Alerts and incidents
Use the Coralogix MCP server to investigate alerts and incidents, and to manage alert configurations and parsing rules directly from your AI agent.
Incidents
Get incident details
Use the get_incident_details_v1 tool to retrieve the full details of a specific Coralogix incident by its ID. Use this to understand the scope, timeline, and associated alerts for an active or resolved incident.
List incidents for an alert
Use the list_incidents_v1 tool to retrieve all incidents associated with a specific alert. This helps you trace patterns of recurring issues tied to a particular alert definition.
Alert events
Get alert event details
Use the get_alert_event_details_v1 tool to retrieve the details of a specific alert event by its ID. Alert events represent individual firings of an alert condition and contain information such as the triggering payload, severity, and timestamp.
Alert management
Manage alerts
Use the manage_alerts tool to run alert operations in Coralogix. This unified tool covers creating, updating, and querying alert configurations.
Parsing rules
Manage parsing rules
Use the manage_parsing_rules tool to run parsing rule operations in Coralogix. This unified tool covers creating, updating, and querying parsing rule configurations.