Alert Investigate
Diagnose why a SigNoz alert fired. The skill correlates the alert's own
signal with neighbor signals around the fire window, and surfaces a
ranked list of likely causes with supporting evidence. It is the
companion to
— explain decodes the rule
statically; investigate diagnoses a specific incident.
Prerequisites
This skill calls SigNoz MCP server tools heavily (
,
signoz:signoz_get_alert_history
,
signoz:signoz_execute_builder_query
,
signoz:signoz_query_metrics
,
signoz:signoz_search_traces
,
signoz:signoz_search_logs
,
signoz:signoz_get_trace_details
, etc.). Before running the workflow,
confirm the
tools are available. If they are not, the
SigNoz MCP server is not installed or configured — stop and direct
the user to set it up:
https://signoz.io/docs/ai/signoz-mcp-server/.
The investigation depends on correlating multiple MCP queries; without
the server there is no way to ground the analysis.
When to use
Use this skill when the user wants to:
- Understand why a specific alert fired.
- Find the root cause of a recent incident triggered by an alert.
- Correlate the alert's signal with related metrics, traces, and logs.
- Distinguish "real signal" fires from flapping or threshold-mistuning.
Do NOT use when the user wants to:
- Understand what an alert is configured to monitor → .
- Create a new alert → .
- Modify an alert (raise threshold, add hysteresis) → call
signoz:signoz_update_alert
directly.
- Run a free-form ad-hoc investigation without an alert as the anchor →
signoz-generating-queries
.
Required inputs
| Input | Required | Source if missing |
|---|
| Alert identifier (rule ID or name) | yes | or recent context |
| Time window | no | default to most recent fire from signoz:signoz_get_alert_history
|
If the alert name is fuzzy, this skill is best-effort (read-only):
- Call
signoz:signoz_list_alert_rules
, paginate, fuzzy-match the name.
- State the interpretation: "Investigating fire of 'High Error Rate —
Checkout' (id 42) at 14:32 UTC. If you meant a different alert or
fire, tell me."
- Proceed.
If the alert has never fired in the lookback window, stop: there is
nothing to investigate. Respond with:
"Alert '[name]' has not fired in the last 7d, so there is no fire
window to investigate. Use
to walk through
the rule, or check whether the alert is enabled."
Workflow
The investigation runs in three tiers with strict early-stop gates.
Tier 1 always runs. Tier 2 runs only if tier 1 confirms a real fire.
Tier 3 runs only if tier 2 surfaces correlated anomalies. Skipping the
gates produces hundreds of unnecessary trace/log queries on quiet
alerts.
Step 1: Resolve alert + fire window (Tier 0)
- Resolve the alert id via
signoz:signoz_list_alert_rules
(paginated) if
not given.
- Call for the full rule config — needed to know
what query, threshold, and resource scope the alert evaluated.
- Call
signoz:signoz_get_alert_history
with a 7d lookback. From the
response:
- Pick the fire window. Default to the most recent fire. If the
user passed an explicit time window via , honor it.
- Note the fire pattern:
- → single fire with a long quiet period before/after.
- → fires that stayed firing for ≥ 1 evaluation cycle.
- → ≥ 3 fires within a 1h window, alternating fire/resolve.
- → fires at regular intervals (cron-like, e.g., every hour).
- The pattern tells you what to expect from tiers 2/3.
Step 2: Tier 1 — what fired and how hard
This tier always runs. It establishes the fire is real (vs. transient
threshold tickle or flap) and quantifies the magnitude.
- Re-run the alert's primary query over a window centered on the fire
start:
[fire_start - 30m, fire_start + 30m]
.
- Use
signoz:signoz_execute_builder_query
for builder/formula alerts.
- Use
signoz:signoz_query_metrics
for PromQL alerts.
- Compute:
- Peak value during the fire window.
- Threshold breach magnitude:
(peak - threshold) / threshold * 100
for "above" alerts, inverted for "below".
- Fire duration: how long the breach lasted.
