Alternatives to Pulumi
Compare Pulumi alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Pulumi in 2026. Compare features, ratings, user reviews, pricing, and more from Pulumi competitors and alternatives in order to make an informed decision for your business.
-
1
Bitrise
Bitrise
Bitrise is a CI/CD platform built for mobile development, helping teams speed up builds, automate testing, and deliver high-quality apps faster. It supports native languages like Swift, Objective-C, Java, and Kotlin, as well as cross-platform frameworks including React Native, Flutter, Xamarin, Cordova, and Ionic. Setup takes minutes, with customizable workflows that adapt to any project. Bitrise integrates with GitHub, GitLab, and other industry-standard tools, while its cloud infrastructure removes the need for manual processes or maintenance overhead. Pipelines provide flexible structure for CI/CD, running tasks in parallel or sequentially to optimize efficiency. With access to the latest machines, up-to-date Xcode versions, and expert customer support, Bitrise offers a complete solution for mobile teams of any size. -
2
GitLab
GitLab
GitLab is a complete DevOps platform. With GitLab, you get a complete CI/CD toolchain out-of-the-box. One interface. One conversation. One permission model. GitLab is a complete DevOps platform, delivered as a single application, fundamentally changing the way Development, Security, and Ops teams collaborate. GitLab helps teams accelerate software delivery from weeks to minutes, reduce development costs, and reduce the risk of application vulnerabilities while increasing developer productivity. Source code management enables coordination, sharing and collaboration across the entire software development team. Track and merge branches, audit changes and enable concurrent work, to accelerate software delivery. Review code, discuss changes, share knowledge, and identify defects in code among distributed teams via asynchronous review and commenting. Automate, track and report code reviews.Starting Price: $29 per user per month -
3
GitGuardian
GitGuardian
GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets lifecycle. The platform supports over 450+ types of secrets, offers public monitoring for leaked data, and deploys honeytokens for added defense. Trusted by over 600,000 developers, GitGuardian is the choice of leading organizations like Snowflake, ING, BASF and Bouygues Telecom for robust secrets protection.Starting Price: $0 -
4
Massdriver
Massdriver
At Massdriver, we believe in prevention, not permission, letting ops teams enforce guardrails while developers deploy confidently. Our platform encodes your non-negotiables into self-service modules built with your preferred IaC (Terraform, Helm, OpenTofu, etc.) standardizing infrastructure across AWS, Azure, GCP, and Kubernetes out-of-the-box. By bundling policy, security, and cost controls into functional IaC assets, Massdriver cuts overhead for ops teams and speeds developer workflows. Through a central service catalog, developers can provision what they need with integrated monitoring, secrets management, and RBAC baked in. No more brittle IaC pipelines; ephemeral CI/CD spins up automatically from each module’s tooling. Scale faster with unlimited cloud accounts and projects, all while reducing risk and ensuring compliance. Massdriver—fast by default, safe by design.Starting Price: Free trial -
5
SharePass
SharePass
SharePass is a SaaS Secret Management platform that allows sharing and managing secrets and confidential information using a web application, extension, or mobile app. SharePass works with encrypted links transmitted from the sender to the receiver with various settings and flags. The settings include expiry restriction, availability, IP restrictions and an entire filtering funnel (patent pending). SharePass is platform-independent that can be used with your existing communication tools. When it comes to your privacy, SharePass or any of its employees cannot see the content of your secrets; the secrets can be seen only by the exchanging parties. SharePass meets the latest cybersecurity compliance and regulations. In the era of identity theft, SharePass will protect you and prevent your data from leaking to the dark web by eliminating your digital footprint. SharePass supports SSO with Office365, Google Workspace, MFA, and integration with Yubikeys for maximum security.Starting Price: Free -
6
Doppler
Doppler
Stop struggling with scattered API keys, hacking together home-brewed configuration tools, and avoiding access controls. Give your team a single source of truth with Doppler. The best developers automate the pain away. Create references to frequently used secrets in Doppler. Then when they need to change, you only need to update them once. Your team's single source of truth. Organize your variables across projects and environments. The scary days of sharing secrets over Slack, email, git, zip files, are over. After adding a secret, your team and their apps have it instantly. Like git, the Doppler CLI smartly knows which secrets to fetch based on the project directory you are in. Gone are the futile days of trying to keep ENV files in sync! Practice least privilege with granular access controls. Reduce exposure when deploying with read-only service tokens. Contractor needs access to just development? Easy!Starting Price: $6 per seat per month -
7
JFrog Artifactory
JFrog
