Catch bad AWS spending before it ships.
CloudBurn runs deterministic cost rules against Terraform and CloudFormation in CI, then runs those same rules against live AWS with discover. Install the open-source CLI with brew or npm and give your team cost visibility on AWS.
- Terraform + CloudFormation
- CI + discovery
- Open-source CLI
inspect coverage fast
See which AWS services CloudBurn covers and which checks work in CI, discovery, or both before you spend time wiring it into your workflow.
ship with more confidence
The rules are readable and explicit, which makes findings easier to trust and makes cost checks easier to roll out across engineering teams.
start small, expand later
Start with the open-source CLI in one repo, prove the signal in CI, then add discovery or expand to more repos once the first team sees value.
One rules engine, two modes
Run the same cost rules before deploy and after deploy.
That is the core idea. CloudBurn is not two different products duct-taped together. The rule model stays consistent whether you are checking IaC in CI or inspecting a live AWS account.
scan
Catch waste in pull requests, CI jobs, and release pipelines.
Point CloudBurn at Terraform or CloudFormation and fail fast when a change introduces spending patterns your team should look at before merge.
discover
Inspect what is already deployed and still costing you money.
Run discover against one region or all of them after you initialize AWS Resource Explorer. Same rule language. Different target.
How it works
Treat cost review like a normal part of the delivery pipeline.
This is where CloudBurn gets practical. The commands are simple. The value comes from putting them in the right places and making the output visible to the team that can act on it.
01
Install it in minutes
Start with the GitHub repo, then install with Homebrew, npm, or npx if you want a fast first run.
02
Scan infrastructure before merge
Run scan against Terraform or CloudFormation in pull requests, CI jobs, or release pipelines.
03
Discover what is already burning money
Point discover at a live AWS account and run the same rules against the resources you already deployed.
04
Review output humans and machines can use
Table output works in a terminal. JSON output works when you want to automate, report, or feed another tool.
Why teams roll it out
FinOps got trapped in dashboards. CloudBurn puts cost policy back in the workflow where engineers can act on it.
Most cost tooling shows you a problem after the money is already gone, then charges a premium to help you stare at it. CloudBurn is different. The rule engine is deterministic, shaped by years of AWS cost optimization work, and built to catch bad spending patterns before Terraform or CloudFormation reaches production. The same checks also run against live AWS so you can find what is already burning and fix it with a clean, usable overview.
Deterministic instead of hand-wavy
Every rule encodes a known bad AWS spending practice. That means teams get explicit checks they can review, trust, and tune instead of vague scoring models or another black-box dashboard.
Block waste before deploy
CloudBurn validates Terraform and CloudFormation before the change ships. That is the real wedge. It is cheaper to stop bad infrastructure in CI than to explain it in a cost review meeting two weeks later.
Use the same engine on live AWS
The value does not end at IaC. Run the same rule engine against your deployed environment with discovery and get focused optimization insights without buying into a bloated FinOps platform.
Questions
before you install
How is CloudBurn different from a typical FinOps dashboard?
What can CloudBurn validate before deploy?
Can it also check my live AWS environment?
How do I get started?
What kind of output does CloudBurn produce?
Is CloudBurn open source?
Get started
Stop paying for AWS mistakes after the fact.
Start with the open-source CLI. Run scan before deploy. Run discover against live AWS. Use one deterministic rule engine instead of another expensive dashboard.