Integrations
Meet your team where they already work. Reach the systems they already run. Every integration surface ships with signature verification, tenant isolation, end-to-end audit, and fine-grained approval gates.
01 · Chat channels
One agent, one memory, every channel. Streaming replies with the agent's reasoning visible, inline approvals on risky actions, and voice on mobile for on-call engineers away from their keyboard.
Same agent, every surface
#incidents · Slack
"payment-api p99 spiked. Investigating…"
@oncall-bot · Telegram
Voice note → transcribed → answered in 2.1s
SRE Team · WhatsApp
Inline approval → rollback dispatched
veirox.yourdomain.com · Web
Full artifact pane + session history
02 · Webhooks
Nine first-class providers with signed deliveries, replay protection, and generic HMAC-SHA256 for everything else. Route, redact, dedupe, rate-limit, and gate on approvals — all per-webhook.
Pipeline — what happens after the POST
# AlertManager receiver — three lines to production
receivers:
- name: veirox
webhook_configs:
- url: https://veirox.com/api/webhooks/<task_id>
http_config:
authorization: { type: Bearer, credentials: <your-token> }
03 · Tool integrations
One click to connect. The agent reads, writes, and acts through official APIs — with your team's permissions, your team's scopes, and your full audit trail.
Productivity
Full CRUD on Gmail, Calendar, and Drive. Agent reads emails, drafts replies, creates events, uploads artifacts.
Productivity
Outlook, Teams, OneDrive, OneNote, SharePoint, Planner, and Microsoft To Do — one OAuth, full Graph API access.
Ticketing & docs
JQL search, issue CRUD, status transitions, comments, linked dependencies. Confluence pages, spaces, attachments.
Source control
HTTPS token or SSH key. Encrypted at rest. Shallow clones, branch selection, auto-clone into per-project workspace.
Observability
Prometheus/AlertManager, Grafana, Datadog, Sentry, PagerDuty — every major tool with webhook support fires an Veirox task.
Cloud & Kubernetes
Official CLIs + APIs, credentials in the vault. EKS, GKE, AKS, or on-prem via Veirox Connect for private clusters.
Notifications
Slack, Email (SMTP or SendGrid), Telegram, WhatsApp, Pushover — severity thresholds per channel.
Payments & revops
Timestamp-window verification on Stripe-Signature. Event correlation for subscriptions, disputes, failed payments.
Secrets
Agent references secrets by friendly name. Raw values never touch model context, UI, or logs. Every access audited.
Every integration is project-scoped and inherits your audit, approval, redaction, and rate-limit policies.
04 · Veirox Connect
Private Kubernetes, on-prem databases, air-gapped networks — Veirox reaches them through a lightweight agent you install on any Linux host inside your perimeter. The agent opens an outbound WebSocket; your firewall never sees an inbound rule.
Tunneled command lifecycle
kubectl get pods -n prodcurl -fsSL https://veirox.com/install.sh | sh
veirox-connector enroll --code ABC123
# → Connector online · tunneling for project <id>
05 · Custom tool servers
Every stack has in-house systems: a bespoke runbook engine, an internal cost API, a vendor CLI, a home-grown deployment tool. Register them as custom tool servers — the agent discovers them at startup and uses them like any first-party integration, under the same audit, approval, and secrets guardrails.
Open standard. Bring your own MCP-compatible server in Python, Node, Go, or Rust. No SDK lock-in, no proprietary adapters.
Register the server URL once. The agent reads its tool catalog (name, description, inputs, outputs) and treats every method as a first-class capability.
Custom tools inherit approvals, full audit, PII redaction, per-project scoping, and the secrets vault. No security carve-outs.
Example — plug in your internal cost API
# settings/tool-servers.yml
- name: finops-api
url: https://finops.internal.yourco.com/mcp
auth:
type: bearer
secret_name: FINOPS_API_TOKEN # looked up from secrets vault
allowed_tools:
- get_service_cost
- set_budget_cap
- list_cost_anomalies
# The agent now sees these three tools and can call them in any session —
# with approval gates on set_budget_cap, full audit on every invocation.
Start free, connect a channel, fire a test webhook, watch the agent work. Upgrade only when you need the volume.