The Neptune Model
1
You ask your AI assistant to deploy
Just say “Deploy this app to Neptune” - your AI assistant handles the rest.
2
Neptune generates your configuration
Your AI creates an optimized Dockerfile (if needed) and a
neptune.json configuration based on your project.3
Resources are provisioned
Storage buckets and secrets are created automatically in the cloud.
4
Your app is deployed
Neptune builds your container image, pushes it to a private registry, and deploys it.
5
You get a public IP
Your app is live and connected to all your resources.
The MCP Connection
Neptune uses the Model Context Protocol (MCP) to connect with your AI coding assistant. MCP is an open standard created by Anthropic that lets AI tools interact with external services. When you install the Neptune MCP, your AI assistant gains access to tools that can:- Authenticate you with Neptune via GitHub OAuth
- Generate Dockerfiles optimized for your project
- Create
neptune.jsonconfigurations automatically - Provision cloud resources (storage buckets, secrets)
- Build and deploy your application
- Monitor deployment status and retrieve logs
Configuration
Neptune uses aneptune.json file to define your project. Your AI assistant creates and manages this automatically:
neptune.json
neptune.json
How Resources Work
When Neptune provisions resources, it creates them with unique physical names for global uniqueness. Your AI assistant receives these names and can use them when writing code for you.| Resource | What Neptune Creates | How You Access It |
|---|---|---|
| StorageBucket | S3 bucket (e.g., neptune-abc123-uploads) | boto3.client("s3") with the physical bucket name |
| Secret | AWS Secrets Manager secret (e.g., neptune-abc123-API_KEY) | boto3.client("secretsmanager") with the physical secret name |
boto3 without any credential setup.
Security
- Authentication: GitHub OAuth - no separate Neptune account needed
- Secrets: Encrypted at rest in AWS Secrets Manager
- Network: All traffic is encrypted with TLS
- Isolation: Each project runs in its own isolated environment
- IAM: Services only have access to their own resources