Ngrok

Your ngrok tunnels and endpoints, managed through AI conversation

Developers ask about active tunnels, and the AI agent lists every running endpoint with public URLs and protocols. API keys get created or revoked through chat. IP restrictions get audited without logging into the ngrok dashboard. Infrastructure visibility, delivered conversationally.

Chosen by 800+ global brands across industries

Tunnel and endpoint management on demand

Your AI agent creates API keys, lists active tunnels, audits IP policies, and monitors HTTPS edges, putting full ngrok account control inside natural language conversations.

Ngrok

Use Cases

Developer infrastructure via chat

See how engineering teams manage ngrok tunnels, rotate credentials, and audit access controls through AI-driven conversations instead of manual dashboard navigation.

Quick Tunnel Status for Remote Teams

A developer working remotely asks the AI agent which tunnels are currently active for the staging environment. The agent queries ngrok's tunnel list, finds two active tunnels with their public URLs and protocols, and shares the details. The developer connects to the correct tunnel in seconds without asking teammates or checking the dashboard.

Emergency API Key Rotation

A CI/CD pipeline key is accidentally committed to a public repository. The engineer messages the AI agent immediately. The agent lists all API keys, identifies the compromised one, deletes it, creates a replacement key with the same description, and returns the new credentials. The exposure window shrinks from hours to minutes.

IP Access Audit Before Compliance Reviews

Before a SOC 2 audit, the security team asks the agent to list all IP restrictions and policy rules on the ngrok account. The agent retrieves every restriction and rule, showing CIDR ranges, enforcement status, and associated policies. The team verifies access controls are properly configured without manually exporting data from the dashboard.

Try
Ngrok

Ngrok

FAQs

Frequently Asked Questions

How does the AI agent list tunnels and endpoints from my ngrok account?

The agent calls ngrok's List Tunnels and List Endpoints REST APIs using your API key. Both endpoints return paginated results with tunnel IDs, public URLs, protocols, start times, and metadata. No parameters are required beyond authentication, so the agent fetches the full list immediately.

Can the agent create API keys assigned to specific team members?

Yes. The Create API Key endpoint accepts an optional owner_id parameter. If the authenticated user is an account admin, the agent can assign the key to any user or bot in the organization. Non-admins can only create keys for themselves.

What ngrok API key does Tars require?

Tars requires a standard ngrok API key generated from your ngrok dashboard under the API section. This key authenticates all REST API calls. For security, use a dedicated key with appropriate permissions rather than reusing your personal key.

Does Tars store my ngrok tunnel data or API keys?

No. Tunnel lists, endpoint details, and IP restrictions are fetched live from ngrok during conversations. Created API keys are displayed once and not stored by Tars. Your ngrok infrastructure data remains in your ngrok account.

Can the agent enforce IP restrictions on my ngrok account?

The agent can retrieve and audit existing IP restrictions and IP policy rules. It lists all configured restrictions with their CIDR ranges, enforcement status, and associated policies. For creating new restrictions, you would configure those through the ngrok dashboard or CLI.

How is this different from using the ngrok CLI directly?

The ngrok CLI requires terminal access and familiarity with command syntax. Tars lets any team member query tunnel status, manage keys, or audit security through natural language in Slack or a web chat. Non-technical stakeholders can get infrastructure answers without CLI training.

What happens if I ask the agent to delete an API key that does not exist?

The ngrok API returns an error for invalid key IDs, and the agent reports this clearly to the user. It suggests listing all current API keys first to verify the correct ID before attempting deletion again.

Can the agent retrieve HTTPS edge configurations for traffic routing analysis?

Yes. The agent calls the List HTTPS Edges endpoint to retrieve all edge configurations in your account. Each edge includes routing rules that define how ngrok handles incoming HTTPS traffic, useful for verifying that traffic is being directed to the correct backend services.

How to add Tools to your AI Agent

Supercharge your AI Agent with Tool Integrations

Don't limit your AI Agent to basic conversations. Watch how to configure and add powerful tools making your agent smarter and more functional.

Privacy & Security

We’ll never let you lose sleep over privacy and security concerns

At Tars, we take privacy and security very seriously. We are compliant with GDPR, ISO, SOC 2, and HIPAA.

GDPR
ISO
SOC 2
HIPAA

Still scrolling? We both know you're interested.

Let's chat about AI Agents the old-fashioned way. Get a demo tailored to your requirements.

Schedule a Demo