TrademarkTrademark
Features
Documentation
All articles
Comprehensive Guide

What is OpenTofu?

OpenTofu is the Apache-licensed, community-driven fork of Terraform—use it as a drop-in, lock-in-free way to manage infrastructure as code.
Sebastian StadilMarch 4, 2026Updated May 1, 2026
What is OpenTofu?

TL;DR

  • OpenTofu is the open-source, Apache-licensed fork of Terraform created in August 2023 after HashiCorp's BSL license change. Backed by the Linux Foundation; used in production by orgs of all sizes.
  • Most Terraform configs run on OpenTofu unchanged. Migration is usually as simple as swapping the terraform binary for tofu — see the Migration Guide section below.
  • OpenTofu adds features Terraform doesn't have, including built-in state file encryption (1.7+), early-eval, and provider iteration improvements. The OpenTofu Language Guide covers the syntax differences.
  • Provider compatibility is excellent. OpenTofu works with the same provider ecosystem and has its own registry. State files, tfvars-style variables, modules, and workspaces all work the same way.
  • When apply fails, see debugging OpenTofu apply failures for the most common causes and fixes.

Reviewed for accuracy by Ryan Fee on July 18th, 2025.

OpenTofu is the community-driven answer to Terraform's controversial licensing shift, offering infrastructure engineers a truly open-source alternative with

  • better security,
  • better state management, and
  • better developer-focused features.

It addresses the concerns of terraform users while introducing innovations long requested by the community but never implemented in the original product.

Community discussion thread on the OpenTofu fork following HashiCorp's August 2023 license change to BSL

In August 2023, HashiCorp changed Terraform's license from the Mozilla Public License v2.0 (MPL v2.0) to a restrictive Business Source License (BSL), prompting leading companies including Gruntwork, Spacelift, Harness, Env0, and Scalr to create OpenTofu as a fork of the last open-source version. This guide covers everything you need to know about OpenTofu in 2026.

OpenTofu History & Milestones

OpenTofu's journey from a community manifesto to a CNCF project has been rapid:

  • August 2023: HashiCorp changes Terraform's license from MPL v2.0 to the Business Source License (BSL). Leading infrastructure companies rally in response.
  • August 2023: Work on the OpenTF fork (later renamed OpenTofu) begins, with the project finding a home at the Linux Foundation and a path to the Cloud Native Computing Foundation (CNCF). Scalr announces first-class support for OpenTF as a drop-in replacement for legacy Terraform, allowing teams to migrate at their own pace with OpenTF and Terraform workspaces coexisting side by side.
  • January 2024: OpenTofu v1.6 launches as the first stable release, fully compatible with Terraform v1.5.x, including OCI registry support for modules and providers.
  • April 2024: OpenTofu v1.7 ships with several long-requested features:
    • State Encryption -- protects sensitive state files at rest with local passphrases and cloud integrations for key management systems such as AWS KMS, GCP KMS, and OpenBao.
    • Enhanced Provider-defined Functions -- lets providers define custom functions usable in tofu code, including an OpenTofu-exclusive feature to write custom functions in Go or Lua alongside config files.
    • Loopable Imports -- enables the use of for_each in import blocks, making bulk infrastructure imports much easier.
    • "Removed" blocks -- makes it easy to export infrastructure from tofu configs.
  • Late 2024: OpenTofu v1.8 and v1.9 introduce early variable evaluation, provider iteration with for_each, and the resource exclusion flag.
  • April 2025: The CNCF officially accepts OpenTofu, solidifying its position in the cloud-native ecosystem.
  • 2025-2026: OpenTofu v1.10+ delivers native testing, OpenTelemetry tracing, and native S3 state locking without DynamoDB.

What is OpenTofu?

OpenTofu is a drop-in replacement for Terraform that preserves compatibility with existing configurations while adding significant enhancements. It functions as an Infrastructure as Code (IaC) tool that enables engineers to define infrastructure resources declaratively using HashiCorp Configuration Language (HCL).

