Overview
HashiCorp- Private Offer Only combines the benefits of the Private Offer feature along with Carahsoft's contract vehicles in providing customers a seamless acquisition process for their cloud-based products and solutions from AWS Marketplace.
HashiCorp Cloud Platform (HCP) is a fully managed platform to launch and operate HashiCorp products in the cloud. HCP offers production-grade infrastructure, built-in security, and pay-as-you-go pricing to accelerate cloud adoption. HCP allows you to access HashiCorp's suite of products including Vault, Consul, Packer and Boundary.
HCP Vault enables users to secure, store, and tightly control access to tokens, passwords, certificates, and encryption keys within one unified cloud-based platform. HCP Vault clusters can be created on AWS running in multiple regions across North America, Asia, and Europe
HCP Consul is a service networking platform to connect and secure services across any runtime platform and public or private cloud. With HCP Consul we install, configure, and maintain the Consul servers on AWS to ensure that your Consul clusters are always ready to connect your services.
HCP Packer helps organizations track, govern, and manage any image for any cloud. Integrate HCP Packer with Terraform to create multi-cloud golden image pipelines.
HCP Boundary is a fully-managed, cloud-based, workflow that enables secure connections to remote hosts and critical systems across cloud and on-premise environments. As a managed service, HCP Boundary enables zero-trust networking without needing to manage the underlying infrastructure.
This listing is for Private Offers ONLY. Please reach out for more details. Thank you.
Highlights
- Accelerate cloud adoption with production-grade infrastructure, built-in security, and pay-as-you-go pricing.
- Enable consistency and flexibility with centralized identity, policies, and virtual networks.
- Increase productivity and reduce costs by letting HashiCorp experts manage, monitor, upgrade, and scale your clusters.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Buyer guide

Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
Terraform Cloud | Getting Started Bundle- Annually | $0.001 |
Vendor refund policy
No Refund
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Resources
Vendor resources
Support
Vendor support
Login to Help Portal https://support.hashicorp.com/hc/en-us/restricted or Submit a ticket via https://support.hashicorp.com/hc/en-us/requests/new Get the help you need at every stage of your journey.
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
Customer reviews
Has automated multi-cloud deployments and simplified infrastructure management with reusable modules
What is our primary use case?
The usual use cases for HashiCorp Terraform that I work with mostly include automating tasks such as provisioning resources and creating resources over the clouds. If we want to create an EC2 instance on AWS , we have to log into EC2 and follow specific steps for creating instances. Creating thousands of EC2 instances with the same configuration requires repeating those steps, which can lead to mistakes. But using HashiCorp Terraform helps us by enabling infrastructure as code, allowing us to create infrastructure using code.
We can write simple code, and based on that, we can create multiple instances with a single run of code.
HashiCorp Terraform also supports multi-cloud developments, allowing us to work with AWS , Azure , Google, and Oracle simultaneously. It enables immutable infrastructure, and after HashiCorp Terraform creates resources, a state file is generated that stores metadata, which we can control using version control, allowing us to revert to previous versions if needed.
What is most valuable?
The most valuable features or capabilities of HashiCorp Terraform include automation, multi-cloud support, version control of state files, environment management, and support for third-party services such as databases and monitoring.
The open-source nature of HashiCorp Terraform is important for accessing community contributions and tools as it is free to use. The community-driven development means there is a large and active community of contributors worldwide. HashiCorp Terraform works with multiple providers such as AWS, Azure , and GCP, and it can also support custom providers, which is a significant advantage.
What needs improvement?
HashiCorp Terraform could be improved by enhancing security around state files, as it stores sensitive information such as passwords and secrets within them. If someone acquires a state file, they can access those secrets. HashiCorp Terraform should implement better security measures to keep sensitive information hidden from unauthorized users.
For how long have I used the solution?
I have been working with HashiCorp Terraform for more than three years.
What do I think about the stability of the solution?
HashiCorp Terraform is stable and reliable as long as we maintain the state file correctly.
What do I think about the scalability of the solution?
HashiCorp Terraform's scalability is straightforward because we can utilize a variable called count to scale our resources easily.
Which solution did I use previously and why did I switch?
