Interact with env0 using VCS comments, including applying changes from your pull requests. Gain visibility to the Terraform or Terragrunt plans for all pull requests—including cost estimates, all right in your VCS of choice. This is similar to how Atlantis behaves.
Easily manage an organization of separate business units, teams, users, and projects with granular Role-Based Access Controls (RBAC). Select from pre-configured roles, or create your own custom roles from over 30 different permission choices.
Easily integrate third-party tools and extend your IaC capabilities to run any code at any point in the deployment process, including tying into OPA, static code analysis tools, configuration management frameworks, cloud CLIs, and more... all using YAML that is managed and protected like the rest of your code.
Learn the cloud resource cost of existing Terraform plans, gain visibility, and model costs resulting from new or updated deployments, all backed by industry leader Infracost. View deployment cost regressions, and spending by project or team.
env0 presents Terraform plans on your SCM pull requests so you can approve your infrastructure change requests with maximum confidence, all from within your existing workflows. Shorten the cycle of pull requests and enable your team to create pull requests without the need to distribute Terraform credentials to everyone.
env0 gives you the ability to automatically detect drift and make sure your real-world resources in your cloud provider are aligned with your Infrastructure as code. env0 will alert you once a drift has been detected and gives you the ability to view and fix the drift, which can help mitigate one of the main challenges when using Infrastructure as code.
env0 enables you to set up granular RBAC controls to establish cloud credentials both the controls for who can apply changes and, set up team roles and privileges.Grant your entire dev team “deployer” permissions in dev while restricting them to “planner” and enforcing two-man rules in production.
The secret to env0’s nearly infinite extensibility lies in Custom Flows. They give you the ability to insert hooks into the deployment process to extend your IaC capabilities. You can run any type of code, at any point in the deployment process. Before or After Terraform Init/Plan/Apply, and even Destroy/Error.
Our Private Module Registry lets DevOps teams create trusted and re-usable modules while enabling versioning enforcement within their organization. You will be able to create a marketplace of private modules within your organization for your team to easily access in their Terraform code.
env0 emphasizes security in cloud management offering premier management of keys, tokens, cloud credentials, and other environmental variables at every level with a single configuration. Secrets are only stored on the customer’s account using the AWS Secrets Manager.
Cost estimation, Resource Tagging and Cost Over Time
env0 runs a cost estimation on the Terraform plan file to give you a sense of the cost of your resources. In addition env0 can automatically append tags to all your taggable Terraform resources based on the project and environments they are part of. Our robust tagging capability can help you correlate the actual cost over time of your environments, identify cost regressions caused by changes and understand spending by project or team.
Get full visibility on your cloud deployments. Administrators can have a top-down view of the organizations Infrastructure deployment velocity. Our dashboards also provide a unified view on the health and performance for the entire organization.