List, inspect, create, update, or delete ThousandEyes alert rules with MCP tools. Use when a user wants help managing alert rules for the currently documented write domains, Network & App Synthetics and Routing, and the session exposes `list_alert_rules`, `get_alert_rule`, `create_alert_rule`, `update_alert_rule`, or `delete_alert_rule`.
88
81%
Does it follow best practices?
Impact
100%
1.20xAverage score across 3 eval scenarios
Passed
No known issues
Use this skill to manage ThousandEyes alert rules through the available MCP read and write tools. Align the user request to the official alert-rule docs and expression metadata, but only send fields that exist in the actual MCP tool schema.
expressionlist_alert_rules, get_alert_rule, create_alert_rule, update_alert_rule, or delete_alert_rule.list, get, create, update, or delete.create_alert_rule, update_alert_rule, and delete_alert_rule as external write actions. Get explicit user confirmation before calling them.list_alert_rules and get_alert_rule as read-only discovery tools. Use them without extra confirmation when they help identify the right rule or recover the current required fields for an update.create and update, gather the required fields before proceeding: rule_name, expression, alert_type, and rounds_violating_out_of.get, update, and delete, require rule_id.rounds_violating_required <= rounds_violating_out_of before calling the tool.rounds_violating_mode=auto, prefer an explicit sensitivity_level.expression.list, get, create, update, or deleteaidget, update, and delete: rule_idcreate and update: rule_name, alert_type, expression, rounds_violating_out_ofrounds_violating_required, rounds_violating_mode, sensitivity_level, severity, notify_on_clear, is_defaulttest_ids, direction, alert_group_type, minimum_sources, minimum_sources_pct, endpoint_agent_ids, endpoint_label_ids, visited_sites_filter, include_covered_prefixesdescription, notificationsLoad reference.md for the docs-to-tool mapping and expression rules. Load examples.md only when you need a response template or payload example.
list_alert_rules when the user wants to browse rules, find a rule by name, or narrow down candidate rule IDs.get_alert_rule when the user already has a rule_id or once list_alert_rules identified the likely rule.get_alert_rule over list_alert_rules when you need the fullest current rule state before update_alert_rule.get_alert_rule to recover them. If only the rule name is known, use list_alert_rules first to identify the right rule_id.expression syntax as far as the docs and schema allow:
&& and || in the same expression when combining three or more metricsrounds_violating_required cannot exceed rounds_violating_out_ofsensitivity_level only makes sense with rounds_violating_mode=autodirection is only valid for applicable network-style alert typesendpoint_agent_ids, endpoint_label_ids, and visited_sites_filter are only valid for browser-session style endpoint rulesinclude_covered_prefixes is only valid for BGP-style rulesBefore calling the tool, present a short execution summary that includes:
update, an explicit warning that editing a rule with an active alert clears that alert and may retrigger after the updated rule takes effectDo not execute until the user confirms.
list_alert_rules for discovery and inventory viewsget_alert_rule for current-state inspection and update preparationcreate_alert_rule for new rulesupdate_alert_rule for existing rules, always including rule_id plus the required core fieldsdelete_alert_rule for removals, always including rule_idAlways return:
aid if usedrule_id returned or targetedrule_name, alert_type) when availablecreate_alert_rule, update_alert_rule, or delete_alert_rule without explicit user confirmation.get_alert_rule before update_alert_rule when the user does not already know the required core fields.update_alert_rule; it still needs the required core fields.rule_id is uncertain, stop and ask.a4497e7
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.