The Industry Standard Universal Binary Repository Manager. Supports all major package types (over 27 and growing) such as Maven, npm, Python, NuGet, Gradle, Go, and Helm including Kubernetes and Docker as well as integration with leading CI servers and DevOps tools that you already use. Additional functionalities include: - High Availability that scales to infinity with active/active clustering of your DevOps environment and scales as business grows - On-Prem, Cloud, Hybrid, or Multi-Cloud Solution - De Facto Kubernetes Registry managing application packages, operating system’s component dependencies, open source libraries, Docker containers, and Helm charts with full visibility of all dependencies. Compatible with a growing list of Kubernetes cluster providers. -
8
Terraform
HashiCorp
Terraform is an open-source infrastructure as code software tool that provides a consistent CLI workflow to manage hundreds of cloud services. Terraform codifies cloud APIs into declarative configuration files. Write infrastructure as code using declarative configuration files. HashiCorp Configuration Language (HCL) allows for concise descriptions of resources using blocks, arguments, and expressions. Run terraform plan to check whether the execution plan for a configuration matches your expectations before provisioning or changing infrastructure. Apply changes to hundreds of cloud providers with terraform apply to reach the desired state of the configuration. Define infrastructure as code to manage the full lifecycle — create new resources, manage existing ones, and destroy those no longer needed. -
9
Cloud Maker
Cloud Maker
Diagram Driven Cloud Infrastructure - Drag and drop design, automated deployment and the benefits of Infrastructure-as-Code, without the complexity! Cloud Maker lets Solution Architects and DevOps Engineers rapidly diagram infrastructure, check for security issues with Cloud Maker Overwatch, and deploy to the Cloud at the click of a button. Under the hood, we automatically generate Infrastructure-as-Code so that you get all the benefits without having to write a single line of code. Key features and benefits: - Visually design beautiful, standardized infrastructure diagrams - Shift security left with our Overwatch design-time security scanner - Automatically generate IaC - Deploy directly to the Cloud with Cloud Maker Pipelines - Consume your designs and our deployment engine through Azure DevOps, GitHub Actions & JFrog CI/CD integrations.Starting Price: $27/user/month -
10
OpenTofu
OpenTofu
OpenTofu is a Terraform fork, created as an initiative of Gruntwork, Spacelift, Harness, Env0, Scalr, and others, in response to HashiCorp’s switch from an open source license to the BUSL. The initiative has many supporters. On the technical level, OpenTofu 1.6.x is very similar feature-wise to Terraform 1.6.x. In the future, the projects feature sets will diverge. The other main difference is that OpenTofu is open source, and it's goal is to be driven collaboratively with no single company being able to dictate the roadmap. Companies will encounter more difficulties with the situation. Switching to a new project carries risks, but staying with a project that changes its license without warning is far riskier. This risk is minimized by giving OpenTofu to the Linux Foundation, and OpenTofu’s aim of maintaining feature parity with Terraform for future releases reduces the technical risks.Starting Price: Free -
11
Cluster.dev
Cluster.dev
Cluster.dev, the only manager for cloud-native infrastructures. Combine the power of all your infrastructure tools. Create platform-as-a-service for your teams. Customize your projects and infrastructures. Observe changes and the state of your infrastructure in a single place, your Git repo. Use a common solution for all types of changes. Forget about manual runbooks and CI/CD magic. You deserve to have an overview of all your infrastructure in a single place! Confidence in infrastructure changes. Be sure that your tools are doing what you expect them to do. Everything in Cluster.dev has a state. Even scripts and k8s manifest. Security, and independence from third-party vendors. Pass secrets to third-party tools even if they don't support your secrets store. Customization for every piece of infrastructure. With its amazing template engine, Cluster.dev allows you to customize configs, scripts, manifests, Terraform code, and whole infrastructures. -
12
CyberArk Conjur
CyberArk
A seamless open source interface to securely authenticate, control and audit non-human access across tools, applications, containers and cloud environments via robust secrets management. Secrets grant access to applications, tools, critical infrastructure and other sensitive data. Conjur secures this access by tightly controlling secrets with granular Role-Based Access Control (RBAC). When an application requests access to a resource, Conjur authenticates the application, performs an authorization check against the security policy and then securely distributes the secret. Security policy as code is the foundation of Conjur. Security rules are written in .yml files, checked into source control, and loaded onto the Conjur server. Security policy is treated like any other source control asset, adding transparency and collaboration to the organization’s security requirements. -
13
Chef
Progress Software
