ops0ops0

Integrations

Connect cloud providers, version control, observability, and alerting systems to ops0. Integrations let brew.ops0.ai discover resources, run deployments, sync code, and send operational signals into the tools your teams already use.

ops0 Integrations settings page showing connected providers

Accessing Integrations

Go to Settings

Navigate to Settings from the main sidebar.

Open Integrations

Select Integrations to view connected providers, statuses, and available setup flows.


Integration Categories


Shared Fields

Most integrations expose a common management surface in ops0:

FieldDescription
NameHuman-readable label for the integration
TypeProvider or category, such as AWS, GitHub, or Slack
StatusConnection health, such as Connected or Error
CreatedWhen the integration was added
Last UsedThe most recent time ops0 used the integration

Cloud Integrations

Cloud integrations provide provider-specific credentials and trust relationships so ops0 can discover resources, run deployments, and scope access correctly.

Provider-Specific Setup

Each cloud provider has its own setup page because authentication models, required fields, and permission boundaries differ significantly.


Git Integrations

Git integrations connect ops0 projects to source-control providers for syncing IaC code, opening pull or merge requests, and managing repository access.


Observability

Observability integrations send execution output and policy context into logging and monitoring systems.


Alerts

Alerts integrations deliver deployment notifications, approval requests, policy findings, and incident signals into collaboration tools.


Lifecycle Actions

After an integration is added, the operational lifecycle is broadly the same regardless of provider:

Test Connection

Run a connectivity check to verify that credentials, scope, and network access are valid.

Edit Configuration

Update names, endpoints, regions, channels, or provider-specific settings as requirements change.

Rotate Credentials

Replace keys, secrets, tokens, or app access when your rotation policy requires it.

Review Usage

Confirm which projects, workflows, or scans rely on the integration before changing or deleting it.

Delete Safely

Remove the integration only after checking for affected projects, workflows, or automation.


Naming Guidance

Use explicit names so teams can distinguish integrations quickly:

Good ExampleWhy It Works
aws-production-us-east-1Captures provider, environment, and region
gcp-analytics-prodMakes project purpose obvious
github-platform-orgIdentifies account or org scope
slack-deploy-alertsIndicates the alerting use case