Terraform ephemeral workspaces public beta now available
Removing unused infrastructure resources is important not just for cost control, but for security as well.
Everyone working in IT understands the challenge of finding and turning off infrastructure that gets spun up and forgotten about. It's an ongoing issue that unnecessarily inflates IT costs.
Back in June at HashiDays 2023, we previewed the upcoming ephemeral workspaces feature, which is aimed at helping organizations manage the cleanup of old and unwanted resources accumulated over time. Today, the wait is over.
The public beta of ephemeral workspaces for Terraform Cloud Plus is now available. It allows customers to schedule a time to automatically destroy non-production resources, eliminating the need for manual cleanup, reducing infrastructure costs, and streamlining workspace management.
» Benefits of ephemeral workspaces
This new feature benefits infrastructure teams in three ways:
Cost savings: Ephemeral workspaces not only reduce infrastructure costs, they also give more time back to infrastructure teams since they don’t have to hunt down or manually delete unused resources as often.
Increased efficiency: Administrators can set time-to-live (TTL) settings on workspaces through the API or UI, which simplifies management and testing.
Improved security: Workspaces that are not being actively watched or have been forgotten pose a security risk. Automatically destroying unused workspaces helps organizations meet compliance requirements and reduces the potential attack surface of your infrastructure.
» Using ephemeral workspaces
It is easy to use ephemeral workspaces. Just set a date and time for when you would like the workspace to be de-provisioned. Auto-destroy settings can be found in Workspace Settings under the section in the sidebar called Destruction and Deletion.
![Auto destroy settings](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1692301401-auto-destroy-full.png&w=3840&q=75)
Auto-destroy settings can be found in Workspace Settings.
The status of the auto-destroy setting shows up in the sidebar on your workspace's overview page, alongside settings like Execution mode and Auto apply. The auto-destroy status displays as Off if not configured. If configured, the status shows when the next auto-destroy is planned for. If, for any reason, the scheduled destroy run fails, the sidebar status will link to the failed run, where the run output will provide further details.
![Auto destroy overview](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1692303073-auto-destroy-overview.png&w=3840&q=75)
The workspace overview shows when the next auto-destroy is planned.
Once the configured auto-destroy time is reached, Terraform will automatically run a destroy plan and apply it to destroy your managed resources. Notifications can be configured to send an auto destroy reminder before a destroy
run is triggered and auto destroy results to indicate the success or failure of the destroy
run.
» Getting started with Terraform Cloud
Terraform Cloud is designed to standardize workflows from Day 1 infrastructure provisioning to Day 2 operations and beyond. It helps organizations optimize infrastructure investments and improve operational efficiency. Ephemeral workspaces further builds on this optimization.
Try the new ephemeral workspaces today — and if you are new to Terraform, sign up for Terraform Cloud and contact sales for a trial of Terraform Cloud Plus.
Sign up for the latest HashiCorp news
More blog posts like this one
![Terraform extension for VS Code speeds up loading of large workspaces](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714155806-blog-library-product-terraform-dark-gradient.jpg&w=3840&q=75)
Terraform extension for VS Code speeds up loading of large workspaces
New releases of the HashiCorp Terraform extension for Visual Studio Code and Terraform language server significantly reduce memory usage and start up time for large workspaces.
![Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1572286031-vault-terraform-background.png&w=1920&q=75)
Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?
Learn how HCP Terraform and Terraform Enterprise users can use Vault-backed dynamic credentials to secure their infrastructure during provisioning better than the base-level dynamic provider credentials.
![HCP Terraform adds granular API access for audit trails](/_next/image?url=https%3A%2F%2Fwww.datocms-assets.com%2F2885%2F1714170900-blog-library-product-hcp-terraform-dark.jpg&w=3840&q=75)
HCP Terraform adds granular API access for audit trails
HCP Terraform eliminates the need to rely on organization permissions to the audit trails endpoint, streamlining permissions workflows and reducing risk.