Skip to content

Alerts and incidents

Use the Coralogix MCP server to investigate alerts and incidents, and to manage alert configurations and parsing rules directly from your AI agent.

Incidents

Get incident details

Use the get_incident_details_v1 tool to retrieve the full details of a specific Coralogix incident by its ID. Use this to understand the scope, timeline, and associated alerts for an active or resolved incident.

List incidents for an alert

Use the list_incidents_v1 tool to retrieve all incidents associated with a specific alert. This helps you trace patterns of recurring issues tied to a particular alert definition.

Alert events

Get alert event details

Use the get_alert_event_details_v1 tool to retrieve the details of a specific alert event by its ID. Alert events represent individual firings of an alert condition and contain information such as the triggering payload, severity, and timestamp.

Alert management

Manage alerts

Use the manage_alerts tool to run alert operations in Coralogix. This unified tool covers creating, updating, and querying alert configurations.

Parsing rules

Manage parsing rules

Use the manage_parsing_rules tool to run parsing rule operations in Coralogix. This unified tool covers creating, updating, and querying parsing rule configurations.