Chef turns infrastructure into code. With Chef, you can automate how you build, deploy, and manage your infrastructure. Your infrastructure becomes as versionable, testable, and repeatable as application code. Chef Infrastructure Management ensures configurations are applied consistently in every environment with infrastructure management automation. Chef Compliance makes it easy to maintain and enforce compliance across the enterprise. Deliver successful application outcomes consistently at scale with Chef App Delivery. Chef Desktop allows IT teams to automate the deployment, management, and ongoing compliance of IT resources. Ensure configurations are applied consistently in every environment. Powerful policy-based configuration management system software. Runbook automation to consistently define, package & deliver applications. IT automation & DevOps dashboards for operational visibility. -
14
Rescale
Rescale
A comprehensive cloud platform to optimize any high performance computing workflow or workload on any infrastructure. Rescale powers science and engineering breakthroughs by eliminating the complexity of big compute with intelligent full-stack automation and the near-infinite power of hybrid cloud. Maximize the economic impact of hybrid and multi-cloud operations using the latest architectures and performance intelligence. Enable global and multi-BU organizations with controlled and secure computing environments with the highest levels of service. Accelerate commercializing new innovations with researcher-centric workflows and collaboration, abstracted from infrastructure. Application and license management. Financial budget setting and alerting. Hybrid cloud infrastructure automation. Security, access, and compliance policies. Software and hardware performance intelligence. Software and hardware performance intelligence. User and simulation workflow intelligence. -
15
Knox
Pinterest
Knox is a secret management service. Knox is a service for storing and rotation of secrets, keys, and passwords used by other services. Pinterest has a plethora of keys or secrets doing things like signing cookies, encrypting data, protecting our network via TLS, accessing our AWS machines, communicating with our third parties, and many more. If these keys become compromised, rotating (or changing our keys) used to be a difficult process generally involving a deploy and likely a code change. Keys/secrets within Pinterest were stored in git repositories. This means they were copied all over our company's infrastructure and present on many of our employees laptops. There was no way to audit who accessed or who has access to the keys. Knox was built to solve these problems. Ease of use for developers to access/use confidential secrets, keys, and credentials. Confidentiality for secrets, keys, and credentials. Provide mechanisms for key rotation in case of compromise. -
16
Puppet Enterprise
Puppet
Puppet is redefining what’s possible for continuous operations. Easily automate your environment to deliver at cloud speed and cloud scale with products that are responsive and predictive by design. 90% of the largest US-based companies rely on Puppet’s infrastructure as code to simplify the complexity of modern IT infrastructure. At Puppet, we’re redefining what is possible for continuous operations. We empower IT operations teams to easily automate their infrastructure, enabling them to deliver at cloud speed and cloud scale. Our scalable approach to infrastructure automation enables teams to innovate rapidly, with security and compliance baked in. We’re leading the way from find-and-fix to predicting at scale. No more surprises. We move at the speed of business, delivering infrastructure automation software that gives your teams back their time, and promises them, and your business. peace of mind.Starting Price: $120 per month -
17
Onboardbase
Onboardbase
Onboardbase is the a secret management infrastructure platform that provides single source of shared truth for app secrets and usage. It helps dev teams securely share and work with environment-specific configs at every development stage, synced across infrastructure without compromising security - this means development teams can focus on building great apps rather than managing secrets and data. Secrets are dynamically kept up to date across your environments and infrastructure, with 50+ integrations and growing. Dev teams can monitor and audit how long, where and when your secrets are used and revoke usage anywhere with a click. Powerful always-on codebase scanning features prevent developers from accidentally leaking secrets to production, maintaining a robust security model.Starting Price: Free -
18
Spot Ocean
Spot by NetApp
Spot Ocean lets you reap the benefits of Kubernetes without worrying about infrastructure while gaining deep cluster visibility and dramatically reducing costs. The key question is how to use containers without the operational overhead of managing the underlying VMs while also take advantage of the cost benefits associated with Spot Instances and multi-cloud. Spot Ocean is built to solve this problem by managing containers in a “Serverless” environment. Ocean provides an abstraction on top of virtual machines allowing to deploy Kubernetes clusters without the need to manage the underlying VMs. Ocean takes advantage of multiple compute purchasing options like Reserved and Spot instance pricing and failover to On-Demand instances whenever necessary, providing 80% reduction in infrastructure costs. Spot Ocean is a Serverless Compute Engine that abstracts the provisioning (launching), auto-scaling, and management of worker nodes in Kubernetes clusters. -
19
Keywhiz
Keywhiz
Keywhiz is a system for managing and distributing secrets. It can fit well with a service oriented architecture (SOA). Here is an overview in presentation format. Common practices include putting secrets in config files next to code or copying files to servers out-of-band. The former is likely to be leaked and the latter difficult to track. Keywhiz makes managing secrets easier and more secure. Keywhiz servers in a cluster centrally store secrets encrypted in a database. Clients use mutually authenticated TLS (mTLS) to retrieve secrets they have access to. Authenticated users administer Keywhiz via CLI. To enable workflows, Keywhiz has automation APIs over mTLS. Every organization has services or systems that require secrets. Secrets like TLS certificates/keys, GPG keys, API tokens, database credentials. Keywhiz is reliable and used in production, however occasional changes may break API backward compatibility. -
20
Gravity Cloud
Gravity Cloud
Gravity cloud is an Internal Developer Platform that enables engineering teams to run and manage cloud at scale. The feature-rich IDP brings complete control and visibility for Kubernetes, Databases, RBAC, CI/CD and much more. Gravity also enables complete cost visibility along with any action performed on the cloud. For engineering teams, IDP becomes an important part of the developer lifecylce to increase productivity and reducing total cost of ownership on the non-core developement work. Gravity's unique IDP ensures to deliver the maximum output from your software lifecyles.Starting Price: $49 per month -
21
Akeyless Identity Security Platform
Akeyless
Akeyless delivers identity security for an era shaped by automation and AI. The cloud-native platform secures machines, AI agents, and human access across hybrid, multi-cloud, and on-prem environments. It provides a practical path to secretless, identity-based access through secrets management, certificate lifecycle management and PKI, PAM, and unified governance. Akeyless is built on a cryptography foundation that combines encryption, key management, and Distributed Fragments Cryptography to keep sensitive material under customer control and protected from post-quantum threats. With integrations for cloud IAM, Kubernetes, CI/CD, and MCP-based AI agent workflows, teams can adopt and scale AI agents securely without expanding risk. Akeyless Jarvis™ delivers identity intelligence to surface risky access and strengthen oversight. -
22
WALLIX Bastion
WALLIX
Easy to use and deploy, the WALLIX Bastion PAM solution delivers robust security and oversight over privileged access to critical IT infrastructure. Reduce the attack surface, secure remote access, and meet regulatory compliance requirements with simplified Privileged Access Management. WALLIX Bastion delivers leading session management, secrets management, and access management features to secure IT and OT environments, enable Zero Trust and Just-In-Time policies, and to protect internal and external access to sensitive data, servers, and networks in industries ranging from healthcare to finance to industry and manufacturing. Adapt to the digital transformation with secure DevOps thanks to AAPM (Application-to-Application Password Management). WALLIX Bastion is available both on-premise and in cloud environments for complete flexibility, scalability, and the lowest market total cost of ownership. WALLIX Bastion PAM natively integrates with a full suite of security solutions -
23
Segura
Segura
Segura® (formerly senhasegura) is a cybersecurity company focused on Privileged Access Management (PAM). Its platform helps organizations secure and manage privileged identities, credentials, and secrets across hybrid and cloud environments. Segura supports use cases such as credential vaulting, session monitoring, privilege elevation, and secrets management for DevOps. Designed to simplify complex identity security challenges, Segura provides IT teams with visibility, control, and tools to reduce risk and support compliance. The company operates globally through a network of partners and serves customers across key sectors, including finance, healthcare, government, telecom, and critical infrastructure. -
24
SecretHub
SecretHub
Upgrade security throughout the stack with a unified secrets management platform that every engineer can use – from admin to intern. Putting passwords and API keys in source code creates a security risk. But handling them properly creates complexity that makes it extremely cumbersome to deploy. Git, Slack, and email are designed to share information, not to keep secrets. Copy-pasting values and waiting on that one admin who holds all the keys simply don't scale when you're deploying software multiple times a week. It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.Starting Price: $99 per month -
25
Harness
Harness
Harness is an AI-native software delivery platform that helps engineering teams achieve excellence by automating and streamlining the entire software delivery lifecycle. It enables continuous integration, continuous delivery, and GitOps for multi-cloud, multi-region deployments with increased speed and reliability. Harness simplifies infrastructure as code, database DevOps, and artifact management to improve collaboration and reduce errors. The platform offers AI-powered testing, incident response, chaos engineering, and feature management to enhance quality and resilience. Harness also provides cloud cost management, security testing orchestration, and developer insights to optimize performance and governance. Trusted by leading enterprises, Harness accelerates innovation while reducing manual effort and risk. -
26
Use keys to protect the secrets, personal data, and sensitive information you store in the cloud. Create and delete keys, set up access policies, and perform rotation via the management console, CLI, or API. Yandex KMS implements symmetric and asymmetric cryptography. Use the REST or RPC API to encrypt and decrypt small amounts of data, such as secrets and local encryption keys, as well as to sign data using e-signature schemes. You manage access to encrypted data, and Yandex KMS ensures the reliability and physical security of keys. Hardware Security Modules (HSMs) are available. Encrypt small amounts of data using the SDK in Java or Go. To encrypt larger amounts of data, the service is integrated with popular encryption libraries, including the AWS Encryption SDK and Google Tink. Integration with Yandex Lockbox makes it possible to encrypt secrets with your own keys. Secrets and data can also be protected using encryption keys in Managed Service for Kubernetes.Starting Price: $0.0230 per month
-
27
Yandex Lockbox
Yandex
Create secrets in the management console or using the API. Your secrets are safely stored in one place, easily integrated with your cloud services, and accessible via external systems over the gRPC or REST API. Encrypt your secrets using Yandex Key Management Service keys. Secrets are only stored in encrypted form. You can choose pre-configured service roles to ensure granular access to your secrets. Set up access permissions to read or manage your secret or its metadata. Create a secret, select a Key Management Service (KMS) key, and securely store your login-password pairs and other sensitive information. A secret may contain any of your confidential information, e.g. a login-password pair, server certificate keys, or cloud service account keys. Each secret stored by the service can have multiple versions of stored data. The service stores this data securely in encrypted form. All secrets are replicated in three availability zones.Starting Price: $0.0277 per 10000 operations -
28
AWS Secrets Manager
Amazon
AWS Secrets Manager helps you protect secrets needed to access your applications, services, and IT resources. The service enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Users and applications retrieve secrets with a call to Secrets Manager APIs, eliminating the need to hardcode sensitive information in plain text. Secrets Manager offers secret rotation with built-in integration for Amazon RDS, Amazon Redshift, and Amazon DocumentDB. Also, the service is extensible to other types of secrets, including API keys and OAuth tokens. In addition, Secrets Manager enables you to control access to secrets using fine-grained permissions and audit secret rotation centrally for resources in the AWS Cloud, third-party services, and on-premises. AWS Secrets Manager helps you meet your security and compliance requirements by enabling you to rotate secrets safely without the need for code deployments.Starting Price: $0.40 per month -
29
CircleCI
CircleCI
Automate your development process with CI hosted in the cloud or on a private server. Take control of your code and manage every source of change. CircleCI means change validation, at every step. Trust that you can release updates right when your customers need them, with the certainty they’ll work every time. The power to create without limits. Code in every language and across multiple execution environments. If you can write it, we can build, test, and deploy it. With flexible environments and thousands of pre-built integrations, your pipelines never limit the possibility of what you can deliver. We’re the only CI/CD platform that’s FedRAMP certified and SOC 2 Type II compliant. Built-in features like audit logs, OpenID Connect, third-party secrets management, and LDAP give you complete control of your code.Starting Price: $50 per month -
30
Incredibuild
Incredibuild
Incredibuild is the leading platform for development acceleration. Our platform speeds up developer and CI builds with our distribution and caching technologies, cutting down wait times from hours and days to minutes. Most importantly, we do so without changing your code, tools, or processes, on prem or on the cloud. Incredibuild gives you better visibility into your builds, significant acceleration, and smarter build asset orchestration for 8-10x faster builds. 200,000 devs and managers at over 2,000 companies, including world-leading brands like Microsoft, Amazon, Citibank, Adobe, Disney, Intel, Samsung, EPIC Games, Nintendo, and many more rely on Incredibuild to turbocharge their development and continuously delight their customers.Starting Price: $0 -
31
Crossplane
Crossplane
Crossplane is an open-source Kubernetes add-on that enables platform teams to assemble infrastructure from multiple vendors, and expose higher-level self-service APIs for application teams to consume, without having to write any code. Provision and manage cloud infrastructure and services using kubectl. Crossplane extends your Kubernetes cluster, providing you with CRDs for any infrastructure or managed service. Compose these granular resources into higher-level abstractions that can be versioned, managed, deployed, and consumed using your favorite tools and existing processes you've already integrated with your clusters. We built Crossplane to help organizations build their clouds like the cloud vendors build theirs, with a control plane. Crossplane is a CNCF project which extends the Kubernetes API to manage and compose infrastructure. Operators can encapsulate policies, permissions, and other guardrails behind a custom API line generated by Crossplane. -
