--- name: triage-alerts description: Triages a batch of alerts by severity and urgency, producing a prioritized action plan. argument-hint: "[alert-data-source]" --- # Triage Alerts Skill ## When to Use Use `/triage-alerts` when you need to: - Process a large batch of incoming alerts and determine response priority - Create an incident response checklist with SLA-driven deadlines - Distribute alerts across team members based on severity and availability - Track escalation paths for critical events - Organize alert response workload by urgency and impact This skill is especially useful during security incidents, monitoring system maintenance, or routine alert reviews. ## Triage Rules The skill applies strict SLA-based triage rules to classify alerts into action buckets: ### Critical Severity - **Response Time**: Must be triaged and acknowledged within **1 minute** - **Action**: Immediate escalation to security team lead and on-call personnel - **Handling**: Drop everything and respond; activate incident response protocols - **Notification**: Page + Email + SMS to escalation list ### Error Severity - **Response Time**: Must be reviewed and acknowledged within **15 minutes** - **Action**: Assign to primary responder; investigate root cause - **Handling**: High priority; address before routine work - **Notification**: Email + In-app alert to assigned team ### Warning Severity - **Response Time**: Must be processed within **1 hour** - **Action**: Log for trend analysis; investigate if correlated with other alerts - **Handling**: Normal priority; part of standard monitoring workflow - **Notification**: In-app alert; included in daily report ### Info Severity - **Response Time**: Can be batched and reviewed in daily/weekly reports - **Action**: Archive or group into trend analysis; no immediate action needed - **Handling**: Low priority; batch process for efficiency - **Notification**: Include in summary reports only ## Output Format The skill produces a prioritized action plan with the following structure: ``` TRIAGE REPORT: [timestamp] Generated by: triage-alerts EXECUTIVE SUMMARY ───────────────── Total Alerts: [count] Critical: [count] Error: [count] Warning: [count] Info: [count] Overall Risk Level: [Critical|High|Medium|Low] PRIORITY 1: CRITICAL ALERTS (Response SLA: 1 minute) ────────────────────────────────────────────────────── [For each critical alert] ID: [alert-id] Name: [alert-name] Description: [description] Location: [location] (Lat: [lat], Long: [long]) Source: [source] Created: [timestamp] Recommended Action: [action] Escalation Path: [team-lead] → [on-call] → [external-partner] SLA Deadline: [datetime] PRIORITY 2: ERROR ALERTS (Response SLA: 15 minutes) ──────────────────────────────────────────────────── [For each error alert] ID: [alert-id] Name: [alert-name] Status: [Active|Acknowledged|Resolved] Assigned To: [team-member] Recommended Action: [action] SLA Deadline: [datetime] PRIORITY 3: WARNING ALERTS (Response SLA: 1 hour) ────────────────────────────────────────────────── [Grouped by location or source] Count: [number] Examples: [list of alert IDs] Pattern: [description of commonality] Recommended Action: [action] PRIORITY 4: INFO ALERTS (Batch Processing) ─────────────────────────────────────────── Count: [number] Batch Processing: Daily review recommended Archive Action: [Auto-archive after 30 days unless correlated] RECOMMENDATIONS ─────────────── 1. [Action with highest impact] 2. [Action with medium impact] 3. [Follow-up action for trend analysis] ESCALATION PATHS ──────────────── Critical → [Security Team Lead] → [Director] → [External SOC if required] Error → [Primary Responder] → [Team Lead] → [Manager if unresolved in 1 hour] Warning → [Monitoring Team] → [Trend Analysis Queue] Info → [Daily Report Queue] ``` ## Usage Examples ### Triage recent alert logs ``` /triage-alerts from recent logs ``` ### Triage only critical severity alerts ``` /triage-alerts Critical alerts only ``` ### Triage alerts from a specific source ``` /triage-alerts from Camera source ``` ### Triage alerts from a geographic area ``` /triage-alerts from location Building-A ``` ### Triage and generate incident response plan ``` /triage-alerts with incident-response-plan ``` ### Triage with 2-hour SLA override (emergency response) ``` /triage-alerts with emergency-sla ``` ## SLA Tracking The skill automatically: - Calculates time remaining until SLA deadline for each priority level - Flags alerts that have exceeded SLA thresholds - Suggests escalation when SLA is breached - Generates compliance reports for audit purposes ## Integration Points - **Alert Management System**: Reads from alert database - **Incident Response System**: Triggers incident workflows for Critical alerts - **Notification System**: Sends appropriate notifications per SLA - **Reporting System**: Generates historical triage reports - **Team Communication**: Posts summaries to Slack/Teams channels