Atlantis, meet Spacelift
Atlantis gives you custom workflows and runs on your infrastructure. Spacelift embraces all those characteristics of Atlantis but offers them in a modern and sophisticated SaaS product.
See the difference
Versatile and robust
One of most frequent challenges while using Atlantis in practice is a non-intuitive workflow driven by its reliance on pull requests. Spacelift does not depend on pull requests, it’s driven by push and tag events, so it’s easy to build a sophisticated Git flow that can be easily customized using Git push policies.
Granular access controls on account
and project level that work well with
an identity provider of your choice (SSO)
Spacelift ships with a sophisticated mechanism allowing administrators to declare who can log in (and under what circumstances) and what should be their level of access to each of the managed projects. Spacelift ships with SSO out of the box, supporting every identity provider that speaks SAML 2.0 protocol.
Automated code review and
threat detection using a consistent
open-source policy-as-code framework
Spacelift puts policy-as-code in the center of its value proposition and builds a consistent, robust policy framework on top of Open Policy Agent - an open-source solution endorsed by Cloud Native Computing Foundation. You can not only declare rules that ensure compliance of your Terraform changes, but also implement rules around account and project access, handling push notifications, starting runs and triggering tasks, and creating relationships between projects.
Ability to declare complex workflows
between projects across multiple
Spacelift’s trigger policies provide a smart, declarative automation layer on top of vanilla Terraform. These allow you to plug into state changes of individual projects and declare dependencies that should be resolved following the changes that have just been applied.
Built-in private module registry with a full CI system for modules
Spacelift adds a full CI solution for Terraform modules. You can ensure that your private modules are healthy before you distribute them to the rest of your organization.
Effortless setup and customization with per-project environment management and Docker integration
In Spacelift, much of the configuration can be handled by the project owners themselves - you can add Terraform and/or environment variables and mount files (even inject Terraform code!) programmatically or through the GUI without the need for administrative privileges or changing the central server configuration.
Programmatic configuration using Terraform
Spacelift entities like stacks, contexts, modules or policies as well as their configuration can be managed in a declarative way using your favorite infra-as-code tool. Yes, that’s right - Spacelift offers a Terraform provider that allows you to manage the lifecycle of its own resources programmatically.
Creature comforts like contexts, tasks or stack locking
Contexts allow you to attach entire collections of configuration to individual stacks and modules. Tasks provide a powerful audited way of running one-off administrative commands on an initialized Terraform environment - subject to their own policy constraints. Stack locking allows a single individual to take exclusive control over a stack to ensure that nobody is able to modify its state while crucial changes are being made.