MODEL INFRASTRUCTURE AND APPLICATIONS
Model complex infrastructure environments using drag and drop modules to combine physical and virtual infrastructure, network connectivity, applications, and cloud interfaces.
Deliver full-stack infrastructure environments in a way that’s repeatable, reliable, and scalable
Model complex infrastructure environments using drag and drop modules to combine physical and virtual infrastructure, network connectivity, applications, and cloud interfaces.
Use out of the box automated set-up and tear-down capabilities as well as extensible Python libraries to create powerful orchestration workflows and save and restore environment resources with ease.
Publish environment blueprints to a shared self-service catalog and provide your teams with on-demand, self-service access to the standardized infrastructure environments they need.
Take control with fine-grained, role-based access, and policy enforcement and support thousands of users with SSO and smart multi-tenancy while controlling costs and security.
Access hundreds of battle-tested Shells and plug-ins to provide a network environment complete with the technologies you already use in your ecosystem.
Check out the answers to some of our commonly asked questions. Have a question of your own? Contact us!
CloudShell allows customizing and extending the out-of-box automation to support specific business processes and automate manual tasks. For more information see the CloudShell Dev Guide.
A Shell provides CloudShell users a standard approach to interact with and automate different environment elements, like physical devices and virtual applications. Shells are open source and based on python. In the CloudShell community, you can find certified, out-of-box Shells for common technologies, and it is also possible to independently create Shells based on existing standards using the Developer guide.
Shells offer a standard approach that can combine multiple technologies and be shared through our developer community.
CloudShell supports configurable RBAC and IAM using Active Directory, LDAP and Single Sign-on.