Core Capabilities

OpenTofu uses human-readable configuration files to define infrastructure resources declaratively, allowing engineers to express their desired infrastructure state rather than writing procedural scripts. The tool builds a resource graph to determine dependencies and applies changes efficiently.

resource "aws_instance" "example" {
  ami           = "ami-0c55b159cbfafe1f0"
  instance_type = "t2.micro"
 
  tags = {
    Name = "example-instance"
  }
}

State File Management

A critical aspect of OpenTofu's functionality is state file management. The state file serves as the source of truth that maps configured resources to real-world infrastructure objects and tracks metadata. OpenTofu's state management approach offers several advantages:

  • Efficient change detection through state comparison
  • Resource dependency tracking for proper ordering of operations
  • Performance optimization for large infrastructures
  • Secure collaboration through remote state backends

Community and Governance

With over 25,000 GitHub stars and more than 70 active contributors, OpenTofu has established itself as a vibrant open-source project. As a Linux Foundation project, OpenTofu is guided by a Technical Steering Committee representing multiple companies rather than being controlled by a single vendor. The CNCF accepted OpenTofu into its fold in April 2025, further solidifying its position in the cloud-native ecosystem.

Development priorities are shaped by:

  • Public issue tracking and feature voting
  • An open Request for Comments (RFC) process for major changes
  • Weekly community meetings for transparent discussion
  • Active Slack channels for real-time collaboration

OpenTofu vs Terraform: Key Differences

While OpenTofu maintains compatibility with Terraform configurations, several key differences have emerged as the projects diverge. For larger architectural patterns, see our take on the Terraform & OpenTofu Terralith and understanding Terraform & OpenTofu workspaces.

Licensing Model

OpenTofu: Uses the Mozilla Public License v2.0 (MPL v2.0), a true open-source license recognized by the Open Source Initiative. Users can freely use, modify, and distribute the software without ambiguity about competitive restrictions.

Terraform: Licensed under the Business Source License (BSL), a "source-available" license that prohibits using the software in ways that compete with HashiCorp's commercial offerings.

Governance and Development

OpenTofu: Community-driven development under Linux Foundation's neutral governance. Development priorities are set through transparent RFCs and community voting.

Terraform: Controlled by HashiCorp (now IBM), with development priorities set by commercial interests.

Innovative Features

OpenTofu has implemented several features long requested by the community but never added to Terraform:

Feature Description Version
State file encryption Protects sensitive infrastructure data at rest using multiple key providers v1.7
Early variable evaluation Allows variables in previously restricted contexts like module sources v1.8
Provider iteration with for_each Simplifies multi-region deployments with dynamic provider configurations v1.9
Exclusion flag Enables selectively skipping resources during operations v1.9
Loopable import blocks Use for_each/for loops in import blocks for bulk resource imports v1.8
OCI registry support Package modules and providers using OCI format v1.6
OpenTelemetry integration Experimental tracing support to improve performance v1.10

File Extensions

OpenTofu supports both .tf and .tofu file extensions. When both exist with the same name, OpenTofu prioritizes the .tofu file, enabling module authors to provide OpenTofu-specific functionality while maintaining Terraform compatibility.

Migration Guide: From Terraform to OpenTofu

Migrating from Terraform to OpenTofu is designed to be straightforward. The migration process is a simple binary replacement in most cases. For the syntax-level details on what's the same and what's diverged, see the OpenTofu Language Guide.

Step-by-Step Migration

1. Verify Your Current State

Ensure your Terraform state is clean and there are no pending changes:

$ terraform plan
No changes. Your infrastructure matches the configuration.

If there are changes, apply them before proceeding.

2. Back Up Your State File

Always back up your terraform.tfstate file and any remote state before migration. This is critical and non-negotiable.

3. Install OpenTofu

Install the OpenTofu CLI on your machine:

$ brew install opentofu
$ tofu --version
OpenTofu v1.10.0

You can now use the tofu command as a drop-in replacement for terraform.

4. Initialize OpenTofu

Run tofu init upgrade in your project directory. The upgrade flag ensures there are no conflicts with pulling providers from the OpenTofu registry:

$ tofu init upgrade
Initializing the backend...
Initializing provider plugins...