Before HashiCorp Terraform, I did not use a different solution for the same use cases. AWS has a service called CloudFormation that performs similar functions, but it is specific to AWS. However, HashiCorp Terraform is applicable worldwide, and I haven't used anything else, so I don't have experience with other solutions.
How was the initial setup?
I participated in the initial setup and deployment of HashiCorp Terraform. Knowing the requirements is essential for what we need to create using HashiCorp Terraform. If we're beginners, it's necessary to follow HashiCorp's documentation to understand what is needed, allowing us to create Terraform modules and files easily. For me, it isn't a big deal; we just need to gather and analyze the necessary information to proceed.
What other advice do I have?
We have developed one solution using HashiCorp Terraform.
HashiCorp Terraform's state management capabilities are the main key point because whatever HashiCorp Terraform creates is stored in a state. Managing this state file is crucial. We can manage it either locally or remotely, but using local storage can lead to failures, and we might lose our state file.
Best practice is to store it remotely, such as on AWS S3 or Azure storage blobs, and we must maintain versions of the state file. This allows us to revert to previous states in version control if there are issues with the current state.
HashiCorp Terraform's modular architecture is beneficial because I have created a module for EC2 instances. When a team member wants to create an EC2 instance, they can utilize my module without recreating it. This approach follows the DRY principle (do not repeat yourself), achieving simplicity and reducing code repetition.
On a scale of one to ten, I rate HashiCorp Terraform an eight out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Have created modular infrastructure and streamlined deployments through automation
What is our primary use case?
I started my journey with HashiCorp Terraform in 2023 at Toolbox Tech , coming from a background with no prior experience in cloud or infrastructure. After going through a DevOps learning path focused on GCP, I was able to quickly get up to speed. My first major project involved using Terraform to build and integrate a platform for AutoAvaliar, a Brazilian company that connects vehicle sellers to buyers.
Over the last 12 months, my work has spanned both Google Cloud Platform and Microsoft Azure . Terraform has been the cornerstone of my workflow in both environments. The difference it makes is night and day. Before, deploying infrastructure meant navigating the cloud console, a tedious process of 'click, wait, click, wait.' Now, we define and deploy complex infrastructure entirely through code, which is repeatable, version-controlled, and incredibly fast.
I work at Toolbox Tech , where we provide services to clients like Embracon and AutoAvaliar. Terraform is essential in all this work, allowing us to rapidly provision infrastructure for our internal projects and for our clients.
For example, I recently worked on a project integrating Azure Kubernetes Service with Azure Key Vault . I noticed the team was creating all their key vaults manually through the console. I built a GitHub Actions pipeline that automates the entire process. Now, creating a new Key Vault is as simple as adding a configuration file to a GitHub repository, which has been a huge time-saver for them.
Similarly, in GCP, I have developed a comprehensive suite of standardized Terraform modules for a wide array of services, including Cloud Run, App Engine, Firestore, and Cloud SQL. This empowers developers: instead of manually setting up their services, they can now use a CI/CD pipeline. Once their application code is ready, the pipeline uses our Terraform modules to provision the necessary services and automatically deploy the app to production.
Ultimately, HashiCorp Terraform is an essential tool for us. It empowers us to accelerate our development cycles, reduce manual errors, and create robust, standardized infrastructure across multiple cloud providers.
How has it helped my organization?
Terraform has fundamentally improved our organization by:
- Accelerating Delivery: We now deploy infrastructure in minutes, not hours.
- Reducing Errors: Automating with code eliminates manual configuration mistakes.
- Improving Security: We centrally manage infrastructure and avoid sharing sensitive cloud credentials.
- Controlling Costs: The state file gives us a clear view of all provisioned resources, helping us eliminate waste.
- Standardizing Deployments: Reusable modules ensure consistency and best practices.
What is most valuable?
The three most valuable features for me are the state file, reusable modules, and the simplicity of HCL.
1. The State File: This is Terraform's core strength. It acts as a single source of truth for our infrastructure, allowing us to track every resource, plan changes safely, and detect any manual modifications. Before Terraform, we lacked visibility into who was creating what, leading to higher costs. Now, with the state file, we have full control and can easily remove unused resources.
