/ month (paid monthly)
30-day free trial. No credit card.
Absolutely! Join our Slack to get started.
No. We built the Terrateam server from the ground up. The Atlantis-style workflow inspired us to build the best Terraform experience on GitHub.
Yes. If you can't afford the service, are an open-source project, or are a non-profit organization, please send an email to email@example.com. Additionally, Terrateam Cloud is free for teams of two and personal GitHub user accounts.
Yes. We offer unlimited trial extensions. No questions asked (shhh!). Please send an email to firstname.lastname@example.org.
Yes. Read the docs for deployment instructions.
No. Terrateam Cloud does not have usage limits. You can run as many plan and apply operations as you want with no extra charge.
No. Your source code never reaches our servers. GitHub Actions runtime environments are isolated to your GitHub organization. The Terrateam GitHub Action is open-source.
The Terrateam server receives GitHub webhooks to determine what operations have been done. We then fetch a list of changed files and see if they match your Terrateam configuration. If it looks like we have to do Terraform work, we create what we call a 'work manifest', which is just a list of directories and what operations to run. We then kick off the GitHub Action which calls our server for the work manifest. The Action then executes the work manifest and sends back the results to our server. If a Terraform plan is executed then the Action securely ships the plan file to the server.
Plan files are deleted as soon as they are used by their respective apply, after an unlock is performed, or after 14 days.
Yes, we really have same-day business support for all of our plans. When a customer reaches out to us for support, we see this as a golden opportunity to improve Terrateam. Whether that's by automating a process, updating our documentation, or creating a new feature request in our backlog, it's a way to improve the developer experience.
Terrateam takes security very seriously. See our Security page for details.