HashiCorp and Microsoft Extend Multi-year Collaboration Agreement
HashiCorp is pleased to announce an extension of the multi-year collaboration agreement signed with Microsoft in 2017. The purpose of the initial agreement was to expand the capabilities of the Azure Terraform provider to include more resources and services for Azure users to leverage through Terraform. In the two years since that agreement was signed, Microsoft and HashiCorp have collaborated on a number of new enhancements for customers including:
- Terraform embedded into the Azure Cloud Shell CLI
- Terraform support for Azure Stack
- Extensive services and resource coverage for the Azure Terraform Provider
- Over 100 Terraform modules published on the Terraform Module Registry
In addition to the work done on the Terraform provider, Microsoft and HashiCorp announced a series of Vault, Consul, and Packer integrations. Details on these announcements can be seen in this blog by Brendan Burns. HashiCorp was also recently recognized for the achievements made in open-source contributions to Azure by being named the 2019 Partner of the Year for Open Source Infrastructure and Applications on Azure.
The extension of this collaboration agreement signifies a continued commitment by both companies to deliver a great experience while using HashiCorp tools on Azure. Customers can look forward to continued support from Microsoft and a robust Terraform provider built on co-engineering efforts.
We look forward to executing on additional growth and innovation with the Microsoft team.
Sign up for the latest HashiCorp news
More blog posts like this one
![Terraform extension for VS Code speeds up loading of large workspaces](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714155806-blog-library-product-terraform-dark-gradient.jpg&w=3840&q=75)
Terraform extension for VS Code speeds up loading of large workspaces
New releases of the HashiCorp Terraform extension for Visual Studio Code and Terraform language server significantly reduce memory usage and start up time for large workspaces.
![Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1572286031-vault-terraform-background.png&w=1920&q=75)
Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?
Learn how HCP Terraform and Terraform Enterprise users can use Vault-backed dynamic credentials to secure their infrastructure during provisioning better than the base-level dynamic provider credentials.
![HCP Terraform adds granular API access for audit trails](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714170900-blog-library-product-hcp-terraform-dark.jpg&w=3840&q=75)
HCP Terraform adds granular API access for audit trails
HCP Terraform eliminates the need to rely on organization permissions to the audit trails endpoint, streamlining permissions workflows and reducing risk.