Veirox

Integrations

Five ways to wire Veirox
into your stack.

Meet your team where they already work. Reach the systems they already run. Every integration surface ships with signature verification, tenant isolation, end-to-end audit, and fine-grained approval gates.

Jump to: Chat Webhooks Tool integrations Veirox Connect Custom tool servers

01 · Chat channels

Talk to the agent where your team already lives.

One agent, one memory, every channel. Streaming replies with the agent's reasoning visible, inline approvals on risky actions, and voice on mobile for on-call engineers away from their keyboard.

  • Slack — native AI Assistant API, Block Kit UI, thread support, inline approval buttons, streaming responses. Connected via OAuth in 30 seconds.
  • Telegram — inline keyboards, topic threads, voice notes, group chats. Perfect for on-call rotations.
  • WhatsApp — QR-code device pairing, group + direct messages. No business API provisioning required.
  • Web chat — full-screen console with streaming, artifact pane (code, markdown, diffs), permission cards, session history.
  • Voice-to-text — speak commands in 12+ languages from any mobile channel.
Connect your chat channels →

Same agent, every surface

S

#incidents · Slack

"payment-api p99 spiked. Investigating…"

Live
T

@oncall-bot · Telegram

Voice note → transcribed → answered in 2.1s

Voice
W

SRE Team · WhatsApp

Inline approval → rollback dispatched

Approval
C

veirox.yourdomain.com · Web

Full artifact pane + session history

Console

02 · Webhooks

Receive any alert. Act in seconds.

Nine first-class providers with signed deliveries, replay protection, and generic HMAC-SHA256 for everything else. Route, redact, dedupe, rate-limit, and gate on approvals — all per-webhook.

  • Monitoring: AlertManager, Grafana, Datadog, Sentry, PagerDuty
  • Developer: GitHub (X-Hub-Signature-256), GitLab, Bitbucket
  • Revenue: Stripe with timestamp-window replay protection
  • Any HTTP source: Generic HMAC-SHA256 + shared token
  • Routing rules with priority, fan-out, approval gating
  • Sliding-window rate limit, field redaction, retention bounds
  • Test Console + Signature Playground — debug 401s in one click
  • Embeddable SVG status badge for runbook READMEs

Pipeline — what happens after the POST

Provider POST Signature verify PII redact Correlate Route Agent runs
# AlertManager receiver — three lines to production
receivers:
  - name: veirox
    webhook_configs:
      - url: https://veirox.com/api/webhooks/<task_id>
        http_config:
          authorization: { type: Bearer, credentials: <your-token> }

03 · Tool integrations

40+ tools. OAuth in seconds. Encrypted credentials.

One click to connect. The agent reads, writes, and acts through official APIs — with your team's permissions, your team's scopes, and your full audit trail.

Productivity

Google Workspace

Full CRUD on Gmail, Calendar, and Drive. Agent reads emails, drafts replies, creates events, uploads artifacts.

Gmail Calendar Drive

Productivity

Microsoft 365

Outlook, Teams, OneDrive, OneNote, SharePoint, Planner, and Microsoft To Do — one OAuth, full Graph API access.

Outlook Teams SharePoint +4 more

Ticketing & docs

Jira & Confluence

JQL search, issue CRUD, status transitions, comments, linked dependencies. Confluence pages, spaces, attachments.

Jira JQL Confluence

Source control

Git — any provider

HTTPS token or SSH key. Encrypted at rest. Shallow clones, branch selection, auto-clone into per-project workspace.

GitHub GitLab Bitbucket Self-hosted

Observability

Alerts, metrics & traces

Prometheus/AlertManager, Grafana, Datadog, Sentry, PagerDuty — every major tool with webhook support fires an Veirox task.

Prometheus Grafana Datadog Sentry

Cloud & Kubernetes

AWS, GCP, Azure — any cluster

Official CLIs + APIs, credentials in the vault. EKS, GKE, AKS, or on-prem via Veirox Connect for private clusters.

AWS GCP Azure Kubernetes

Notifications

Five output channels

Slack, Email (SMTP or SendGrid), Telegram, WhatsApp, Pushover — severity thresholds per channel.

Slack Email Pushover

Payments & revops

Stripe with replay protection

Timestamp-window verification on Stripe-Signature. Event correlation for subscriptions, disputes, failed payments.

Stripe

Secrets

Built-in vault

Agent references secrets by friendly name. Raw values never touch model context, UI, or logs. Every access audited.

AES-256 Per-project keys

Every integration is project-scoped and inherits your audit, approval, redaction, and rate-limit policies.

04 · Veirox Connect

Reach private infrastructure without opening a single port.

Private Kubernetes, on-prem databases, air-gapped networks — Veirox reaches them through a lightweight agent you install on any Linux host inside your perimeter. The agent opens an outbound WebSocket; your firewall never sees an inbound rule.

  • Outbound-only tunnel — no firewall holes, no VPN provisioning, no IP allowlists
  • Three-layer tenant verification — agent, broker, and executor each verify project ownership independently
  • Denylist + policy engine — destructive commands blocked at the connector before leaving your perimeter
  • End-to-end audit — every tunneled command logged with project, user, timestamp, and exit status
  • One-line installer — Debian, RPM, Helm chart, or Nomad job

Tunneled command lifecycle

1Agent reasons → wants to run kubectl get pods -n prod
2Policy check: allowed for project · user approved
3Broker routes to your connector's WebSocket
4Connector verifies project + denylist locally
5Exec in your VPC — streamed back live
6Audit row written: project, user, cmd, exit code
curl -fsSL https://veirox.com/install.sh | sh
veirox-connector enroll --code ABC123
# → Connector online · tunneling for project <id>

05 · Custom tool servers

Give the agent your proprietary tools.

Every stack has in-house systems: a bespoke runbook engine, an internal cost API, a vendor CLI, a home-grown deployment tool. Register them as custom tool servers — the agent discovers them at startup and uses them like any first-party integration, under the same audit, approval, and secrets guardrails.

Model Context Protocol

Open standard. Bring your own MCP-compatible server in Python, Node, Go, or Rust. No SDK lock-in, no proprietary adapters.

Auto-discovery

Register the server URL once. The agent reads its tool catalog (name, description, inputs, outputs) and treats every method as a first-class capability.

Same guardrails

Custom tools inherit approvals, full audit, PII redaction, per-project scoping, and the secrets vault. No security carve-outs.

Example — plug in your internal cost API

# settings/tool-servers.yml
- name: finops-api
  url: https://finops.internal.yourco.com/mcp
  auth:
    type: bearer
    secret_name: FINOPS_API_TOKEN   # looked up from secrets vault
  allowed_tools:
    - get_service_cost
    - set_budget_cap
    - list_cost_anomalies

# The agent now sees these three tools and can call them in any session —
# with approval gates on set_budget_cap, full audit on every invocation.

Wire up your first integration in 60 seconds.

Start free, connect a channel, fire a test webhook, watch the agent work. Upgrade only when you need the volume.