Use this skill when the user asks to "investigate incident", "triage this alert", "what's firing", "who got paged", "incident response", "check incident status", "SLO breaching", "error budget burned", "check service level", "SLI status", "who was notified", "check notification delivery", "verify alert routing", "MTTR", "incident severity", "error budget", "burn rate", "acknowledge incident", "resolve incident", "production incident", "what alerts are active", "incident timeline", "on-call triage", or wants to triage, manage, or respond to incidents using alerts, SLOs, and notifications.
63
55%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/cx-incident-management/SKILL.mdUse this skill as the gateway for incident triage, SLO monitoring, and notification verification. It orchestrates the full triage workflow - from detection through resolution - and cross-references cx-alerts for deep alert management and cx-telemetry-querying for root cause investigation.
| Command | Subcommands | Purpose |
|---|---|---|
cx incidents | list, get, acknowledge, resolve, close, assign, unassign, events, aggregations | Manage and triage incidents |
cx slos | list, get, create, update, delete | Monitor and manage SLO definitions |
cx alerts | list, get | Check which alerts are firing (see cx-alerts skill for full alert management) |
cx notifications connectors | list, get | Verify notification connector configuration |
cx notifications routers | list, get | Verify notification routing rules |
cx notifications presets | list, get | Check notification preset templates |
cx notifications test | connector, destination, preset, routing-condition, template-render | Test notification delivery |
Key flags:
cx incidents list supports --status (TRIGGERED, ACKNOWLEDGED, RESOLVED), --severity (CRITICAL, WARNING, INFO), --assignee-o json for structured output and -p <profile> for profile selectioncx slos create/update use --from-file <path> (or - for stdin)cx incidents list -o json
cx incidents list --status TRIGGERED -o json
cx incidents list --severity CRITICAL -o jsonGet an overview of what's happening. Filter by severity for immediate priorities:
cx incidents list -o json | jq '[.[] | select(.severity == "CRITICAL") | {id, name, status, severity, started_at}]'cx incidents get <incident-id> -o json
cx incidents events --incident-id <incident-id> -o jsonReview the incident timeline and related events to understand scope and progression.
cx alerts list -o jsonFind which alerts are currently firing. For deep alert inspection, switch to the cx-alerts skill.
cx alerts list -o json | jq '[.[] | select(.is_active == true) | {id, name, severity, last_triggered}]'cx slos list -o json
cx slos get <slo-id> -o jsonCheck if SLOs are breaching or error budgets are burned:
cx slos list -o json | jq '[.[] | {name, status, remaining_budget_percentage}]'cx notifications connectors list -o json
cx notifications routers list -o json
cx notifications presets list -o jsonConfirm the right people were notified through the correct channels.
Switch to the cx-telemetry-querying skill to investigate the underlying cause using logs, traces, and metrics.
cx incidents acknowledge <incident-id>
cx incidents acknowledge <id1> <id2> <id3>cx incidents resolve <incident-id>
cx incidents resolve <id1> <id2> <id3>cx incidents assign <incident-id> --user-id <user-id>cx incidents close <incident-id>Template from an existing SLO:
cx slos get <existing-slo-id> -o json > slo-template.json
# Edit slo-template.json with new service/threshold
cx slos create --from-file slo-template.json# All SLOs with their status
cx slos list -o json | jq '[.[] | {name, status, target_percentage, remaining_budget}]'
# SLOs that are breaching
cx slos list -o json | jq '[.[] | select(.status != "OK")]'When notifications aren't reaching the right people:
cx notifications connectors list -o json | jq '[.[] | {id, name, type}]'Verify the expected channels (Slack, PagerDuty, email) exist and are configured.
cx notifications routers list -o json | jq '[.[] | {id, name, entity_type}]'Verify routing rules map the right alert types to the right connectors.
cx notifications test connector --from-file test-connector.json
cx notifications test destination --from-file test-destination.json
cx notifications test preset --from-file test-preset.json
cx notifications test routing-condition --from-file test-condition.jsonGet a high-level view of incident patterns:
cx incidents aggregations -o jsonUse this to understand incident frequency, MTTR trends, and severity distribution.
cx-telemetry-querying skill for root cause after triagecx incidents events shows the full incident lifecyclecx-alerts - deep alert management: creating, updating, and inspecting alert definitionscx-telemetry-querying - root cause investigation using logs, metrics, traces, and RUMcx-observability-setup - configure notification channels and routing for alertsdefdc4d
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.