32
Constant
Constant
Instantly deploy and hyperscale bare metal, virtual servers, and storage around the world. Our passion is helping developers build and scale applications using the most efficient global cloud infrastructure. Spend less time managing your infrastructure and more time developing. Accelerate your development with flexible, reliable cloud infrastructure deployed in seconds. Build, deploy, and scale with CI/CD on our infrastructure. Deliver compute and storage resources where they are needed most. Scale your platform and deliver optimal performance to players around the globe. Build a global application backend to connect customers. Seamlessly manage dynamic and rapidly growing resource demands. Constant's flagship product, Vultr is a favorite with the developer community, serves over 1.5 million customers with flexible, scalable, global bare metal, cloud computing, and storage solutions. -
33
Confidant
Confidant
Confidant is a open source secret management service that provides user-friendly storage and access to secrets in a secure way, from the developers at Lyft. Confidant solves the authentication chicken and egg problem by using AWS KMS and IAM to allow IAM roles to generate secure authentication tokens that can be verified by Confidant. Confidant also manages KMS grants for your IAM roles, which allows the IAM roles to generate tokens that can be used for service-to-service authentication, or to pass encrypted messages between services. Confidant stores secrets in an append-only way in DynamoDB, generating a unique KMS data key for every revision of every secret, using Fernet symmetric authenticated cryptography. Confidant provides an AngularJS web interface that allows end-users to easily manage secrets, the mappings of secrets to services and the history of changes. -
34
Automic Automation
Broadcom
Enterprises need to automate a complex and diverse landscape of applications, platforms and technologies to deliver services in a competitive digital business environment. Service Orchestration and Automation Platforms are essential scale your IT operations and derive greater value from automation: You have to manage complex workflows across platforms, ERP systems, business apps from mainframe to microservices and multi-cloud. You need to streamline your big data pipelines, enabling self-services for data scientists while providing massive scale and strong governance on data flows. You're required to deliver compute, network and storage resources on-prem and in the cloud for development and business users. Automic Automation gives you the agility, speed and reliability required for effective digital business automation. From a single unified platform, Automic centrally provides the orchestration and automation capabilities needed accelerate your digital transformation. -
35
Tekton
Tekton
Tekton is a cloud-native solution for building CI/CD systems. It consists of Tekton Pipelines, which provides the building blocks, and of supporting components, such as Tekton CLI and Tekton Catalog, that make Tekton a complete ecosystem. Tekton standardizes CI/CD tooling and processes across vendors, languages, and deployment environments. It works well with Jenkins, Jenkins X, Skaffold, Knative, and many other popular CI/CD tools. Tekton abstracts the underlying implementation so that you can choose the build, test, and deploy workflow based on your team’s requirements. Tekton lets you create CI/CD systems quickly, giving you scalable, serverless, cloud native execution out of the box.Starting Price: Free -
36
Quali CloudShell
Quali
None of the bottlenecks, all the best practices. Automate multi-cloud provisioning and deployment, policy-driven compliance and cloud cost management. Torque is a SaaS platform delivering Infrastructure Automation at Scale for complex, application-centric environments on cloud technologies including AWS, Azure, and Kubernetes. IT leaders and DevOps innovators around the world trust Quali to enable self-service automation and governance to streamline application development, testing, and release to production. Seamlessly connect cloud automation, cost control, and security into your platform, and make the power of Environments as a Service accessible to any user through self-service, even if they are not cloud experts. Deliver the infrastructure & application resources your teams need with velocity and control. Give developers on-demand access to the application environments they need through their CI/CD tools, GUI, and CLI. -
37
IT Convergence Public Cloud
IT Convergence
IT Convergence is a global award winning and Gartner-recognized provider across all three pillars of the Cloud (IaaS, PaaS, SaaS), including Consulting (Advisory), Private Cloud (Hosting), Managed Services, Cloud Migration, Integration, Business Intelligence/Analytics, Cybersecurity, Development, RPA, Testing, Training, and Change Management services. Harness the power of hyperscale public clouds, guided by expert consultants through each step – from migration to optimization Our Public Cloud Includes: Cloud Transformation Advisory Cloud Workload and Traditional Hosting Migration In-Flight Migration OS, DB and Application Upgrade On-Premise, Hybrid and Cloud Integrations Backup and Disaster Recovery DevOps Engineering Cloud Administration Post-Cloud Automation -
