Unlimited Concurrent Runs
Active Environments
Number of Users
Monthly Deployments
Monthly Run Minutes
IaC Automation and GitOps
Atlantis Workflows/
PRÂ Comments
Custom Flows
Workflows
Self-hosted Source Control
(inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
Visibility
Monitoring Dashboards
Deployment Log Forwarding
Audit Logs
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
Unlimited Concurrent Runs
Active Environments Included
Number of Users
Monthly Deployments
Monthly Run Minutes
IaC Automation and GitOps
Atlantis Workflows/PR Comments
Custom Workflows
Workflows
Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
Visibility
Monitoring Dashboards
Deployment Log Forwarding
Audit Logs
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
Unlimited Concurrent Runs
Active Environments Included
Number of Users
Monthly Deployments
Monthly Run Minutes
IaC Automation and GitOps
Atlantis Workflows/PR Comments
Custom Workflows
Workflows
Self-hosted Source Control (inc. Bitbucket, GitLab & GitHub)
Drift Management
Drift Detection and Alerting
Drift Cause Analysis
Drift Monitoring Dashboard
Managed Self-Service
Environment Discovery
Slack/Teams and Email Notifications
Environment Scheduling
Environment Time to Live (TTL)
Custom TTL Policies
Remote Backend
Remote State Storage
Remote Plan
Remote Apply
Self-hosted Remote State
Cost Management
Cost Estimation (via Infracost)
Actual Cost Visibility
Centralized Cost Tagging Controls
Cost Alerts
Budget Thresholds
Cloud Compass
IaC Coverage Tracking
Risk Assessment
IaC Code Generator
Visibility
Monitoring Dashboards
Deployment Log Forwarding
Audit Logs
Private Registry
Private Module Registry
Private Provider Registry
Module Testing
Access Controls
Role-Based Access Control
OpenID Connect
SAML Integration
Team Synchronization from SAML
Environment-Level Access
Custom RBAC Roles
Governance & Compliance
Custom Approval Policies
Access to SOC 2 Report
Self-hosted Agent
Extensibility
API Keys
Plugins
Terraform/OpenTofu Provider
Support
Email Support
Dedicated POC Support
Shared Slack/Teams Channel
Enterprise SLA
Environments on env0 are defined by Infrastructure-as-Code templates. env0 has native support for Terraform and Terragrunt as an IaC framework, so this means that each environment is equivalent to one Terraform workspace.
An "active environment" is any environment that is managed through env0 that is currently running. Environments that have been destroyed or been manually marked as âInactiveâ don't count towards your active environments.
A deployment is counted whenever a successful Terraform Apply occurs. It does not include PR plan, Drift Detections, or Destroy.
env0 is not a cloud provider. Deployed environments will run on your own cloud account that you specify via the Terraform code, and whatever credentials you supply during deployment. env0 simply manages the lifecycle of the underlying resources.
Yes, env0 can be used to manage production environments. We recommend that you use env0 to manage both your development environments AND your production environments, keeping your deployment process as identical as possible. env0 provides advanced RBAC and configuration management capabilities, allowing you to use a single IaC codebase, to deploy to both development and production - just like you do with your application code.
No. env0 works with CloudFormation, Pulumi, and Kubernetes, too. And with env0 custom flows you can run anything you want at any point in the deployment process. When you are creating, updating, and destroying your environments, you can run Ansible, kubectl, the AWS CLI, your application code... to name a few possibilities. The extensibility possibilities are almost endless.
No, env0 is not limited to AWS, GCP, and Azure. Because env0 relies on Terraform to provision infrastructure, you can use any provider supported by Terraform, as well as 3rd party providers. These include other cloud providers such as IBM Cloud, VMWare, Oracle, and even specific managed solutions such as Auth0, Github and Netlify.
Before deploying your environment, env0 will inject custom tags into your Terraform code using Terratag. After the environment has been deployed, env0 queries the cloud providerâs API, using those custom tags, to get the actual costs of your running environments. This is not an estimation.
Yes. You can use OPA in your custom flow (env0.yml) file. Here is an example of validating the Terraform plan using Open Policy Agent. Native OPA support will be added soon!
Terraform state files can be stored in the built-in env0 remote backend, or in any other remote backend of your choosing.
Yes! Our most recent SOC 2 Type II report was completed in 2023 and a copy is available upon request from your account manager.
env0 can be delivered in 2 ways - Full SaaS offering and a Hybrid SaaS + Self-Hosted Agent offering. Self-Hosted Agent is supported on our Business and Enterprise tiers.