2. Reusable Modules: The ability to create and share modules is a game-changer. At Toolbox Tech , we build our own modules to enforce standards and encapsulate complexity. This allows developers to provision complex infrastructure, like a full CI/CD pipeline that deploys to Cloud Run and sets up New Relic alerts, without needing to be Terraform experts themselves. The public Terraform Registry is also a fantastic resource for getting started quickly.
3. HCL (HashiCorp Configuration Language): The syntax is declarative and very easy to read, making it simple for new team members to learn and contribute. It's much more approachable than using a general-purpose programming language for infrastructure.
What needs improvement?
A built-in feature to generate a visual diagram or graph of the infrastructure directly from the state file would be incredibly valuable. This would allow teams to easily visualize all deployed resources and their dependencies without relying on third-party tools.
For how long have I used the solution?
I have been using the solution for three years.
What other advice do I have?
For anyone starting with Terraform, my advice is to invest time in learning the core concepts, as the official documentation is excellent and primarily in English. Also, while AI tools can help generate boilerplate code, they don't replace a solid understanding of how Terraform works, especially regarding state management. Always review AI-generated code carefully before applying it to your infrastructure.
Infrastructure management benefits from declared creation and consistent procedures
What is our primary use case?
At Remessa, we use HashiCorp Terraform for everything involving infrastructure. We use HashiCorp Terraform to manage our repository on GitHub , to manage permissions, invitations, and teams. We use HashiCorp Terraform to manage our AWS infrastructure, DNS, policies on Cloudflare . We use HashiCorp Terraform to manage our alerts on PagerDuty, and we set up some things on Grafana with other services.
We use GitOps, so when we need to make changes such as upgrading our databases when a new Postgres version is released, we can see the version of each database that worked, allowing us to manage the process effectively. We can see in the state that our main database will be upgraded immediately. We can prevent breaks or issues because of the states, which allows us to schedule a window time for upgrades when needed.
What is most valuable?
HashiCorp Terraform operates on a declarative rather than imperative approach. This enables us to repeat processes and creation, which is the greatest advantage because we can test. If something doesn't work, we can do a rollback or change everything, and using Git , we have the history of every change. We can pick a change in the history tree to discuss and see what changed.
Our infrastructure has a repository with HashiCorp Terraform, and we have modules for that. The benefit is the concept of not repeating yourself, so we have an instance that we can use to create a new instance or cluster as quickly and correctly as possible. Everything works the same way. We don't have servers running on different systems such as Ubuntu , Red Hat, or Debian . Everything is uniform, so we don't need to think about different ways to create, manage, or access. The benefit of this uniformity is significant.
We utilize HashiCorp Terraform's state management capabilities.
What needs improvement?
Two aspects of HashiCorp Terraform could be improved: it should have better included tests and a more precise validator. I have faced issues where I needed to create something in a particular way and wanted to validate if everything was working properly, but the validator is not a strong point of HashiCorp Terraform.
Using HashiCorp Terraform Cloud is straightforward, but using other backends such as AWS S3 or Oracle Object Store is not as straightforward. Working with modules can be complex. However, when using HashiCorp Terraform's modules, you're typically a more advanced user, so this complexity isn't problematic.
For how long have I used the solution?
I have been working with HashiCorp Terraform for five years.
What do I think about the stability of the solution?
HashiCorp Terraform is extremely stable. I faced an issue once in five years where the way I declared the resource was correct, but I had problems with the binary. When I investigated the problem, the community had created an issue, and they released patches the next day. It has been totally stable with only one minor issue in five years.
What do I think about the scalability of the solution?
Given it's in the cloud, HashiCorp Terraform is very much scalable.
Which other solutions did I evaluate?
When HashiCorp Terraform changed their license version, I considered migrating to another similar tool. However, after understanding the changes, I decided to continue using it since it remained open source, with restrictions only for HashiCorp competitors. This was crucial for me as I only work with open-source solutions.
All my colleagues in the company shared the same concern, and we studied migrating from HashiCorp Terraform because of the license change. I have experience with alternatives such as Crossplane, which I studied once and wanted to test. There is also OpenTofu, a fork of HashiCorp Terraform, which I tested a few times.
