01 · CLOUD
Cloud platforms
- AWS
- Azure
- GCP
Integrations
Hyground wires into your existing cloud, Kubernetes, observability, ticketing, and chat tools. Read-only by default, verified at startup, every credential stays inside your cluster.
Hyground ships read-only adapters for the tools your team already runs. 21 of them, across 11 categories.
01 · CLOUD
02 · ORCHESTRATION
03 · TELEMETRY
04 · STORAGE
05 · WORKFLOW
06 · KNOWLEDGE
07 · COMMUNICATION
08 · INTELLIGENCE
Read-only is enforced at startup, not promised in a policy document. Five scoped-write surfaces (Jira, ServiceNow, GitHub, GitLab, email) can be sandboxed with a single flag.
Tokens you paste once. Adapters that wrap tools you already trust. Model providers and MCP servers you can swap.
Adapters live in the Hyground namespace inside your infrastructure. Credentials never leave. Hyground never sees them.
Cloud and Kubernetes adapters wrap aws, az, gcloud, kubectl, gh, glab inside a hardened shell. Database adapters use the read role you create.
Run Hyground on Azure OpenAI, Anthropic, Gemini, or Bedrock via a LiteLLM chain. Primary plus fallback. No model lock-in.
If you already run MCP servers in-cluster, Hyground can call them as adapters alongside its own.
Herald is Hyground's external-notification gateway. Producers without a dedicated adapter wire up the moment they can POST JSON to one URL.
A single endpoint accepts free-form JSON. Alertmanager, Grafana, PagerDuty, Datadog, cron, curl: anything that speaks JSON wires up the moment it can POST.
Two LLM checks read the payload. Real alerts trigger an investigation; the rest gets summarised. No per-source adapter code.
Authentication decides who can call the endpoint. An LLM check decides what reaches an agent. Producers get an immediate acknowledgement; investigation runs in the background.

Check out our sandbox or schedule a demo with our team and experience sovereign AI for DevOps firsthand.