Getting Started
Getting started with DeployClear is designed to be frictionless. Once you have created an account, you will instantly be guided through setting up your first Organization and Team.
1. Create Your First Team
DeployClear uses a hierarchical structure to manage resources securely:
- Organization: The top-level billing and integration boundary.
- Team: The isolated workspace where your Blocks, Secrets, and Deployments actually live.
When you log in for the first time, you will see the Onboarding Page. Simply enter a name for your first team (e.g., Platform Engineering or Production). This creates an isolated state for your resources.
2. Navigating the Dashboard
Once your team is created, you will arrive at the Overview page. The sidebar to your left is your primary navigation construct:
- Menu: Contains all operational routes (Blocks, Requests, Jobs, etc.).
- Organization: Contains global settings across all your teams (Access, Integrations, Billing).
- Settings & Sign Out: Located at the bottom of the sidebar for account-level preferences.
3. Defining a Block
All Terraform in DeployClear originates from a Block. A Block is simply your standard .tf configuration files, bundled together with a manifest.yaml that defines what variables the block expects.
- Navigate to Blocks using the left sidebar.
- Click New Block.
- You can either write Terraform code directly into the editor for an Internal Block, or configure a connection to a GitHub Repository.
4. Setting up State
Before you can deploy anything, DeployClear needs to know where to store your Terraform state files.
- Navigate to Administration > Terraform State.
- DeployClear supports the standard HTTP backend. Enter your state server URL, Lock URL, Unlock URL, and any required authentication credentials.
State Backend Recommendations
Most teams utilize AWS S3 with DynamoDB or Postgres for their HTTP State backends. DeployClear is entirely agnostic to the HTTP state provider you choose.
5. Adding Secrets
In order to authenticate with your cloud provider (AWS, GCP, Cloudflare, etc.), you'll need to securely inject credentials into the runner environment.
- Navigate to Secrets.
- Click Add Secret.
- Example: Add
AWS_ACCESS_KEY_IDandAWS_SECRET_ACCESS_KEYto allow the runner to authenticate with AWS.
All secrets are encrypted at rest using AES-256 and are only decrypted statelessly inside the ephemeral runner container at execution time.
6. Requesting a Deployment
With your Block, State, and Secrets configured, you are ready to deploy.
- Navigate to a Block and click Deploy.
- A new Request is generated. The DeployClear runner will automatically spin up and run a
terraform plan. - Once the plan succeeds, it enters the Pending Approval state.
- A DevOps or Admin user can review the exact plan output and click Approve to execute the apply, or Reject to stop the deployment.