I continue using HashiCorp Terraform because the HashiCorp Language (HCL) is excellent to work with. The syntax is clear, and we have numerous resources and examples. Usually, I can find examples of what I want to create from other users' implementations. The benefits are the language, syntax, agility, and velocity. HashiCorp Terraform works effectively even with complex infrastructures.
What other advice do I have?
To others considering HashiCorp Terraform, planning the infrastructure is key, including drawing out the idea. Using HashiCorp Terraform is straightforward, but migrating everything to modules or reworking on HashiCorp Terraform can be complicated and overwhelming. Think thoroughly before implementation, but don't hesitate to try it. All necessary information is available online, and the community is excellent.
On a scale of one to ten, I would rate HashiCorp Terraform as a solution nine out of ten.
Which deployment model are you using for this solution?
If public cloud, private cloud, or hybrid cloud, which cloud provider do you use?
Infrastructure management becomes seamless across multiple platforms through platform-agnostic capabilities
What is our primary use case?
We primarily use HashiCorp Terraform for our infrastructure deployments and cloud deployments. As a cloud architect and infra DevOps architect, we use HashiCorp Terraform to deploy our code, builds, and set up CI/CD pipelines. We create Terraform code and deploy it through Terraform Enterprise.
Regarding state management and orchestration capabilities of HashiCorp Terraform's impact on our workflows, we had two different environments. Initially, we used Jenkins for our CI/CD pipelines. Because we primarily work on Azure , we use remote state files for Azure deployments. Jenkins runs the HashiCorp Terraform code, and then the state file gets saved in our Azure storage as a remote location. Whenever we require that state file, we can retrieve it from there.
At a later stage, we enhanced the environment by setting up Terraform Enterprise in our environment. Currently, we have it within our environment. We set up Terraform Enterprise with HashiCorp's license. We create modules from HashiCorp Terraform using the Azure ARM provider, and then we set up those modules to apply Azure best practices. We provide this to the development team and other teams so they can reuse these modules and deploy secure codes. We also manage upgrades and the complete lifecycle of TFE, and we provide these services to our other teams.
What is most valuable?
One of the major benefits of HashiCorp Terraform is that it is platform-agnostic because it supports multiple cloud platforms. This is the biggest advantage.
The state file is one of the key features of HashiCorp Terraform that helps us because whenever there is a drift, it actually helps us identify those and reset the environment to the actual desired state.
From our environment, we have enabled the health monitoring and drift detection features in HashiCorp Terraform. These have been really useful for our environment. It helps us where we do not have HashiCorp Terraform code for the environments and get that created, and whenever there is a manual change, we get to know that.
What needs improvement?
One issue we have faced with HashiCorp Terraform is that sometimes the latest features that Microsoft suggests are added in their services take some time for HashiCorp Terraform to get enhanced. Sometimes there is that lag where we want some service or configuration which is not yet enabled in the HashiCorp Terraform module.
The initial setup process for HashiCorp Terraform was fine and possible without major challenges. However, currently, our organization helps set up governance and policies, including those related to the OS. There is a challenge where our organization is recommending a specific OS, which is currently not supported by HashiCorp Terraform.
For how long have I used the solution?
I have been working with HashiCorp Terraform for the last 10 years.
What was my experience with deployment of the solution?
Since it is based on Azure, HashiCorp Terraform is highly scalable.
From the maintenance point of view, it is not difficult to maintain HashiCorp Terraform because primarily all those resources or the infrastructure we set up in Azure, and we have the high availability setup. From that perspective, there haven't been major challenges.
What do I think about the stability of the solution?
In terms of the stability and reliability of HashiCorp Terraform, I have not had any performance issues with it. There was only one challenge when we installed one of the patches in HashiCorp Terraform, and we lost some database. That was one challenge, which was not a known issue. Later, they identified that there was one defect in that code. Apart from that, there have been no challenges.
What do I think about the scalability of the solution?
Since it is based on Azure, HashiCorp Terraform is highly scalable.
How are customer service and support?
Whenever we face any issues, we escalate it to HashiCorp technical support, and we get that support. We have regular interaction with them. I would rate the HashiCorp technical support an eight on a scale of one to ten, where ten is the best.
How would you rate customer service and support?
Positive
Which solution did I use previously and why did I switch?
