Help Center
Getting the most out of Recon
Everything you need to set up Recon, connect your tools, and start investigating. If you can't find what you're looking for, reach out to us.
What is Recon
Recon is an AI-powered platform for SaaS teams. It connects to the tools your company already uses (database, codebase, tickets, docs, CRM, support platform) and lets anyone on your team investigate customer issues, analyze data, triage bugs, and generate reports through a simple chat interface.
Beyond one-off investigations, Recon runs recurring missions that monitor your accounts on a schedule, builds a compounding knowledge base that learns your business over time, and suggests one-click actions (advisories) when something needs attention.
An engineer sets it up once by connecting your data sources. After that, PMs, support leads, ops managers, and anyone else on the team can ask questions in plain English, either in the web app or directly in Slack.
Getting started
Setting up Recon takes about 15 minutes. Here is what the process looks like:
Create your account
Sign up at askrecon.com. You will be asked to create an organization and your first workspace. A workspace is the core unit in Recon. All your connections, conversations, and team access are scoped to a workspace.
Connect your data sources
Navigate to the Connections page in your workspace. Click the integration you want to connect and follow the setup flow. Most integrations use OAuth (one click), while databases require a connection string. See the section below for detailed steps.
Invite your team
Go to the Team page in your workspace settings. Invite teammates by email. They will get access to the chat interface and can start asking questions immediately. They do not need to see or manage any connection credentials.
Start investigating
Open a new conversation from the sidebar and ask a question. Recon will use all your connected sources to investigate and come back with an answer. You can also install Slack to let your team ask questions directly from any channel.
Connecting data sources
Recon supports two types of connections: OAuth (one-click authorization) and credentials(connection string or API key). The connection page shows all available integrations with a "Connect" button next to each one.
OAuth integrations
Most integrations (GitHub, Linear, Notion, Jira/Confluence, Intercom, HubSpot, Sentry, Zendesk, Supabase) connect via OAuth. The flow is the same for all of them:
Click Connect
On the Connections page, find the integration you want and click the "Connect" button.
Authorize access
You will be redirected to the provider's authorization page (e.g., GitHub, Linear). Review the permissions and click "Authorize" or "Allow". Recon requests the minimum scopes needed, typically read-only access.
Return to Recon
After authorizing, you will be redirected back to the Connections page. Your new connection will appear with a green status indicator. Some providers (GitHub, Supabase) ask you to pick a specific repository or project after connecting.
All OAuth integrations handle token refresh automatically, so you do not need to re-authorize unless you revoke access from the provider side.
Tip: Use a dedicated service account
When connecting integrations where Recon can create items (Linear, Jira, Notion, Intercom), consider authorizing with a dedicated service account. Tickets and pages Recon creates will show as authored by the account that authorized the connection.
Database connections (PostgreSQL)
Database connections use a connection string instead of OAuth. Recon connects to your database with a read-only Postgres role.
Create a read-only database user
On your database, create a new role with pg_read_all_data privileges. Recon provides the exact SQL during setup. This role can run SELECT queries but cannot insert, update, delete, or modify your schema.
Enter your connection details
Click "Connect" on PostgreSQL. Enter your connection URL (or fill in host, port, database, username, and password individually). Give the connection a name so your team can identify it.
Test the connection
Click "Test connection". Recon will attempt to connect and list your tables. If the connection succeeds, you will see the table count. If the user has write access, you will see a warning. Fix your role permissions before saving.
Save
Once the test passes, click Save. Your database is now available to Recon. All credentials are encrypted with AES-256-GCM before storage.
Stripe
Stripe uses a restricted API key (starts with rk_). Create one in your Stripe Dashboard under Developers > API keys > Restricted keys. Grant read-only access to the resources you want Recon to search (customers, subscriptions, invoices, charges). Paste the key in Recon and save.
Managing connections
On the Connections page, each connected integration shows its status. You can:
- Test a connection to verify it is still working.
- Reconnect an OAuth connection if the token has expired.
- Disconnect a connection to remove it from your workspace.
