Quick Start
This guide walks through common Clanker workflows with practical examples. Before proceeding, make sure you have installed Clanker and created a configuration file.
Basic AWS Query
The most common usage pattern is asking a natural language question about your AWS infrastructure:
clanker ask "list my ec2 instances" --awsClanker will determine which AWS API calls are needed, execute them using your configured AWS profile, and return a readable summary of the results.
If your question clearly refers to AWS (for example, it mentions EC2, Lambda, or S3), you can omit the --aws flag entirely and let Clanker infer the provider:
clanker ask "what lambda functions have the most errors?"Using a Specific AWS Profile
Override the default AWS profile with the --profile flag:
clanker ask "show lambda errors in the last 24 hours" --aws --profile productionThis is useful when you work with multiple AWS accounts (development, staging, production) and want to query a specific one.
Multi-Cloud Queries
You can include context from multiple providers in a single query:
clanker ask "show my infrastructure" --aws --gcpThis gathers data from both AWS and GCP and presents a combined view.
For Azure:
clanker ask "list my virtual machines" --azureFor Cloudflare:
clanker ask "show my DNS zones" --cloudflareFor DigitalOcean:
clanker ask "list my droplets" --digitaloceanFor Hetzner:
clanker ask "show my cloud servers" --hetznerFor Verda (GPU/AI):
clanker ask "what GPU instances are running?" --verda
clanker ask "how much am I spending on Verda this month?" --verdaGitHub Context
Query your GitHub repositories for pull requests, issues, workflow runs, and more:
clanker ask "show recent pull requests" --githubclanker ask "what GitHub Actions workflows failed this week?" --githubMake sure your ~/.clanker.yaml has a valid GitHub token configured if you are querying private repositories.
MCP Quick Start
If you want to use Clanker from an MCP-compatible client, start the local MCP server:
clanker mcp --transport http --listen 127.0.0.1:39393Then initialize the session and inspect the available tools:
curl -sS -X POST http://127.0.0.1:39393/mcp \
-H 'Content-Type: application/json' \
-H 'Accept: application/json, text/event-stream' \
--data '{"jsonrpc":"2.0","id":1,"method":"initialize","params":{"protocolVersion":"2025-03-26","capabilities":{},"clientInfo":{"name":"local-cli","version":"1.0"}}}'curl -sS -X POST http://127.0.0.1:39393/mcp \
-H 'Content-Type: application/json' \
-H 'Accept: application/json, text/event-stream' \
--data '{"jsonrpc":"2.0","id":2,"method":"tools/list","params":{}}'You can also use MCP to ask Clanker how it would route a question before executing anything:
curl -sS -X POST http://127.0.0.1:39393/mcp \
-H 'Content-Type: application/json' \
-H 'Accept: application/json, text/event-stream' \
--data '{"jsonrpc":"2.0","id":3,"method":"tools/call","params":{"name":"clanker_route_question","arguments":{"question":"use clanker cloud mcp to show my saved settings"}}}'For the full command reference, see mcp.
Terraform Queries
Inspect your Terraform state and workspaces:
clanker ask "what resources are in my terraform state?" --terraformclanker ask "show me the terraform plan" --terraform --workspace stagingClanker can also execute Terraform commands directly when the query clearly requests it (for example, "run terraform init" or "run terraform plan").
Kubernetes Management
Clanker provides a dedicated k8s subcommand for Kubernetes operations.
Querying Clusters with Natural Language
clanker k8s ask "show pod status in all namespaces"clanker k8s ask "which pods are using the most memory?"clanker k8s ask "why is my pod crashing?" --cluster my-cluster --profile myawsThe k8s ask command uses the same three-stage pipeline as clanker ask, but specialized for Kubernetes: it translates your question into kubectl operations, executes them, and synthesizes a response. Conversation history is maintained per cluster for follow-up questions.
Creating Clusters
Create an EKS cluster:
clanker k8s create eks my-cluster --nodes 2 --node-type t3.smallCreate a GKE cluster:
clanker k8s create gke my-cluster --gcp-project my-project --nodes 2 --node-type e2-standard-2Create a kubeadm cluster on EC2:
clanker k8s create kubeadm my-cluster --workers 2 --node-type t3.smallAdd --plan to any create command to preview the execution plan without applying it.