38
Otter by Inedo
Inedo
Otter helps you provision and configure your servers automatically, without ever needing to log-in to a command prompt. You can define reusable sets of configuration called roles, and then scale your infrastructure by simply assigning these roles to any number of servers. Let everyone on your team run complex scripts with a custom GUI that you develop around your script parameters. Enable anyone to develop advanced, multi-server orchestrations without needing advanced coding skills. Define desired states of configuration for your servers, detect “drift” from their actual configuration, and re-configure as needed. CI/CD for Infrastructure & Configuration Management. Read the guide to learn how you can deliver infrastructure changes using CI/CD pipelines with Otter and BuildMaster.Starting Price: $2,995/year -
39
Drone
Harness
Configuration as a code. Pipelines are configured with a simple, easy‑to‑read file that you commit to your git repository. Each pipeline step is executed inside an isolated Docker container that is automatically downloaded at runtime. Any source code manager. Drone integrates seamlessly with multiple source code management systems, including GitHub, GitHubEnterprise, Bitbucket, and GitLab. Any platform. Drone.io natively supports multiple operating systems and architectures, including Linux x64, ARM, ARM64 and Windows x64. Any language. Drone works with any language, database or service that runs inside a Docker container. Choose from thousands of public Docker images or provide your own. Create and share plugins. Drone uses containers to drop pre‑configured steps into your pipeline. Choose from hundreds of existing plugins, or create your own. Drone makes advanced customization easy. Implement custom access controls, approval workflows, secret management, yaml syntax extensions& more. -
40
Use the expressive power of familiar programming languages to define your application resources and accelerate development. Simplify your AWS onboarding by using constructs that preconfigure cloud resources with proven defaults. Design and share reusable components that meet your organization's security, compliance, and governance requirements. Build applications, write runtime code, and define resources without leaving your integrated development environment (IDE). Define your cloud application resources using familiar programming languages. AWS Cloud Development Kit (AWS CDK) accelerates cloud development using common programming languages to model your applications. Develop applications more efficiently using AWS CDK as the main framework to define cloud infrastructure as code. Migrate complex backend infrastructure more efficiently, while integrating with continuous integration and delivery (CI/CD) pipelines.
-
41
Infisical
Infisical
Compare secrets across environments and see what's different or missing. Set personal values for secrets – either during local development or for sensitive secrets. Easily inherit other secrets to establish a single source of truth. Automatically identify and prevent secret leaks to git using Infisical's continuous monitoring and pre-commit checks – support over 140 secret types.Starting Price: $6 per month -
42
BuildPiper
Opstree Solutions
It takes care of the 3 primary pillars - Time, Cost & Productivity, so that your technology teams don't have to worry about them anymore. Adding a new environment to service is extremely simple. BuildPiper enables seamless modification and cloning of build & deploy details from an already created environment. This ability to clone environment details, makes creating a new environment extremely easy and quick. BuildPiper has a very well-designed ‘Build Details setup template’ which can seamlessly build the docker image of the service on providing a few simple inputs and configurations. If there are some custom steps in the docker build process, BuildPiper has them covered as well! With Pre hooks and Post hooks, it enables execution of custom steps before and after the Docker image creation. The build template also allows defining CI checks during the build definition process itself. -
43
JFrog
JFrog
Fully automated DevOps platform for distributing trusted software releases from code to production. Onboard DevOps projects with users, resources and permissions for faster deployment frequency. Fearlessly update with proactive identification of open source vulnerabilities and license compliance violations. Achieve zero downtime across your DevOps pipeline with High Availability and active/active clustering for your enterprise. Control your DevOps environment with out-of-the-box native and ecosystem integrations. Enterprise ready with choice of on-prem, cloud, multi-cloud or hybrid deployments that scale as you grow. Ensure speed, reliability and security of IoT software updates and device management at scale. Create new DevOps projects in minutes and easily onboard team members, resources and storage quotas to get coding faster.Starting Price: $98 per month -
44
Cloudify
Cloudify Platform