Connection limits depend on your plan. Starter allows 5 sources, Pro allows 15, and Business allows 50.
Adding Slack
Slack is a delivery channel, not a data source. Once installed, your team can @mention Recon in any Slack channel to start an investigation without leaving Slack.
Open the Connections page
In your workspace, go to the Connections page. Below the data source integrations, you will see the Channels section with a Slack card.
Click "Add to Slack"
Click the "Add to Slack" button. You will be redirected to Slack's authorization page.
Choose your Slack workspace
Select the Slack workspace where you want to install Recon and click "Allow". Recon requests permissions to read messages (where it is mentioned), write messages, upload files, and add reactions.
Start using Recon in Slack
After authorizing, you will be redirected back to Recon. The Slack card will now show "Connected". In Slack, @mention Recon in any channel or thread to ask a question.
How Recon works in Slack
- @mention Recon in any channel. It will acknowledge your message and begin investigating.
- Recon updates the thread in real-time as it works, showing which tools it is using.
- The final answer is posted as a reply in the thread, with the same detail as the web interface.
- If Recon generates a file (CSV, report), it uploads it directly to the Slack thread.
- You can reply in the thread to ask follow-up questions. Recon keeps the conversation context.
Tip: Connection suggestions
If Recon detects that it could answer a question better with an integration you have not connected yet, it will suggest adding it. For example, if someone asks about a Sentry error but Sentry is not connected, Recon will mention that connecting Sentry would help.
Asking questions
Recon works best with natural language questions. You do not need to know SQL, code, or the structure of your data. Just describe what you want to know, and Recon will figure out which sources to check and how to get the answer.
Customer support
- "Why is this customer seeing an error on their dashboard?"
- "Pull up the last 5 support conversations for acme@corp.com"
- "Check if there is a related Sentry error for this ticket"
Product and data
- "How many users signed up this week vs last week?"
- "What percentage of workspaces have more than 3 connections?"
- "Generate a CSV of all customers on the Pro plan"
Bug investigation
- "Is there a Sentry error spike in the last 24 hours?"
- "Find the commit that changed the billing calculation logic"
- "Check if there is a related Linear ticket for this error"
Documentation and reports
- "Summarize all open P0 tickets in Linear"
- "What does the onboarding flow look like in the codebase?"
- "Create a Notion page with this week's support summary"
Ticket creation
- "File a Linear bug for this issue with the context we found"
- "Create a Jira ticket for engineering to investigate"
- "Draft a Notion doc with the root cause analysis"
Tips for better results
- Be specific about what you are looking for. "Why did Acme Corp's usage drop last week?" is better than "check usage."
- Mention the customer or entity by name when you can. Recon will search across all connected sources for that name.
- Ask follow-up questions in the same conversation. Recon remembers the context from earlier in the thread.
- If Recon generates a useful finding, it saves it to the knowledge base so future investigations and missions can build on it.
Missions
Missions are recurring tasks that Recon runs on a schedule. You define what to watch in plain English, set a frequency (daily, weekly, or custom), and Recon handles the rest.
Creating a mission
Open the Missions page
In your workspace, navigate to Missions from the sidebar. Click "New mission."
Describe what to watch
Write a plain English description of what Recon should monitor. For example: "Watch for enterprise accounts where usage dropped 30% near a renewal" or "Check if any P0 tickets have been open for more than 48 hours."
Set the schedule
Choose how often the mission runs: daily, weekly, or a custom schedule. Pick a time and timezone. Recon will run the mission automatically at that time.
Choose a Slack channel (optional)
If you have Slack connected, select a channel where Recon should post mission reports. Each run posts a summary with findings, metrics, and any recommended actions.
How missions work
- Each mission run is a full investigation. Recon queries your connected sources, cross-references data, and writes a report.
- Findings are posted to Slack (if configured) and saved in the Missions dashboard with full run history.
- Missions build on the knowledge base. What Recon learns in one run carries over to the next.
- You can pause, edit, or delete missions at any time from the Missions page.