From a configuration management perspective, we have used Jenkins and SCCM. My experience is limited to that, but some of my team members have used Ansible and others as well.
The major benefit of HashiCorp Terraform in comparison to Jenkins and SCCM is that these are only configuration management tools, but HashiCorp Terraform is a language where you can deploy those, and you provide those providers for different cloud environments. This gives it a tactical advantage. It deals with having a seat, or it always helps having a lesser technical landscape. We don't have to have additional tools or any other feature to develop that IaC code as well.
How was the initial setup?
When we did the POC and wanted to set up our production environment, it took us around three to four months. Now that we have set up that pipeline for the upgrades, it doesn't take us that long. For the production deployment, currently, it takes us around two weeks, excluding the testing, the stage deployment, development, and deployment.
What was our ROI?
We have not calculated the measurable benefits recently from using HashiCorp Terraform. On a high level, I would say it has improved our overall environment, speed, and excellence by approximately 20%.
What other advice do I have?
I can provide feedback regarding my experience working with HashiCorp Terraform. We haven't found any major challenges with the integration of HashiCorp Terraform. Frankly speaking, we haven't explored it completely, but for our requirements, it has been working fine.
I have not had any AI-driven projects or AI-driven tasks, nor have I utilized any AI within HashiCorp Terraform yet. I might not be the right person regarding the HashiCorp Terraform licensing part because I haven't been involved from the costing perspective.
Based on my experience, I would recommend HashiCorp Terraform to others, majorly because of the advantages of being platform-agnostic and all those other features. My overall rating for HashiCorp Terraform is eight out of ten.
Ensures consistency and security in deployments while adapting to resource availability
What is our primary use case?
I use it to deploy our Kubernetes clusters and Boomi as well. I can run Boomi by itself and not worry about Terraform and Kubernetes , and that's okay.
However, my use case requires me to run it in a cluster environment to scale up and scale down accordingly and manage costs. This is why I chose Kubernetes. Although it's possible to manually roll it out, I have security requirements to consider for a secure environment. To make it repeatable, I use Bicep or Terraform , as I'm mostly running in Azure .
I decided on Terraform to manage deployments across multiple environments. This includes a dev environment, a QA environment, and now a production environment. I test and then run Terraform to deploy these environments. In AI, it's more about setting up your environment.
I develop AI-based products and use Terraform to create a consistent and secure environment in Azure . Once deployed, I get a security score from Azure and receive recommendations for improvements. If a resource is noncompliant under SOC 2, type one or two, ISO, or HIPAA, I make the changes in Terraform, redeploy, and observe score improvements. Terraform aids in ensuring my deployments are correctly configured across environments.
What is most valuable?
The most valuable feature is predictability. When I need to put something, it is repeatable. I can deploy it in one environment, change the parameter, and it will work in another. If changes are needed, I track who did what because my Terraform scripts are version-controlled. This reduces guesswork and trial and error from the UI, replacing it with code, which enhances maintainability. In cloud environments, manual configurations can be forgotten or misunderstood if the original person leaves, but Terraform ensures documentation and consistent configurations.
What needs improvement?
The area for improvement is the speed at which resources become available. When a new resource is introduced in AWS or Azure, especially since I work mostly in Azure, how quickly can it be integrated into my Terraform scripts ensuring rapid availability of resources is crucial.
For how long have I used the solution?
I have used the solution for two to three years now.
What do I think about the stability of the solution?
The solution is stable because I can define which version I want to use. I am not at the mercy of the latest version. I can choose a stable version and decide whether to upgrade based on its performance.
What do I think about the scalability of the solution?
The solution scales well. Terraform runs only when our pipelines run and parallelizes resource creation/updates whenever possible.
How was the initial setup?
The setup is straightforward, but mastering it may take a day or two. Maintenance requires significant expertise. The challenge lies in understanding the environments being created, not Terraform itself.
What other advice do I have?
I am using the free version. The paid version is necessary when you run it and manage it in the environment, however, I only use Terraform runtimes. The documentation is excellent, and understanding how to read it is crucial.
Once I understand the different concepts of Terraform, it becomes straightforward, allowing for further capabilities. A major challenge was applying Terraform to existing resources, yet now the new import method is much improved.
My product rating is eight out of ten.