4,000+ servers built on vurb.ts
Vinkius
Google ADKSDK
Google ADK
Terraform Cloud (HCP) MCP Server

Bring Infrastructure As Code
to Google ADK

Learn how to connect Terraform Cloud (HCP) to Google ADK and start using 42 AI agent tools in minutes. Fully managed, enterprise secure, and ready to use without writing a single line of code.

MCP Inspector GDPR Free for Subscribers
Add Team UserAdd Team Workspace AccessApply RunApply Variable Set To WorkspaceAssociate Run Task To WorkspaceCancel RunCreate Notification ConfigurationCreate OrganizationCreate PolicyCreate Policy SetCreate ProjectCreate Registry ModuleCreate Registry ProviderCreate RunCreate Run TaskCreate State VersionCreate TeamCreate Variable SetCreate WorkspaceCreate Workspace VariableDestroy OrganizationDiscard RunExplorer QueryForce Unlock WorkspaceGet Current State VersionGet Plan JsonGet State Version OutputsList Audit EventsList OrganizationsList ProjectsList TeamsList WorkspacesLock WorkspaceRemove Team UserSafe Delete WorkspaceShow ApplyShow OrganizationShow PlanUnlock WorkspaceUpdate OrganizationUpdate TeamUpload Policy Code

Compatible with every major AI agent and IDE

ClaudeClaude
ChatGPTChatGPT
CursorCursor
GeminiGemini
WindsurfWindsurf
VS CodeVS Code
JetBrainsJetBrains
VercelVercel
+ other MCP clients
Terraform Cloud (HCP)

What is the Terraform Cloud (HCP) MCP Server?

Connect your Terraform Cloud (HCP) account to any AI agent to orchestrate your Infrastructure as Code (IaC) workflows through natural language. This server provides comprehensive access to the HCP Terraform API, allowing for seamless management of the entire infrastructure lifecycle.

What you can do

  • Organization & Project Management — List, create, and inspect organizations and projects to maintain high-level governance.
  • Workspace Operations — Query workspaces, manage locks, and configure VCS integrations for automated deployments.
  • Run & Plan Lifecycle — Trigger new runs, apply or discard plans, and monitor the progress of infrastructure changes in real-time.
  • State & Outputs — Retrieve current state versions and extract specific output values to use in downstream automation or analysis.
  • Governance & Security — Manage teams, access controls, variable sets, and Sentinel/OPA policies directly via the agent.

How it works

  1. Subscribe to this server
  2. Enter your Terraform Cloud User or Team API Token
  3. Start managing your cloud environments from Claude, Cursor, or any MCP-compatible client

Who is this for?

  • DevOps & Platform Engineers — automate routine workspace management and run monitoring without leaving the terminal or chat.
  • Cloud Architects — quickly inspect state outputs and policy compliance across multiple organizations.
  • SRE Teams — troubleshoot failed runs and manage workspace locks during incident response.

Built-in capabilities (42)

add_team_user

Add a user to a team

add_team_workspace_access

Grant a team access to a workspace

apply_run

Apply a planned run

apply_variable_set_to_workspace

Apply a variable set to a workspace

associate_run_task_to_workspace

Associate a run task with a workspace

cancel_run

Cancel a run

create_notification_configuration

Create a notification configuration for a workspace

create_organization

Create a new organization

create_policy

Create a policy

create_policy_set

Create a policy set

create_project

Create a new project

create_registry_module

Create a private registry module (No VCS)

create_registry_provider

Create a private registry provider

create_run

Create a new run (plan/apply)

create_run_task

Create a run task

create_state_version

Create a new state version

create_team

Create a new team

create_variable_set

Create a variable set

create_workspace

Create a new workspace

create_workspace_variable

Create a variable in a workspace

destroy_organization

Destroy an organization

discard_run

Discard a run

explorer_query

Execute an explorer query across workspaces

force_unlock_workspace

Force unlock a workspace

get_current_state_version

Get current state version for a workspace

get_plan_json

Get JSON execution plan output

get_state_version_outputs

Get outputs for a state version

list_audit_events

List organization audit events

list_organizations

List HCP Terraform organizations

list_projects

List projects in an organization

list_teams

List teams in an organization

list_workspaces

List workspaces in an organization

lock_workspace

Lock a workspace

remove_team_user

Remove a user from a team

safe_delete_workspace

Safe delete a workspace

show_apply

Show details of an apply

show_organization

Show details of a specific organization

show_plan

Show details of a plan

unlock_workspace

Unlock a workspace

update_organization

Update an existing organization

update_team

Update a team

upload_policy_code

Upload code for a policy

Why Google ADK?