- Pre-fire baseline: average value in the 30m before fire start.
- Early-stop gate: if the breach magnitude is < 10% over the
threshold AND the fire duration is < 1 evaluation window, classify
as "marginal fire" — the alert may be too sensitive. Skip tiers 2
and 3 and go to Step 5 with a single hypothesis: "threshold may be
too tight, recommend tuning."
Step 3: Tier 2 — neighbor signals vs baseline
Run only if Tier 1 confirms a real breach. Pull related signals for the
same resource scope as the alert and compare the fire window to a
baseline window.
-
Pick a baseline window. Use the same hour, previous day
(
fire_start - 24h, fire_start - 24h + fire_duration
). If the
alert fired during a known-anomalous time (deploy, weekly job),
note it in the output but still proceed.
-
Look up neighbor signals for the alert's resource type. See
references/neighbor-signals.md
for the lookup table. Common cases:
- Service-level alert (): pull error rate,
p95/p99 latency, request throughput, dependency error rates if
trace data is available.
- Host / VM alert (): CPU, memory, disk I/O,
network I/O.
- K8s pod / namespace alert: pod restarts, container CPU/memory
limits, node pressure, recent rollouts.
-
For each neighbor signal:
- Query both windows (fire + baseline) via
signoz:signoz_execute_builder_query
or signoz:signoz_query_metrics
.
- Compute the delta (% change in fire window vs baseline).
- Rank by absolute delta.
-
Early-stop gate: if no neighbor signal shows ≥ 25% deviation
from baseline, classify as "isolated fire — the alert's own signal
moved but nothing else did." This is unusual and worth surfacing.
Skip Tier 3 and go to Step 5 with hypotheses focused on the alert's
own query (likely causes: data source change, instrumentation
change, downstream silent failure that only shows in this metric).
Step 4: Tier 3 — traces and logs at the fire window
Run only if Tier 2 found correlated neighbor anomalies. Drill into
specific failing operations.
-
Traces (if the alert is service-scoped and traces are
available):
- Call
signoz:signoz_search_traces
for the fire window with filter:
AND . Cap at top 20.
- Group results by (operation) and . Surface
the top 3 by frequency with a representative trace ID for each.
- Optionally call
signoz:signoz_get_trace_details
on one representative
to extract specific span attributes (DB statement, downstream URL,
status code).
-
Logs for the fire window:
- Call
signoz:signoz_search_logs
with filter:
AND severity_text IN ('ERROR', 'FATAL')
. Cap
at top 20 most recent.
- Group by pattern (or if present). Surface
the top 3 distinct messages with counts.
-
Cross-reference: do the traces and logs point at the same
downstream service, dependency, or code path? If so, that becomes
the leading hypothesis.
See
references/baseline-comparison.md
for query templates that pair
fire-window and baseline-window calls cleanly.
Step 5: Build the structured output
Use this exact section order. Lead with a TL;DR — engineers under
pressure scan the top first and stop reading once they have what
they need. Compression plus proof: every claim cites the MCP query
that produced it; no generic "check logs / verify connectivity"
filler.
1. TL;DR — one or two sentences, no more. Leading hypothesis,
overall confidence, blast radius, and the single most useful next
action. Example:
"checkoutservice error rate hit 12.4% (threshold 5%) for 8m at
14:32 UTC — most likely cause is payments-api timing out
(high confidence). Open trace
to see the failing call."
If no hypothesis reaches medium confidence, the leading line is
"No clear root cause found." rather than a low-confidence guess
dressed up as the answer.
2. What fired
The alert (id, name), the fire window (absolute UTC + relative),
peak magnitude ("error rate hit 12.4% vs. 5% threshold — 148% over"),
fire duration, and the fire pattern (
/
/
/
/
).
3. Investigation trail
A scannable list of what was checked, with ✅ for confirmed signals
and ❌ for ruled out, each followed by a one-line finding. The point
is that the reader can see what work the AI did and what it found —
this is where trust is earned. Example:
- ✅ Tier 1 — peak error rate 12.4%, fire was real (not marginal).