5. Plan and Apply with OpenTofu

Run tofu plan to ensure OpenTofu recognizes your existing infrastructure without planning unexpected changes:

$ tofu plan
No changes. Your infrastructure matches the configuration.

Once confident, run tofu apply to update the state file to the OpenTofu format:

$ tofu apply
No changes. Your infrastructure matches the configuration.
Apply complete!

Version Compatibility Considerations

Migrating from Terraform v1.5.x or lower: Migrate to OpenTofu v1.6.x first, then upgrade to the latest version. OpenTofu v1.6+ is fully compatible with Terraform v1.5.x.

Migrating from Terraform v1.6.x and newer: The migration is straightforward, but be aware of any new features or syntax introduced in later Terraform versions that may not yet be supported by OpenTofu.

Important Considerations

  • Provider Sources: By default, OpenTofu uses registry.opentofu.org. If your configurations explicitly use registry.terraform.io, update them to use the OpenTofu registry.
  • Tooling and Integrations: Verify compatibility with third-party tools (CI/CD pipelines, linters, security scanners). Most tools supporting older Terraform versions work fine with OpenTofu.
  • Module Compatibility: Confirm that any modules you rely on are compatible with OpenTofu.
  • Testing: Perform small, non-critical changes first to ensure everything works before making major infrastructure updates.

Advanced OpenTofu Features

State File Encryption

One of OpenTofu's most significant innovations is built-in state file encryption, a feature implemented in version 1.7. This addresses a longstanding security concern in the infrastructure as code community. For broader state management context (backends, locking, sharing), see our Terraform & OpenTofu state backends guide.

Why State Encryption Matters

State files contain sensitive data including database passwords, API keys, and private IPs. While remote backends like S3 offer some protection, client-side encryption provides defense-in-depth security at rest.

Implementing State Encryption

OpenTofu supports multiple key provider options:

terraform {
  encryption {
    key_provider "pbkdf2" "mykey" {
      passphrase = "secure-passphrase"
      key_length = 32
      iterations = 600000
    }
    method "aes_gcm" "default" {
      key_provider = key_provider.pbkdf2.mykey
    }
    state {
      method = method.aes_gcm.default
    }
  }
}

You can also use AWS KMS, GCP KMS, or other external key management services for enterprise deployments.

Dynamic Provider Configurations with for_each

Provider iteration using for_each (added in version 1.9) enables dynamic provider configurations, significantly reducing code duplication for multi-region deployments.

Multi-Region Deployment Pattern

Instead of defining separate provider blocks for each region:

provider "aws" {
  for_each = toset(var.regions)
  alias    = each.key
  region   = each.key
}
 
resource "aws_instance" "servers" {
  for_each = {
    for region in var.regions : region => {
      instance_type = "t3.micro"
    }
  }
 
  provider      = aws[each.key]
  ami           = data.aws_ami.ubuntu[each.key].id
  instance_type = each.value.instance_type
 
  tags = {
    Name = "server-${each.key}"
  }
}

This pattern eliminates repetitive code and makes configurations more maintainable.

Dynamic Backend Blocks

OpenTofu allows backend configurations to use variables and locals, enabling dynamic backend selection based on environment:

terraform {
  backend "s3" {
    bucket  = var.state_bucket
    key     = "${var.environment}/terraform.tfstate"
    region  = var.aws_region
    encrypt = true
  }
}

This enables a single configuration to support multiple deployment environments without code duplication.

Early Variable Evaluation

OpenTofu allows variables, locals, and data sources inside the top-level tofu block and for backend configurations—something Terraform traditionally restricts to static values. This unlocks powerful patterns:

locals {
  environment = var.env
  region      = var.aws_region
}
 
terraform {
  backend "s3" {
    bucket = "tf-state-${local.environment}"
    key    = "${local.region}/terraform.tfstate"
  }
}

The Native Test Framework

OpenTofu v1.10 introduced a native testing framework, eliminating the need for external test tools. The framework uses .tftest.hcl files:

run "validate_bucket_creation" {
  command = apply
 
  assert {
    condition     = aws_s3_bucket.main.id == "my-test-bucket"
    error_message = "S3 bucket name does not match expected value"
  }
}
 
run "validate_encryption_enabled" {
  command = apply
 
  assert {
    condition     = aws_s3_bucket_server_side_encryption_configuration.main.rules[0].apply_server_side_encryption_by_default[0].sse_algorithm == "AES256"
    error_message = "S3 bucket encryption is not enabled"
  }
}

The test framework supports:

  • Multiple test runs with setup/teardown
  • State assertions to validate resource creation
  • Plan-time and apply-time validation
  • Test variables and overrides

Resource Exclusion with the exclude Flag

The exclude flag (v1.9) enables selectively skipping resources during operations. This complements the target flag by providing inverse selection logic:

# Apply all resources except database
tofu apply -exclude 'aws_db_instance.prod'
 
# Exclude multiple resources
tofu apply \
  -exclude 'aws_db_instance.prod' \
  -exclude 'aws_rds_cluster.analytics'

Use Cases for Exclusion

  • Gradual rollouts: Apply changes to non-critical resources first
  • Maintenance windows: Skip resources undergoing maintenance
  • Manual management: Exclude resources managed outside IaC
  • Risk mitigation: Apply low-risk changes while deferring high-risk ones

Debugging OpenTofu Apply Failures

Failed tofu apply operations can halt pipelines and cause frustration. Understanding common failure modes and debugging techniques is essential. For a deeper failure-mode catalog with worked examples, see our dedicated guide on debugging OpenTofu apply failures.

Common Failure Categories

Authentication Errors

When credentials are invalid or expired, providers fail to authenticate:

Error: error configuring Terraform AWS Provider: no valid credential sources for Terraform AWS Provider found.

Resolution:

  • Verify AWS credentials are correctly set in environment variables or AWS profiles
  • Check IAM permissions for required actions
  • Refresh temporary credentials if using session tokens

Provider Issues

Provider errors occur when the provider cannot communicate with the target service:

Error: Failed to update instance: Service returned status 503 (Service Unavailable)

Resolution:

  • Check service health dashboards
  • Verify network connectivity and firewall rules
  • Ensure provider version is compatible with target service API

Resource Configuration Errors

Invalid resource configurations fail during apply:

Error: Invalid or missing attribute: instance_type is required

Resolution:

  • Validate HCL syntax with tofu fmt -check
  • Review required attributes in provider documentation
  • Use tofu console to test variable values

State Conflicts

Multiple concurrent applies can corrupt state:

Error: Error acquiring the state lock

Resolution:

  • Use remote backends with state locking (S3 + DynamoDB, or Terraform Cloud)
  • Implement CI/CD locking to prevent concurrent applies
  • Use tofu force-unlock only as a last resort after verifying no other process holds the lock

Debugging Techniques

Enable Verbose Logging

Set TF_LOG environment variable for detailed debugging:

export TF_LOG=DEBUG
tofu apply

Log levels: TRACEDEBUGINFOWARNERROR

Inspect the Plan

Use tofu plan output to understand what will change:

tofu plan -json | jq '.resource_changes[] | select(.change.actions[] == "delete")'

Test with Target

Use the -target flag to apply specific resources:

tofu apply -target 'aws_security_group.main'

This isolates problems to specific resources.

Validate and Format

Catch errors early with validation:

tofu validate
tofu fmt -recursive .

Retrieve Provider Documentation

Consult provider documentation for resource constraints:

tofu providers schema -json | jq '.provider_schemas | keys'

LSP Integration and Developer Experience

OpenTofu supports the Language Server Protocol (LSP), enabling intelligent code completion, syntax highlighting, and error detection in modern text editors.

Supported Editors

  • Visual Studio Code: via terraform-ls extension
  • Neovim/Vim: via LSP configuration
  • JetBrains IDEs: via terraform plugin
  • Sublime Text: via LSP client plugins

Benefits of LSP Integration

  • Real-time validation: Catch syntax errors before running tofu plan
  • Auto-completion: Suggest valid attributes and resource types
  • Go to definition: Navigate between modules and variables
  • Hover documentation: View resource attributes without opening provider docs
  • Refactoring: Safe variable and resource renaming

Configuration Example (VS Code)

{
  "languages": {
    "hcl": {
      "command": "terraform-ls",
      "args": ["serve"],
      "initializationOptions": {
        "backend": "memory",
        "experimentalFeatures": {
          "validateOnSave": true,
          "refactoring": true
        }
      }
    }
  }
}

Provider Ecosystem

OpenTofu maintains full compatibility with existing Terraform providers, ensuring access to thousands of infrastructure providers without modification.

Provider Declaration

Providers are declared in the required_providers block:

terraform {
  required_providers {
    aws = {
      source  = "hashicorp/aws"
      version = "~> 5.0"
    }
    azurerm = {
      source  = "hashicorp/azurerm"
      version = "~> 3.0"
    }
  }
}

OpenTofu Registry

The OpenTofu Registry at registry.opentofu.org mirrors and extends the Terraform provider ecosystem. All major providers including AWS, Azure, GCP, Kubernetes, and 2000+ others are available.

Community Providers

As an open-source project, OpenTofu also supports community-maintained providers and modules, expanding beyond the HashiCorp provider ecosystem.

Frequently Asked Questions

How can I install OpenTofu?

You can install OpenTofu by visiting the Installing OpenTofu page on the main OpenTofu site. Most users start with Homebrew on macOS (brew install opentofu), but packages are available for all operating systems. You can also test OpenTofu directly in Scalr, where you can select between Terraform and OpenTofu for any workspace.

What are the OpenTofu commands?

At this time, there is no difference between the Terraform and OpenTofu commands other than calling tofu rather than terraform. The primary workflow commands remain the same: tofu init (prepare working directory), tofu plan (show changes required), tofu apply (create or update infrastructure), and tofu destroy (destroy infrastructure).

Does OpenTofu need to fork the HashiCorp providers?

No. OpenTofu is compatible with all Terraform providers. There is a single provider format that both projects support. As a provider maintainer or author, you do not need to make any changes to your project, nor add additional tests. In the rare event that a provider works for Terraform but not for OpenTofu, the community addresses the issue promptly.

Can OpenTofu compatibility with Terraform be guaranteed long term?

The OpenTofu community is committed to ensuring support for all Terraform providers short, mid, and long term. The Linux Foundation provides a strong framework for long-term project success, including the Technical Steering Committee and a requirement that projects have maintainers from many organizations to provide redundancy. There are already several dozen contributors, ensuring the project moves forward steadily.

Why is it called OpenTofu?

The name was chosen to be easy to remember, short to type (just tofu in the CLI), and unique enough to be easily searchable. It was important to avoid confusion with Terraform in the market, which is why the original name "OpenTF" was changed at the advice of legal teams.

How can I contribute?

The community is encouraged to contribute by opening pull requests, reporting bugs, testing fixes, and participating in discussions in the public GitHub repository. You can also join the Slack community where core team members collaborate with the general community. The project is governed by a Technical Steering Committee that publishes meeting minutes publicly.

Alternatives to Terraform Cloud

With the shift to OpenTofu, many organizations seek alternatives for collaborative infrastructure management.

Commercial Platforms

Scalr: Offers comprehensive OpenTofu support with OPA integration, RBAC, custom hooks, and state management.

env0: Provides native OpenTofu support with advanced RBAC, secrets management, and policy enforcement. Founded by one of the original OpenTofu initiative members.

Spacelift: Delivers enterprise-grade features including multi-IaC workflows, Policy as Code, and self-service infrastructure through Blueprints.

Self-Hosted Options

For teams preferring self-hosted solutions:

  • Terrakube: An open-source alternative to Terraform Enterprise
  • Terralist: Registry for OpenTofu modules and providers
  • Atlantis: Pull request automation for infrastructure changes

Current Development Status (2026)

OpenTofu continues evolving with regular releases. Current version is OpenTofu v1.10+, which includes:

  • OCI registry support for modules and providers
  • Native S3 state locking without DynamoDB
  • Experimental OpenTelemetry tracing
  • Enhanced error messages and debugging output
  • Improved performance for large state files

The project maintains a transparent roadmap using GitHub milestones, allowing users to see and influence upcoming features.