Google ADK natively supports Terraform Cloud (HCP) as an MCP tool provider. declare Vinkius Edge URL and the framework handles discovery, validation, and execution automatically. Combine 42 tools with Gemini's long-context reasoning for complex multi-tool workflows, with production-ready session management and evaluation built in.

  • Google ADK natively supports MCP tool servers. declare a tool provider and the framework handles discovery, validation, and execution

  • Built on Gemini models, ADK provides long-context reasoning ideal for complex multi-tool workflows with Terraform Cloud (HCP)

  • Production-ready features like session management, evaluation, and deployment come built-in. not bolted on

  • Seamless integration with Google Cloud services means you can combine Terraform Cloud (HCP) tools with BigQuery, Vertex AI, and Cloud Functions

G
See it in action

Terraform Cloud (HCP) in Google ADK

AI AgentVinkius
High Security·Kill Switch·Plug and Play
Why Vinkius

Terraform Cloud (HCP) and 4,000+ other MCP servers. One platform. One governance layer.

Teams that connect Terraform Cloud (HCP) to Google ADK through Vinkius don't need to source, host, or maintain individual MCP servers. Every tool call runs inside a hardened runtime with credential isolation, DLP, and a signed audit chain.

4,000+MCP Servers ready
<40msCold start
60%Token savings
Raw MCP
Vinkius
Server catalogFind and host yourself4,000+ managed
InfrastructureSelf-hostedSandboxed V8 isolates
Credential handlingPlaintext in configVault + runtime injection
Data loss preventionNoneConfigurable DLP policies
Kill switchNoneGlobal instant shutdown
Financial circuit breakersNonePer-server limits + alerts
Audit trailNoneEd25519 signed logs
SIEM log streamingNoneSplunk, Datadog, Webhook
HoneytokensNoneCanary alerts on leak
Custom domainsNot applicableDNS challenge verified
GDPR complianceManual effortAutomated purge + export
Enterprise Security

Why teams choose Vinkius for Terraform Cloud (HCP) in Google ADK

The Terraform Cloud (HCP) MCP Server runs on Vinkius-managed infrastructure inside AWS — a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts. All 42 tools execute in hardened sandboxes optimized for native MCP execution.

Your AI agents in Google ADK only access the data you authorize, with DLP that blocks sensitive information from ever reaching the model, kill switch for instant shutdown, and up to 60% token savings. Enterprise-grade infrastructure, zero maintenance.

Terraform Cloud (HCP)
Fully ManagedVinkius Servers
60%Token savings
High SecurityEnterprise-grade
IAMAccess control
EU AI ActCompliant
DLPData protection
V8 IsolateSandboxed
Ed25519Audit chain
<40msKill switch
Stream every event to Splunk, Datadog, or your own webhook in real-time

* Every MCP server runs on Vinkius-managed infrastructure inside AWS - a purpose-built runtime with per-request V8 isolates, Ed25519 signed audit chains, and sub-40ms cold starts optimized for native MCP execution. See our infrastructure

The Vinkius Advantage

How Vinkius secures Terraform Cloud (HCP) for Google ADK

Every tool call from Google ADK to the Terraform Cloud (HCP) MCP Server is protected by DLP redaction, cryptographic audit chains, V8 sandbox isolation, kill switch, and financial circuit breakers.

< 40msCold start
Ed25519Signed audit chain
60%Token savings
FAQ

Frequently asked questions

01

Can I trigger a new infrastructure deployment (run) using this server?

Yes. You can use the create_run tool by providing the Workspace ID. You can also subsequently use apply_run or discard_run to manage the lifecycle of that specific execution.

02

How do I see the output variables from my last successful Terraform apply?

Use the get_state_version_outputs tool with the Workspace ID. It will retrieve all calculated outputs from the current state, such as IP addresses, DNS names, or resource IDs.

03

Is it possible to list all workspaces across my organization?

Absolutely. Use the list_workspaces tool and provide your organization name. You can also filter the results by name or tags using optional parameters.

04

How does Google ADK connect to MCP servers?

Import the MCP toolset class and pass the server URL. ADK discovers and registers all tools automatically, making them available to your agent's tool-use loop.

05

Can ADK agents use multiple MCP servers?

Yes. Declare multiple MCP tool providers in your agent configuration. ADK merges all tool schemas and the agent can call tools from any server in a single turn.

06

Which Gemini models work best with MCP tools?

Gemini 2.0 Flash and Pro models both support function calling required for MCP tools. Flash is recommended for latency-sensitive use cases, Pro for complex reasoning.

07

McpToolset not found

Update: pip install --upgrade google-adk

Explore More MCP Servers

View all →