Deploying Applications
clanker k8s deploy nginx --name my-nginx --port 80 --replicas 3Viewing Logs and Metrics
clanker k8s logs my-pod --tail 100 --since 1hclanker k8s stats nodesclanker k8s stats pods --all-namespaces --sort-by memoryclanker k8s stats clusterCost Analysis
View and analyze cloud infrastructure costs across all configured providers:
clanker cost summaryFilter by provider:
clanker cost summary --provider awsView service-level cost breakdowns:
clanker cost detail --provider awsSee daily cost trends over a specific period:
clanker cost trend --start 2025-01-01 --end 2025-01-31Get a cost forecast:
clanker cost forecastDetect cost anomalies:
clanker cost anomaliesView costs grouped by tags:
clanker cost tags --key EnvironmentExport cost data to a file:
clanker cost export --output costs.csv --provider awsInfrastructure Deployment
Deploy a GitHub repository to the cloud with a single command:
clanker deploy https://github.com/user/repoThis clones the repository, analyzes the codebase, determines the best deployment strategy, and generates a JSON execution plan. To apply the plan immediately:
clanker deploy https://github.com/user/repo --applyTargeting Specific Providers and Deployment Methods
Deploy to AWS EC2:
clanker deploy https://github.com/user/repo --provider aws --target ec2Deploy to AWS Fargate (the default for AWS):
clanker deploy https://github.com/user/repo --provider aws --target fargateDeploy to GCP:
clanker deploy https://github.com/user/repo --provider gcp --gcp-project my-project --applyDeploy to Azure:
clanker deploy https://github.com/user/repo --provider azure --azure-subscription my-sub-id --applyDeploy to Cloudflare:
clanker deploy https://github.com/user/repo --provider cloudflare --applyDeploy to DigitalOcean:
clanker deploy https://github.com/user/repo --provider digitalocean --do-token your-token --applyDeploy to Hetzner:
clanker deploy https://github.com/user/repo --provider hetzner --hetzner-token your-token --applyInfrastructure Modification with Maker
Generate an infrastructure change plan without applying it:
clanker ask "create an s3 bucket called my-data-bucket with versioning enabled" --makerThis outputs a JSON plan to stdout. To apply a previously generated plan:
clanker ask --apply --plan-file my-plan.jsonOr pipe directly:
clanker ask "create an RDS postgres instance" --maker | clanker ask --applyUse --destroyer to allow destructive operations (delete, terminate) in maker plans:
clanker ask "delete the test-vpc and all associated resources" --maker --destroyerMaker plans work across providers:
clanker ask "create a cloudflare worker" --maker --cloudflareclanker ask "create a digitalocean droplet" --maker --digitaloceanclanker ask "spin up one H100 in FIN-01 with my default ssh key" --maker --verdaInteractive Mode
Start a multi-turn conversation session:
clanker talkThis launches the Hermes agent in interactive mode. The session maintains context across messages, so you can ask follow-up questions naturally:
you> show me my ec2 instances
hermes> [response with instance list]
you> which one has the highest CPU usage?
hermes> [response referencing the previous list]
you> exit
Goodbye.Choosing an AI Provider
Override the default AI provider for a single command:
clanker ask "list my s3 buckets" --aws --ai-profile anthropicOverride the model within a provider:
clanker ask "show ec2 instances" --aws --openai-model gpt-5IAM Security Analysis
Analyze IAM roles, policies, and permissions:
clanker ask "analyze my IAM roles for overpermissive access" --iamScope analysis to a specific role or policy:
clanker ask "what permissions does this role have?" --iam --role-arn arn:aws:iam::123456789012:role/my-roleCompliance Reporting
Generate comprehensive compliance documentation:
clanker ask "generate compliance report" --complianceInfrastructure Discovery
Run a comprehensive scan of all active AWS services:
clanker ask "what is running in my infrastructure?" --discoveryDiscovery mode automatically enables both AWS and Terraform contexts and scans all available services for active resources.
Debug Mode
Add --debug to any command to see diagnostic output, including which operations are being executed and how the AI is processing your question:
clanker ask "show my lambda functions" --aws --debugFor detailed agent lifecycle logs during complex investigations:
clanker ask "why are my lambda functions timing out?" --aws --agent-trace