One binary, every operator workflow. Pick your package manager — they all install the same release artifact, verified end-to-end.
Same binary, same signature, same release tag.
Tap our formula and install. Updates flow through brew upgrade like every other tool you have.
brew install veirox-cloud/veirox/veirox
veirox version veirox doctor
Expect veirox version v0.5.x and a green checklist for keychain, network, and config.
veirox login
Opens a browser tab to /console/cli-grant?user_code=…. Approve the device. The CLI stores the resulting ops_k_… key in your OS keyring (macOS Keychain · Linux libsecret).
Lightweight, portable installs. Updates via scoop update veirox.
scoop bucket add veirox https://github.com/msrashed2018/scoop-veirox scoop install veirox
Tested on PowerShell 7+ and Windows Terminal. The CLI uses Windows Credential Manager for keyring.
For containers, CI runners, dotfiles bootstraps — anywhere a package manager is overkill.
curl -fsSL https://veirox.com/cli/install.sh | sh
The installer auto-detects $(uname -m), downloads the right binary into ~/.local/bin (or /usr/local/bin with sudo), verifies SHA-256 + cosign signature, and prints the version on success.
CI tip: pin the version explicitly so a new release can't break a deterministic pipeline:
curl -fsSL https://veirox.com/cli/install.sh | sh -s -- --version v0.5.0
Pre-baked image for CI containers. Distroless base — no shell, no apt, no surprises.
docker run --rm -it \
-v "$HOME/.config/veirox:/home/nonroot/.config/veirox" \
ghcr.io/veirox-cloud/veirox-cli:latest \
whoami
Mount $HOME/.config/veirox so your profile + keyring entries survive between runs. Tags: latest, v0.5, v0.5.0, nightly.
After install, three commands take you from a fresh shell to a fully wired project with MCP tooling in your editor.
veirox login
Opens browser, mints an org-scoped ops_k_… key into your OS keyring.
veirox init
Detects git remotes, kubectl context, AWS profile. Creates a project. Seeds runbooks.
veirox mcp setup
Wires Cursor, Claude Code, Codex via deeplinks & native CLIs. No JSON to edit.
# Tail the latest agent session as it runs veirox tail # Trigger a task from CI with a deterministic key veirox task run prod-rollback-check --idempotency-key "$BUILD_ID" --wait # Stream events as ndjson into your log pipeline veirox logs --follow --plain | jq -r 'select(.type=="tool") | .text' # Approve a pending action from the terminal veirox approval approve <uuid> --comment "lgtm"
Every command emits pretty output by default and JSON / ndjson on -o json, so the same surface drives both humans and CI.
Identity
Project resources
Automation
Live
Integrations
Admin
veirox doctor diagnoses the most common issues. If something else trips you up, open an issue or ask the agent.