Best Practices for OpenTofu

For a quick command reference while applying these practices, see 10 OpenTofu commands. For pipeline integration patterns, see API-driven workflows for Terraform and OpenTofu.

1. Enable State Encryption

Always encrypt sensitive state data:

terraform {
  encryption {
    key_provider "pbkdf2" "main" {
      passphrase = var.encryption_passphrase
      key_length = 32
      iterations = 600000
    }
    method "aes_gcm" "default" {
      key_provider = key_provider.pbkdf2.main
    }
    state {
      method = method.aes_gcm.default
    }
  }
}

2. Use Remote State with Locking

Store state remotely with locking enabled:

terraform {
  backend "s3" {
    bucket         = "opentofu-state"
    key            = "prod/terraform.tfstate"
    region         = "us-east-1"
    encrypt        = true
    dynamodb_table = "opentofu-locks"
  }
}

3. Implement Code Review Workflows

Use version control and CI/CD to review changes:

# In CI/CD pipeline
tofu plan -json > plan.json
# Review plan in PR before applying
tofu apply plan.json

4. Structure Modules Effectively

Organize code into reusable modules with clear interfaces:

├── modules/
│   ├── networking/
│   ├── compute/
│   └── database/
├── environments/
│   ├── dev/
│   ├── staging/
│   └── prod/
└── global/

5. Test Infrastructure Code

Use OpenTofu's native test framework:

run "setup" {
  command = apply
 
  variables {
    environment = "test"
  }
}
 
run "validate_security_groups" {
  command = plan
 
  assert {
    condition     = length(aws_security_group.main.ingress) > 0
    error_message = "Security group must have ingress rules"
  }
}

6. Use the Exclude Flag Strategically

Utilize -exclude for phased rollouts:

# Phase 1: Non-critical resources
tofu apply \
  -exclude 'aws_lambda_function.analytics' \
  -exclude 'aws_cloudwatch_log_group.verbose'
 
# Phase 2: Critical resources (after verification)
tofu apply

7. Implement Proper Variable Management

Use .tfvars files and environment separation:

# Development
tofu apply -var-file="dev.tfvars"
 
# Production
tofu apply -var-file="prod.tfvars"

8. Monitor with OpenTelemetry

Enable tracing for performance analysis:

export OTEL_SDK_DISABLED=false
export OTEL_EXPORTER_OTLP_ENDPOINT=http://localhost:4318
tofu apply

The Future of OpenTofu

The OpenTofu community has established a clear trajectory for 2026 and beyond. The acceptance into the CNCF demonstrates institutional support and commitment to long-term stability. Development priorities include:

  • Enhanced error messages and debugging output
  • Performance improvements for large state files
  • Expanded provider ecosystem integration
  • Community-contributed features through RFCs
  • Improved multi-tenancy support

Conclusion

OpenTofu has successfully established itself as a powerful, community-driven alternative to Terraform. By maintaining compatibility with the existing Terraform ecosystem while introducing innovative features like state encryption, provider iteration, and native testing, OpenTofu offers infrastructure engineers both stability and progress.

The project's commitment to true open-source principles through the Mozilla Public License ensures users can deploy OpenTofu without concerns about licensing ambiguity. Its community-driven development approach means features that actually matter to practitioners take priority over commercial interests.

Whether you're a long-time Terraform user concerned about licensing changes, an organization seeking better security features, or a new infrastructure engineer building cloud infrastructure, OpenTofu provides a compelling option that combines mature infrastructure as code capabilities with open governance and continuous innovation.

The combination of CNCF membership, Linux Foundation governance, and an active developer community positions OpenTofu as the future of open-source infrastructure automation. Start your migration today and join the growing community of engineers building infrastructure the right way.


