Mario Koala AI unifies workflow orchestration, integration management, observability, and team controls in a single coherent product.
Define workflows as code using our JavaScript/TypeScript SDK or declarative YAML. Version-control your automation alongside your application code. Ship changes with your existing CI/CD pipeline.
mk deploy# workflows/order-fulfillment.yaml name: order-fulfillment trigger: type: webhook path: /hooks/order-created steps: - id: validate-inventory uses: postgres/query with: query: "SELECT qty FROM inventory WHERE sku=$1" params: ["{{ trigger.sku }}"] - id: charge-payment uses: stripe/charge retry: { max: 3, backoff: exponential } with: amount: "{{ trigger.amount }}" currency: usd - id: notify-warehouse uses: slack/message with: channel: #fulfillment text: "Order {{ trigger.id }} ready to ship" - id: send-confirmation uses: sendgrid/email parallel: true with: to: "{{ trigger.customer_email }}" template: order-confirmation-v2
Every connector handles auth, rate limiting, and pagination. Just pick the action you need.
Every execution is logged at the step level. Filter, search, replay, and diff runs without leaving the dashboard.
| Run ID | Status | Triggered | Duration | Steps | Trigger |
|---|---|---|---|---|---|
run_9xK2mP |
✓ Success | 2 min ago | 1.24s | 4 / 4 | webhook |
run_8wJ1nO |
✓ Success | 14 min ago | 0.98s | 4 / 4 | webhook |
run_7vI0mN |
✗ Failed | 1 hr ago | 3.41s | 2 / 4 | webhook |
run_6uH9lM |
✓ Success | 2 hr ago | 1.07s | 4 / 4 | schedule |
run_5tG8kL |
⟳ Running | just now | — | 1 / 4 | webhook |
run_4sF7jK |
✓ Success | 3 hr ago | 1.55s | 4 / 4 | manual |
Mario Koala is built for teams with real compliance requirements. Every feature is designed with security as a first principle, not an afterthought.
Independently audited annually. Report available under NDA to Enterprise customers.
Data Processing Agreements available. Data residency in EU and US regions.
Works with Okta, Azure AD, Google Workspace, and any SAML 2.0 provider.
Viewer, Editor, Admin, and custom roles with per-environment and per-pipeline granularity.
Every action — deploys, config changes, access grants — is logged and tamper-proof.
Credentials encrypted at rest (AES-256) and in transit (TLS 1.3). Never stored in logs.
# Access control example roles: - name: platform-team permissions: - pipelines:deploy - pipelines:read - secrets:write environments: [production, staging] - name: developer permissions: - pipelines:deploy - pipelines:read - runs:replay environments: [staging, development] - name: observer permissions: - pipelines:read - runs:read environments: [*] sso: provider: okta domain: yourcompany.okta.com group_sync: true