Unlimited Concurrent Runs
Active Environments Included
Users Included
Monthly Deployments Included
Role Based Access Control
Custom Workflows
Full API & Integrations
Private Module Registry
OPA & Governance Engine
Cost Estimation and Management
Automatic Drift Detection
Dashboards
Slack/Teams Notifications
Proof of Concept Support
Environment TTL & Scheduling
SAML Integration
Team Synchronization from SAML
Access to SOC 2 Report
Self-hosted Agent
Custom RBAC Roles
Audit Logs
Full Self-hosted Source Control Including Bitbucket, GitLab, and GitHub
Enhanced Support & SLA
Shared Slack or Teams Channel
Unlimited Concurrent Runs
Users Included
Monthly Deployments Included
Role Based Access Control
Custom Workflows
Full API & Integrations
Private Module Registry
OPA & Governance Engine
Cost Estimation and Management
Automatic Drift Detection
Dashboards
Slack/Teams Notifications
Environment TTL & Scheduling
Tagging & Cost Monitoring
SAML Integration
Team Synchronization from SAML
Access to SOC 2 Report
Self-hosted Agent
Custom RBAC Roles
Audit Logs
Full Self-hosted Source Control Including Bitbucket, GitLab, and GitHub
Enhanced Support & SLA
Shared Slack or Teams Channel
Unlimited Concurrent Runs
Active Environments Included
Users Included
Monthly Deployments Included
Role Based Access Control
Custom Workflows
Full API & Integrations
Private Module Registry
OPA & Governance Engine
Cost Management and Estimation
Automatic Drift Detection
Dashboards
Slack/Teams Notifications
Environment TTL & Scheduling
SAML Integration
Team Synchronization from SAML
Access to SOC 2 Report
Self-hosted Agent
Custom RBAC Roles
Audit Logs
Full Self-hosted Source Control Including Bitbucket, GitLab, and GitHub
Enhanced Support & SLA
Shared Slack or Teams Channel
Unlimited Concurrent Runs
Users Included
Active Environments Included
Monthly Deployments Included
Role Based Access Control
Custom Workflows
Full API & Integrations
Private Module Registry
OPA & Governance Engine
Cost Estimation and Management
Automatic Drift Detection
Dashboards
Slack/Teams Notifications
Environment TTL & Scheduling
Tagging & Cost Monitoring
Unlimited Active Environments
SAML Integration
Team Synchronization from SAML
Access to SOC 2 Report
Self-hosted Agent
Custom RBAC Roles
Audit Logs
Full Self-hosted Source Control Including Bitbucket, GitLab, and GitHub
Enhanced Support & SLA
Shared Slack or Teams Channel
Environments on env0 are defined by Infrastructure-as-Code templates. env0 has native support for Terraform and Terragrunt as an IaC framework, so this means that each environment is equivalent to one Terraform workspace.
An "active environment" is any environment that is managed through env0 that is currently running. Environments that have been destroyed or been manually marked as “Inactive” don't count towards your active environments.
A deployment is counted whenever a successful Terraform Apply occurs. It does not include PR plan, Drift Detections, or Destroy.
env0 is not a cloud provider. Deployed environments will run on your own cloud account that you specify via the Terraform code, and whatever credentials you supply during deployment. env0 simply manages the lifecycle of the underlying resources.
Yes, env0 can be used to manage production environments. We recommend that you use env0 to manage both your development environments AND your production environments, keeping your deployment process as identical as possible. env0 provides advanced RBAC and configuration management capabilities, allowing you to use a single IaC codebase, to deploy to both development and production - just like you do with your application code.
No. env0 works with CloudFormation, Pulumi, and Kubernetes, too. And with env0 custom flows you can run anything you want at any point in the deployment process. When you are creating, updating, and destroying your environments, you can run Ansible, kubectl, the AWS CLI, your application code... to name a few possibilities. The extensibility possibilities are almost endless.
No, env0 is not limited to AWS, GCP, and Azure. Because env0 relies on Terraform to provision infrastructure, you can use any provider supported by Terraform, as well as 3rd party providers. These include other cloud providers such as IBM Cloud, VMWare, Oracle, and even specific managed solutions such as Auth0, Github and Netlify.
Before deploying your environment, env0 will inject custom tags into your Terraform code using Terratag. After the environment has been deployed, env0 queries the cloud provider’s API, using those custom tags, to get the actual costs of your running environments. This is not an estimation.
Yes. You can use OPA in your custom flow (env0.yml) file. Here is an example of validating the Terraform plan using Open Policy Agent. Native OPA support will be added soon!
Terraform state files can be stored in the built-in env0 remote backend, or in any other remote backend of your choosing.
Yes! Our most recent SOC 2 Type II report was completed in October 2020 and a copy is available upon request from your account manager.
env0 can be delivered in 2 ways - Full SaaS offering and a Hybrid SaaS + Self-Hosted Agent offering. Self-Hosted Agent is supported on our Business and Enterprise tiers.
env0 is the best way to deploy, scale, and manage your Terraform and other Infrastructure as Code tools.