Last Updated: February 2026 OpenTofu Current Version: v1.10+ Terraform Compatibility: Full compatibility through v1.5.x and newer versions with feature parity

About the author
Sebastian StadilCEO at Scalr
Sebastian Stadil is the CEO at Scalr. He has over 15 years of devops experience, and started his career with AWS in 2004. Sebastian was also an early advisor to Microsoft Azure and Google Cloud.

Related articles

Thumbnail of An Overview of Scalr's CI/CD Capabilities for Terraform and OpenTofu

An Overview of Scalr's CI/CD Capabilities for Terraform and OpenTofu

This post provides an overview of Scalr's CI/CD capabilities for Terraform and OpenTofu, detailing its GitOps workfl
Sebastian StadilMay 20, 2025
Thumbnail of Debugging opentofu apply Failures

Debugging opentofu apply Failures

Debugging opentofu apply Failures
Sebastian StadilMay 16, 2025
Thumbnail of OpenTofu Marks 1 Year of Growth with v1.9 Release

OpenTofu Marks 1 Year of Growth with v1.9 Release

OpenTofu v1.9 is released with some great improvements
Oleksandr LevchenkovJanuary 10, 2025
Thumbnail of Scalr VSCode Extension for Terraform & OpenTofu

Scalr VSCode Extension for Terraform & OpenTofu

Use the Scalr VSCode to do your work where you want to.
Ryan FeeSeptember 10, 2024
Thumbnail of The Terraform & OpenTofu Terralith

The Terraform & OpenTofu Terralith

How to avoid the dreaded Terralith
Ryan FeeAugust 23, 2024
Thumbnail of New Feature: Terraform & OpenTofu Ephemeral Workspaces

New Feature: Terraform & OpenTofu Ephemeral Workspaces

Create ephemeral Terraform & OpenTofu workspaces with Scalr
Ryan FeeAugust 22, 2024
Thumbnail of Understanding Terraform & OpenTofu Workspaces

Understanding Terraform & OpenTofu Workspaces

Learn about Terraform and OpenTofu workspaces
Ryan FeeJuly 21, 2024
Thumbnail of OpenTofu Language Guide

OpenTofu Language Guide

Learn about OpenTofu in part one of this guide
Brendan ThompsonMarch 5, 2024
Thumbnail of API Driven Workflows for Terraform and OpenTofu

API Driven Workflows for Terraform and OpenTofu

Learn how to take an API driven approach with examples
Ryan FeeFebruary 27, 2024
Thumbnail of OpenTofu Runs are Free in Scalr

OpenTofu Runs are Free in Scalr

Learn how to use OpenTofu for free until Jan 15th 2024.
Ryan FeeNovember 20, 2023
Thumbnail of OpenTofu Alpha release

OpenTofu Alpha release

Learn about the OpenTofu alpha release
Ryan FeeOctober 3, 2023
Thumbnail of 10 OpenTofu Commands

10 OpenTofu Commands

The 10 most useful commands for OpenTofu
Ryan FeeOctober 2, 2023
Thumbnail of Finding a Home for OpenTofu: Unpacking The Decision to Join The Linux Foundation

Finding a Home for OpenTofu: Unpacking The Decision to Join The Linux Foundation

Learn about why the Linux Foundation is the home of OpenTofu
Sebastian StadilSeptember 22, 2023
Thumbnail of OpenTofu (formerly OpenTF) has joined the Linux Foundation

OpenTofu (formerly OpenTF) has joined the Linux Foundation

OpenTofu joins the Linux Foundation
Sebastian StadilSeptember 21, 2023
Thumbnail of Get started with OpenTofu by installing from source

Get started with OpenTofu by installing from source

Get started with OpenTofu
Ryan FeeSeptember 20, 2023
Thumbnail of Announcing OpenTF

Announcing OpenTF

Scalr has helped launch the OpenTF Manifesto
Sebastian StadilAugust 15, 2023
Thumbnail of Update regarding licensing changes to Terraform

Update regarding licensing changes to Terraform

A brief update on what Scalr is doing regarding the licensing changes.
Sebastian StadilAugust 11, 2023