Picture a production incident at 2 a.m. Logs are flying by, someone needs to roll back a release, and approvals drag because no one wants to blow a hole in access controls. That’s where Clutch Compass enters the story: it keeps access safe, short-lived, and fully traceable without killing your team’s momentum.
Clutch and Compass are open-source tools built to tame operational chaos. Clutch, born at Lyft, acts as a self-service operations platform that automates runbooks, operational tasks, and on-call workflows. Compass, from the same engineering DNA, is a developer portal that organizes services, owners, and metadata in one place. Together, Clutch Compass ties infrastructure actions to their real-world context. Think of it as both a control panel and a map for your production universe.
When wired correctly, Clutch handles the “how” of automation while Compass handles the “who” and “what.” A developer logs in using SSO, searches Compass to find the service they own, and launches a Clutch workflow to restart pods, rotate credentials, or rerun a job. Every click maps back to identity and purpose. The integration depends on standard protocols like OIDC and can plug into Okta or AWS IAM for consistent authentication and authorization.
Set up access so that Compass becomes your inventory of truth. Each resource reference links to a Clutch workflow definition. When a user triggers it, Clutch checks RBAC policies and writes an immutable audit event. You get reproducibility and compliance without manual tickets. The system enforces least privilege by default.
A few practical tips help teams avoid rookie friction:
- Keep RBAC roles narrow to service ownership rather than titles.
- Rotate API tokens every 90 days even for internal calls.
- Run audit exports weekly so SOC 2 evidence never becomes a fire drill.
- Treat metadata accuracy in Compass as part of your build pipeline.
Results unfold quickly: