Top integrations for platform engineers building internal developer platforms in 2026
Platform engineers have one of the hardest jobs in tech: you’re responsible for building the infrastructure that enables every other team to ship. Engineering teams need deployment pipelines. Operations teams need incident response tools. Data teams need workflow orchestration. Business teams need admin panels. And somehow, you’re supposed to provide all of this while maintaining enterprise security, observability, and governance standards.
Traditionally, you’ve had two bad options: code every internal tool from scratch (slow, doesn’t scale, your team becomes a bottleneck), or settle for low-code tools that can't handle production complexity (security gaps, artificial limitations, no real extensibility).
Retool is a third option. As an enterprise AppGen platform, it lets you build production-grade apps directly on your infrastructure (GitHub, Datadog, AWS, PostgreSQL) and enforce platform-wide standards—authentication, access controls, approved integrations—that every app inherits automatically.
This guide covers the integrations that make that possible. We’ll walk through what platform engineers are connecting to, what they’re building with those connections, and how Retool’s security and governance features make it all possible.
What makes an integration production-ready for platform engineering
Connecting to systems is table stakes. What separates a prototype from production infrastructure is whether the integrations you build on can support real governance, real observability, and real extensibility without your team becoming the bottleneck.
Here’s what to evaluate before committing to a platform.
- Enterprise security and access control. SSO integration with your identity provider (Okta, Microsoft Entra ID, Auth0), role-based access control that restricts access by team and environment, and audit logs that track every action for compliance. Retool handles this through permission groups, resource-level permissions, and environment separation—so every tool built on your platform inherits those controls automatically.
- Platform-wide governance. Centralized credential management prevents shadow integrations. The Query Library lets you codify approved patterns once—how to authenticate with GitHub, query Datadog safely, trigger Lambda functions—so every app on your platform inherits the same approved patterns. Approval workflows handle the sensitive operations that shouldn’t execute without a second set of eyes.
- Observability for platform operations. Your IDP needs to be as observable as your production infrastructure. Audit logs, query performance metrics, and error tracking that surfaces integration issues before they become incidents. When something breaks, you need visibility into which apps are affected and what they were doing.
- True extensibility for engineering teams. Natural language prompts to generate initial scaffolding, then the ability to drop into SQL, JavaScript, Python, REST, or gRPC when you need custom logic. Engineers on your platform shouldn’t have to wait for you to add features they could build themselves.
- Multi-integration workflows at scale. An incident response workflow might query GitHub for deployment history, check Datadog for metrics, update LaunchDarkly feature flags, and send alerts via Slack—all from a single interface. That requires a platform with deep integrations, not point-to-point duct tape.
Version control and CI/CD integrations
Your internal developer platform lives in the same ecosystem as your application code. Platform engineers need integrations that connect to version control, deployment pipelines, and infrastructure as code so the tools you build can interact with the systems that ship software.
GitHub for deployment workflows and repository management
Retool’s GitHub integration connects directly to your repositories, letting you build tools that interact with code, issues, pull requests, and deployment workflows. This integration uses OAuth or personal access tokens, supporting both GitHub.com and GitHub Enterprise Server.
CircleCI and CI/CD pipeline management
Retool integrates with CircleCI and other CI/CD platforms through their APIs, giving platform teams the ability to trigger builds, surface failures, and manage deployment workflows from a unified interface.
AWS Lambda for serverless infrastructure
AWS Lambda integration lets platform teams build control planes for serverless infrastructure. Teams can trigger functions, monitor execution, and manage deployments without needing direct AWS console access.
LaunchDarkly for feature flag management
LaunchDarkly integration enables platform teams to build feature flag management interfaces. This is critical for progressive delivery and giving engineering teams safe deployment controls.
What teams are building
- Deployment control plane. A unified dashboard connected to GitHub and CircleCI that shows which services are deploying, who triggered them, and current pipeline status across all repositories. Ops teams can trigger rollbacks or pause deployments during incidents directly from the interface—no console access required—with every action routed through your platform’s approval workflows and logged to your audit trail.
- Feature flag control center for product teams. Instead of giving everyone access to LaunchDarkly’s admin interface, a simplified control plane where product managers can enable features for specific users or environments and engineering can manage gradual rollouts. Your platform enforces which flags require approval before production changes, so teams move fast without bypassing process.
- Self-service repository provisioning. When new teams need GitHub repos, they submit a request form through your platform instead of filing Slack DMs. The app creates the repo with the right templates, sets up branch protection, configures CI/CD integration, and assigns appropriate access—all following your organization’s standards, with no manual ops work.
Observability and monitoring integrations
Platform teams need visibility into what’s actually happening across their infrastructure. When something breaks—deployments fail, services degrade, or incidents occur—you need tools that surface the problem and enable immediate response.
Datadog for infrastructure and application monitoring
Datadog integration connects Retool to your observability platform, letting you build dashboards that pull metrics, traces, logs, and incident data. This integration uses API keys and supports all Datadog products.
Elasticsearch for log analysis and search
Elasticsearch integration enables platform teams to build log search interfaces and analysis tools without exposing raw Elasticsearch access to the entire organization.
What teams are building
- Incident command center for on-call engineers. A single interface that pulls real-time metrics from Datadog, deployment history from GitHub, and service status across your stack. On-call engineers see what changed, which services are affected, and relevant logs—without switching between tools. Buttons on the dashboard trigger rollbacks, scale services, or page additional responders, so response time drops and context-switching disappears.
- Service health dashboard for non-engineering stakeholders. A simplified status view that shows product managers whether their feature is healthy, customer success whether API endpoints are responding, and sales whether demo environments are up—without exposing raw Datadog metrics to people who don’t need them. Your platform provides appropriate visibility to each audience from a single source of truth.
- Platform SLA tracker for engineering leadership. A dashboard that queries Datadog for error rates, latency, and uptime across internal tools and services, then generates rolling reports showing which teams are meeting their SLOs and which need intervention. Updates automatically so platform leadership has ongoing visibility without filing requests with a data team.
Database and data infrastructure integrations
Internal tools need data. Whether you’re building deployment dashboards, admin panels, or incident response tools, you’ll query databases to show state and make changes. Platform teams need secure, governed access to data systems that enforces appropriate controls.
PostgreSQL and relational databases
Retool supports all major relational databases: PostgreSQL, MySQL, Microsoft SQL Server, and Oracle. These integrations handle connection pooling, query execution, and transaction management automatically.
NoSQL and document stores
Platform teams often work with MongoDB, DynamoDB, Redis, and other NoSQL systems for application state, caching, and real-time data.
Data warehouses for analytics and reporting
When internal tools need to surface analytics or reporting data, Retool integrates with Snowflake, BigQuery, Redshift, and Databricks.
What teams are building
- Customer account admin panel for support teams. A searchable interface connected to production PostgreSQL or MongoDB where support agents can look up accounts, update records, process refunds, or fix data issues—each write operation gated behind a confirmation step and routed through approval workflows for sensitive changes. Every action logs the agent’s name, timestamp, and change to an audit trail. Support teams fix issues without touching the database directly.
- Developer portal for service state. A unified dashboard that queries across databases and config stores to show which services are deployed, their current configurations, and environment-level differences. Engineering teams see which features are enabled, what versions are running, and how staging differs from production—all from a single interface rather than ssh sessions and console queries.
- Configuration management tool for platform teams. Instead of giving teams direct database access to update application configs, an interface that validates changes against your platform’s rules before executing them. Teams submit configuration updates through a structured form, the platform checks them against schema requirements and environment constraints, routes to approvers if needed, and applies the change with full logging. Bad configs don’t reach production.
Messaging and collaboration integrations
When incidents happen or workflows complete, the right people need to know. Platform teams need integrations that automate notifications and enable incident response through the tools their organization already uses.
Slack for operational alerts and workflows
Slack integration lets you send notifications, create approval workflows, and build incident response tools that route through your team’s existing communication channels. The integration uses OAuth for secure authentication.
Microsoft Teams for enterprise communication
Microsoft Teams integration provides similar capabilities for organizations using Microsoft’s collaboration platform.
Email and SMS for formal notifications
For stakeholder communication or compliance notifications, Retool supports SendGrid, SMTP, and Twilio for email and SMS delivery.
What teams are building
- Incident alerts with context. When monitoring detects issues—service degradation, deployment failures, or resource limits—a workflow automatically posts to your incident channel with error details, relevant Datadog metrics, and deployment history from GitHub. The message includes links to runbooks and buttons to trigger common remediation steps, so responders have everything they need without leaving Slack.
- Approval workflows for sensitive changes. When teams need to make production changes—database migrations, infrastructure modifications, or bulk operations—they submit through your Retool interface with context and justification. The relevant approver gets a Slack notification, reviews the details, and responds directly in Slack. Execution only happens after approval, and everything logs to your audit trail.
- Automated deployment summaries for stakeholders. After successful deployments, a workflow automatically sends summaries to relevant teams—engineering sees which services deployed and who shipped them, product gets notified when their features go live, and leadership receives a weekly deployment digest. Your platform keeps everyone informed without manual communication overhead.
Cloud infrastructure and storage integrations
Internal tools often need to interact with cloud infrastructure—uploading files, triggering serverless functions, or managing storage. Platform teams need integrations that enable these workflows while maintaining security controls.
Amazon S3 and cloud storage
S3 integration lets you build file upload interfaces, browse storage buckets, and generate signed URLs for secure access. Retool also supports Google Cloud Storage and provides Retool Storage for built-in file management.
What teams are building
- File upload portal for non-technical teams. Operations needs to upload configuration files, sales wants to import lead lists, support needs to attach documentation—all stored in S3, but none of them have AWS credentials. A self-service upload interface through your platform handles authentication, validates files against format rules, confirms uploads, and optionally triggers downstream processing via Lambda. Teams get the capability they need without cloud console access.
- Deployment artifact and log browser. An interface connected to S3 where teams can browse deployment artifacts, download build logs, or access archived data filtered by service, environment, and date range. Your platform enforces access controls and logs every download, while providing a far simpler interface than the AWS console.
- Backup and recovery operations tool. An interface where teams can trigger backups, verify their status, and restore from previous snapshots—with approval workflows gating production restore operations. Your platform orchestrates the steps across S3, databases, and other services, so recovery operations follow a consistent, auditable process rather than ad hoc console work.
Security, SSO, and authentication integrations
Platform teams are responsible for ensuring that internal tools meet enterprise security standards. Every app built on your platform should inherit centralized authentication, appropriate access controls, and complete audit trails.
How Retool handles enterprise security
Retool integrates with identity providers like Okta, Microsoft Entra ID, Auth0, and Google through SAML or OpenID Connect. Users authenticate once with their corporate credentials and gain access to all Retool apps permitted by their role.
Single sign-on (SSO). When someone joins or leaves your organization, their Retool access is managed through your existing identity system. No separate credentials to provision or revoke. Your platform inherits your organization’s authentication standards automatically.
Role-based access control (RBAC). RBAC in Retool operates at multiple levels. You can restrict which teams access which integrations (engineering gets GitHub access, ops gets Datadog, finance gets database access), control who can edit vs. view apps, and define which actions require approval. This means you can build tools that surface production data to business teams without exposing raw database credentials.
Audit logs for compliance. Every action in Retool is logged—queries executed, apps accessed, configurations changed. The audit logs capture the user, timestamp, action type, and IP address. You can access logs through the UI, query them directly on self-hosted deployments, or stream them to Datadog or Splunk. When security asks who accessed a specific system last week, you have complete visibility.
What this enables for platform teams
Platform-wide security standards. Instead of every team implementing authentication differently, your platform enforces SSO, RBAC, and audit logging automatically. Every internal tool inherits these controls whether engineers build them, data teams create them, or business teams use them.
Self-service within guardrails. Teams can build the tools they need without waiting for your review of every implementation. Your platform defines what integrations are approved, which actions require approval, and who can access what—then teams work within those boundaries independently.
Compliance without bottlenecks. When auditors ask for access logs or change history, you have complete visibility without having tracked usage manually. Your platform maintains the audit trail automatically across every internal tool your organization uses.
Building patterns that scale across your organization
The power of an internal developer platform isn’t just in connecting to systems—it’s in codifying patterns that every team can reuse. Individual integrations matter, but the compounding value comes when your platform defines how to authenticate safely, query data correctly, and handle errors appropriately, then makes those patterns available to everyone.
Reusable Query Library
Retool’s Query Library lets you define approved patterns that teams inherit automatically. Create queries for common operations—fetching service status from Datadog, triggering deployments through GitHub, posting alerts to Slack—then share them across apps.
When you update a Query Library pattern (improving error handling, adding rate limiting, or changing authentication), every app using it inherits the improvement automatically. This is how platform teams scale: solve the problem once, apply it everywhere.
Shared components and templates
Build reusable components for common platform patterns—deployment dashboards, incident command centers, approval workflows—then let teams start from those templates. Engineering teams building service dashboards inherit your observability patterns. Ops teams building incident tools inherit your GitHub and Datadog queries. Everyone benefits from the platform’s accumulated knowledge.
It’s time to build the platform that enables everyone else
Platform engineering is about building foundations that scales. That includes the internal tools that engineering, operations, data, and business teams depend on every day—and it shouldn’t require choosing between coding everything from scratch and settling for tools that can’t meet production standards.
The point isn’t the integrations themselves. It’s that when your platform handles authentication, governance, and approved patterns, every team can build without coming back to you. Version control, observability, databases, messaging, cloud infrastructure, and security—together, they let you enforce standards across every team, deliver tools your organization actually relies on, and stay focused on the work only you can do.
Eng integration FAQs
Through enterprise security features that apply automatically: SSO integration authenticates through your existing identity provider (Okta, Microsoft Entra ID, Auth0). RBAC provides resource-level permissions that control which teams access which integrations. Audit logs track every query execution, data access, and configuration change. Environment separation keeps development, staging, and production environments isolated with separate credentials. Approval workflows route sensitive operations through required approvals before execution.
These aren't optional features you add later — they're built into the platform from day one. When you connect Retool to GitHub or your production database, security and governance come with the integration.
Security operates at multiple levels. Centralized credential management stores integration credentials in one place with strict access controls. Resource-level permissions define which teams can use which integrations through permission groups. Query Library governance provides approved patterns that teams inherit automatically, ensuring safe access even when they build independently. Audit trails track which users accessed which integrations, what queries they ran, and when.
Platform teams can enforce standards — this is how you authenticate with GitHub, this is how you query Datadog safely, this is the approved way to trigger Lambda functions — then let teams build within those guardrails.
Platform teams are increasingly adopting AI model providers (OpenAI, Anthropic, Google Gemini) for building intelligent automation into internal tools — incident summaries, log analysis, natural language interfaces. Observability platforms (Datadog, Sentry) are being treated as first-class integrations rather than afterthoughts, making internal tools as observable as production services. Feature flag platforms like LaunchDarkly support progressive delivery workflows that give engineering teams safe deployment controls.
The trend is toward integrations that help platform teams build tools that do things — trigger deployments, respond to incidents, manage feature rollouts — not just display information.
Through flexible API integration options: REST API resources connect to any HTTP API with configurable authentication (OAuth, API keys, basic auth). GraphQL support lets you query GraphQL APIs with the same tooling as native integrations. gRPC integration calls gRPC services for high-performance microservice communication. Webhooks trigger workflows from external systems or send events to other platforms.
If your system exposes an API, Retool can connect to it. You write the queries using the same patterns as native integrations, and the result behaves identically to built-in resources.