Manage all private and public environments from one platform using a single CI/CD plugin that connects to ALL automation toolchains. Including Jenkins, Kubernetes, Terraform, Cloud Formation, Azure ARM and more. No installation, no downloads … and on us for the first 30 days. Built-in integration with infrastructure orchestration domains including AWS Cloud formation, Azure ARM, Ansible and Terraform. Service Composition Domain-Specific Language (DSL) – simplifies the relationship between services, handling cascading workflows, shared resources, distributed life-cycle management and more. Orchestration of cloud native Kubernetes services across multiple clusters: OpenShift, GKE, EKS, AKS and KubeSpray. Access a built-in blueprint to automate cluster setup and configuration. Built-in integration with Jenkins and other CI/CD platforms providing a ‘one-stop-shop’ for integrating all orchestration domains to your CI/CD pipeline. -
45
Entro
Entro Security
Non-Human Identity & Secrets Security Platform. A pioneer in non-human identity management, Entro enables organizations to securely utilize non-human identities and secrets, overseeing their usage and automating their lifecycle from inception to rotation. Secrets-based cyber attacks are devastating and growing as more and more secrets are created by R&D teams and spread across various vaults and repositories with no real secret management, monitoring, or security oversight. Streamline and secure your non-human identity lifecycle management. With Entro, security teams can now oversee and protect Non-human identities with automated lifecycle management and seamless integration, ensuring comprehensive security & compliance through a unified interface. -
46
AWS CloudFormation
Amazon
AWS CloudFormation is a infrastructure provisioning and management tool that provides you the ability to create resource templates that specifies a set of AWS resources to provision. The templates allow you to version control your infrastructure, and also easily replicate your infrastructure stack quickly and with repeatability. Define an Amazon Virtual Private Cloud (VPC) subnet or provisioning services like AWS OpsWorks or Amazon Elastic Container Service (ECS) with ease. Run anything from a single Amazon Elastic Compute Cloud (EC2) instance to a complex multi-region application. Automate, test, and deploy infrastructure templates with continuous integration and delivery (CI/CD) automation. AWS CloudFormation lets you model, provision, and manage AWS and third-party resources by treating infrastructure as code. Speed up cloud provisioning with infrastructure as code.Starting Price: $0.0009 per handler operation -
47
Hemmelig.app
Hemmelig.app
Hemmelig lets you share secrets securely with encrypted messages that automatically self-destruct after being read. Paste a password, confidential message, or private data. Ensure your sensitive data remains encrypted, secure, and confidential. The secret link, by default, is a one-time use only, after which it will vanish. Hemmelig, [he`m:(ə)li], means secret in Norwegian.Starting Price: Free -
48
Ansible
Red Hat
Ansible is a radically simple automation engine that automates cloud provisioning, configuration management, application deployment, intra-service orchestration, and many other IT needs. Ansible Automation Platform has grown over the past years to provide powerful automation solutions that work for operators, administrators and IT decision makers across a variety of technology domains. It’s a leading enterprise automation solution from Red Hat®, a thriving open source community, and the de facto standard technology of IT automation. Scale automation, manage complex deployments, and speed productivity with an enterprise automation platform that can be used across entire IT teams. Red Hat or partner consulting services help you advance your end-to-end automation journey for faster time to value.Starting Price: Free -
49
GitHub
GitHub
GitHub is the world’s most secure, most scalable, and most loved developer platform. Join millions of developers and businesses building the software that powers the world. Build with the world’s most innovative communities, backed by our best tools, support, and services. If you manage multiple contributors , there’s a free option: GitHub Team for Open Source. We also run GitHub Sponsors, where we help fund your work. The Pack is back. We’ve partnered up to give students and teachers free access to the best developer tools—for the school year and beyond. Work for a government-recognized nonprofit, association, or 501(c)(3)? Get a discounted Organization account on us.Starting Price: $7 per month -
50
IBM Cloud® Schematics provides automation by offering declarative Terraform templates to ensure a desired provisioned cloud infrastructure. Native integration with Red Hat® Ansible extends configuration, management and provisioning to software and applications, and integrates with other IBM Cloud Services. With Terraform-as-a-Service, DevOps teams can use a high-level configuration language to model the resources they want in their cloud environment and enable Infrastructure as Code (IaC). Install software packages and application code on your infrastructure easily. Have your team build, deploy and iterate on your infrastructure automation processes. Improve the DevOps lifecycle, from planning and builds to software testing and application monitoring. Employ Satellite and Schematics to automate the creation of Satellite locations and Red Hat OpenShift® on IBM Cloud.