Plan Summary · Resource Analysis · Cost Impact · Security Review

Terraform Plan Summarizer

Paste your terraform plan output and get an instant AI summary: what changes, what risks exist, and what it costs. Free, browser-only, BYO Anthropic API key.

Stored in your browser only. Never sent to our servers. Get a free key

Summary

How to summarize a terraform plan in 3 steps

1
Run terraform plan

Use terraform plan -no-color to strip color codes. Copy the full output from your terminal.

2
Choose a mode

Plain Summary for a quick overview, Resource Analysis for a full inventory, Cost Impact for billing estimates, Security Review for risk flags.

3
Share the summary

Copy to a Slack message, PR comment, Confluence page, or Jira ticket. Share a permalink so teammates can see the same output.

When teams use an AI terraform plan summarizer

PR reviews

Paste the plan into your PR comment so reviewers see what changes at a glance — no local apply needed.

Change advisory boards

Present plain-English infrastructure changes to non-Terraform stakeholders without walking them through HCL.

Incident prep

Before a risky apply, generate a Security Review to catch open ingress rules or destroyed persistent resources.

FinOps sign-off

Generate Cost Impact Notes and attach them to Jira tickets for finance team approval before provisioning.

Terraform Plan Summarizer — FAQ

How do I get clean terraform plan output?

Run terraform plan -no-color to strip ANSI escape codes before pasting. If you're in a CI pipeline, set TF_CLI_ARGS=-no-color in your environment variables. For JSON output, run terraform show -json plan.tfplan after saving the plan file — the AI can read either format.

What's the difference between the four modes?

Plan Summary gives a plain-English paragraph overview suitable for a PR comment or Slack message. Resource Change Analysis lists every resource with add/change/destroy labels and explains what changes within each. Cost Impact Notes estimates billing implications of instance type changes, scaling, or new services. Security Review flags risky changes: open ingress rules, IAM permission grants, public S3 buckets, and destructive operations on persistent resources.

Will the AI catch that a resource will be destroyed and recreated?

Yes. Terraform marks forced replacements with -/+ (destroy then create). The AI specifically looks for these and flags them — particularly dangerous for stateful resources like RDS instances, ElastiCache clusters, or Kubernetes PersistentVolumeClaims, where recreation means data loss unless you have a snapshot strategy.

Can I paste a terraform plan from GitHub Actions or Atlantis?

Yes. Copy the plan output from the CI log — Atlantis, GitHub Actions, Spacelift, and Terraform Cloud all output standard terraform plan format. Strip any surrounding workflow log lines and paste just the plan section. The AI handles partial or truncated plans too, though a complete plan gives better results.

Does this work with OpenTofu plans?

Yes. OpenTofu (the Terraform fork) produces identical plan output format. Paste it the same way — the AI doesn't distinguish between them.

Is this safe to use with production infrastructure plans?

The plan output goes directly from your browser to Anthropic's API using your own key. Nothing is stored on our servers — there is no backend. That said, terraform plan output contains your resource names, ARNs, and configuration values. If your organization has strict data classification policies, check whether sending plan output to an LLM is compliant, or use a redacted plan.

How much does it cost per summary?

A typical plan (10-30 resources) costs roughly $0.002–$0.008 with Claude Haiku, or $0.01–$0.03 with Claude Sonnet. You pay Anthropic directly — no subscription, no markup from us.