Tip: Start simple
A good first mission is something you already check manually, like reviewing accounts nearing renewal or monitoring for error spikes. Let Recon handle the routine check so you can focus on the ones that need action.
Knowledge base
Recon maintains a per-workspace knowledge base that grows over time. As it runs investigations and missions, it saves what it learns about your accounts, patterns, and product behavior. Future investigations and missions read from this knowledge, making each one more informed than the last.
How the knowledge base works
- Recon curates markdown files organized by topic (accounts, patterns, product architecture, etc.).
- Missions are required to update the knowledge base before writing their report, so knowledge stays current.
- A daily reflection process reads across all knowledge and recent mission runs to find cross-cutting patterns and flag things that individual missions might miss.
- The knowledge base is scoped to your workspace. Other workspaces cannot access it.
What gets saved
Recon saves structured insights, not raw data. Examples: account health profiles, recurring patterns (like "support ticket spikes precede usage drops by two weeks"), product behavior notes, and cross-account trends. You can view the knowledge base contents in your workspace settings.
Advisories
Advisories are actionable suggestions that Recon creates when it finds something worth acting on. Instead of just reporting a finding, Recon proposes a specific next step and lets you approve or reject it with one click.
How advisories work
Recon creates an advisory
During a mission run or daily reflection, Recon identifies something actionable. For example: an account showing signs of churn that has no outreach on record.
You receive it in Slack or the web dashboard
The advisory appears with a title, reasoning, priority level, and a proposed action (like "Create a Linear ticket for Acme Corp renewal risk").
Approve or reject
Click Approve and Recon executes the action. Click Reject and optionally tell Recon why. Rejections with feedback help Recon calibrate what to flag in the future.
Available actions
- Create a Linear issue with full investigation context.
- Create a Jira ticket with findings and recommended next steps.
- Create a Notion page with a structured summary.
- Investigate further to run a deeper investigation on the finding.
- Create a new mission to set up ongoing monitoring for the pattern.
Tip: Rejection feedback matters
When you reject an advisory, telling Recon why (e.g., "this account already renewed" or "we only care about enterprise accounts") helps it learn your preferences. Over time, advisories become more relevant and less noisy.
Supported integrations
Recon connects to 11 tools across databases, code, tickets, docs, support, CRM, billing, and error tracking.
PostgreSQL
Connection stringRun read-only SQL queries, explore tables, and analyze your production data.
Supabase
OAuthConnect your Supabase project and query your database through the Management API.
GitHub
OAuthSearch code, read files, browse commits, and explore your repositories.
Linear
OAuthSearch issues, list projects, and create new tickets with full investigation context.
Notion
OAuthSearch pages and wikis, fetch page content, and create new pages.
Jira / Confluence
OAuthSearch Jira issues, browse Confluence pages, and create new tickets. One connection covers both.
Intercom
OAuthSearch customer conversations, look up contacts, and add internal notes.
HubSpot
OAuthSearch contacts, deals, and companies in your CRM.
Sentry
OAuthSearch error events, list projects, and investigate production issues.
Zendesk
OAuthSearch support tickets and conversations across your Zendesk account.
Stripe
Restricted API keySearch customers, subscriptions, invoices, and charges. Read-only access.
Slack
OAuth (bot install)Deliver channel. @mention Recon in any Slack channel to start an investigation.
Security
Recon is designed with security as a core principle. Here is a summary of how your data is protected. For full details, see the Security page.
Read-only by default
Database access enforced at the Postgres role level. OAuth scopes are minimal. Write actions require explicit approval.
Encrypted credentials
All connection secrets encrypted with AES-256-GCM. Decrypted only in-memory during investigation. Never logged.
Sandboxed execution
Every investigation runs in its own Firecracker microVM. No persistent connection to your systems. Destroyed on completion.
Workspace isolation
Data isolated at the database level with Row Level Security. One workspace cannot access another's data.
Need help?
If you have questions about setup, need help with a specific integration, or want to report an issue, we are here to help.