- ✅ Tier 2 — payments error rate +8900%, p99 +1180%; downstream
cascade.
- ❌ CPU / memory pressure — flat through the fire window.
- ✅ Tier 3 — 30 error traces all hit payments-api, same message.
4. Likely causes (ranked, max 3)
Each cause has three parts:
- Hypothesis — one sentence, specific. Bad: "service is unhealthy".
Good: "checkout is timing out on calls to payments-api".
- Evidence — the supporting numbers from tiers 1/2/3, with the
underlying query inline so the user can re-run it. State the
neighbor signal, the delta vs baseline, the trace/log pattern that
supports it.
- Confidence — requires ≥2 of: temporal precedence,
topology / dependency edge, shared service or entity, correlated
metric/log/trace evidence, recent deploy or config change.
is one tier's evidence with at least one of those
signals. is a single signal moved with no corroboration —
in that case label it a "co-occurring signal," not a cause.
If only Tier 1 ran (marginal fire / no neighbor anomalies), output
fewer hypotheses with
confidence and explicitly call out the
limitation.
5. Ruled out
Short but explicit. List candidates the evidence eliminated and the
one-line reason why. Skip the section if there's nothing meaningful
to rule out — but if you considered something and dropped it, say so
here so the user doesn't waste time re-checking it.
6. Suggested next steps
Action items the user can take. Be concrete and use SigNoz-native
handles so the user can act immediately:
- Specific trace, dashboard, or alert to open
(e.g., "open trace in the SigNoz UI").
- Specific query to run with
signoz-generating-queries
— paste
the exact filter and time window.
- "Tune this alert" if the fire was marginal — name the field
(, , ) and the change to make
via
signoz:signoz_update_alert
.
- "Open an incident" or "page the owning team" if the cause is
cross-service.
Do not pad with generic advice ("verify connectivity", "check
dashboards") — that's noise during an active incident.
Mirroring as navigation chips. Mirror up to 3 of these "Suggested
next steps" as host follow-up intents — the most actionable,
alert-scoped ones. Keep the rest in the report prose so the user has
the full picture. The chip surface is capped; the prose is not.
Out of scope (v1)
- Deployment / config-change correlation — SigNoz MCP does not
expose a deployments tool; do not fabricate one. If the user
mentions a recent deploy, surface it as context but don't claim it
caused the fire without the signal evidence.
- Cross-service blast-radius walking — investigating downstream
callers of the alert's service. Out of scope to keep context
bounded.
- Long-horizon historical baselines — Tier 2 compares to one
prior-day window, not to weekly/monthly seasonality. If the user
says "is this normal for a Friday afternoon", suggest an anomaly
alert ( with ).
Guardrails
- Three-tier early-stop is mandatory. Skipping the gates pulls
hundreds of traces/logs on quiet alerts and explodes context. The
gates are not optional optimizations.
- Anchor every claim to an MCP query result. No speculation. If
evidence is missing, lower confidence and say so.
- Show the supporting query with each hypothesis so the user can
reproduce and dig deeper.
- Compression plus proof. TL;DR is one or two sentences max; the
full report is a triage card, not a postmortem. Engineers under
pressure should be able to skim the top and act. Every section
earns its place by adding evidence the user couldn't already see
in the alert payload.
- Correlation ≠ causation. Label something a cause only when at
least two of the following converge: temporal precedence (signal
moved before symptom), topology / dependency edge, shared service
or entity, correlated metric/log/trace evidence, or a recent
deploy/config change. A single time-aligned anomaly is a
"co-occurring signal," not a cause — say so explicitly.
- Don't restate the alert or recommend the obvious. "Check
logs", "verify connectivity", "investigate dashboards" — the
reader of this output already knows they need to. Replace generic
suggestions with specific queries, traces, or filters they can run
immediately.
- No fabricated identifiers. Trace IDs, span names, alert rule
IDs, channel names, deploy IDs — every identifier in the output
must come from a real MCP response. Don't invent placeholders that
look plausible.
- Honest uncertainty wins. If no hypothesis reaches medium
confidence, the answer is "No clear root cause found — here's
what we checked and what's ruled out." Do not promote a
low-confidence guess to the leading hypothesis just to sound
useful. False positives waste active incident time more than false
negatives.
- Prefer resource-attribute filters in every drill-down query.
This is the SigNoz MCP guideline and it directly affects query
speed at scale.
- Do not modify any alert. Investigate is read-only. If the user
says "and tighten this alert", surface that as a next-step
recommendation; do not call
signoz:signoz_update_alert
.
- Stay in scope. Static rule explanation belongs to
. Cause analysis without an alert anchor
belongs to
signoz-generating-queries
.
- Time zones. Always state fire windows in UTC alongside relative
time ("14:32 UTC, 2h ago") so autonomous and interactive consumers
agree on the window.
Examples
User: "Why did the checkout error rate alert fire?"
Agent:
-
Resolves alert: "High Error Rate — Checkout" (id 42).
-
signoz:signoz_get_alert_history
→ most recent fire 2h ago at 14:32 UTC,
sustained for 8m, single fire (not flapping).
-
Tier 1: re-runs error-rate formula over
. Peak
error rate 12.4% (vs 5% threshold — 148% over). Pre-fire baseline
0.3%. Real fire, not marginal.
-
Tier 2: pulls neighbor signals for
:
- p99 latency: 4.1s vs 320ms baseline (+1180%).
- Throughput: -42% (drop).
- Downstream error rate: 18% vs 0.2% baseline (+8900%).
- CPU/memory: flat (no resource pressure).
-
Tier 3: traces for
service.name = checkout, hasError = true
in the fire window — top operation
, top
error message "context deadline exceeded calling payments-api".
30 traces, all hitting the same downstream URL. Logs show
matching "payments client timeout" lines, 142 occurrences.
-
Output:
TL;DR: checkoutservice error rate hit 12.4% (threshold 5%)
for 8m at 14:32 UTC. Most likely cause: payments-api timing out
(high confidence — converging trace + log + neighbor evidence).
Open trace
to see the failing call.
- What fired: alert 42 fired 2h ago at 14:32 UTC, sustained
8m. Error rate peaked at 12.4% (148% over threshold).
- Investigation trail:
- ✅ Tier 1 — peak 12.4% vs 5% threshold, pre-fire baseline 0.3%.
Real fire.
- ✅ Tier 2 — payments error rate +8900%, p99 latency +1180%,
throughput −42%.
- ❌ CPU / memory pressure on checkout — flat.
- ✅ Tier 3 — 30 error traces all hit payments-api with
context deadline exceeded
; 142 matching timeout logs.
- Likely causes (high confidence): payments service errors
cascading into checkout. Evidence converges across topology
(checkout → payments edge), temporal precedence (payments
errors lead checkout p99), and shared entity (every error
trace targets the payments-api URL).
- Ruled out: checkout-side resource pressure (CPU/memory
flat); upstream traffic spike (throughput dropped, didn't
spike).
- Next steps: open trace in the SigNoz UI; if
payments has its own alert, run on
it, otherwise
signoz-generating-queries
for payments error
rate over the last 4h.
User: "Investigate the flapping CPU alert on prod-api-3"
Agent:
-
Resolves alert (id 88, host.name = prod-api-3).
-
History: 7 fires in last 1h, alternating fire/resolve every 8-12
minutes — flapping pattern.
-
Tier 1: peak 84% (threshold 80%, only 5% over). Each fire
lasted 2-4 minutes. Marginal — the value hovered near threshold.
matchType = at_least_once
made each blip trigger.
-
Early-stop kicks in. Skip tiers 2/3.
-
Output:
TL;DR: alert 88 has been flapping on
— 7 fires
in the last 1h, each 2–4m, all within 5% of the 80% threshold.
No clear root cause; this is threshold tuning, not an incident.
Switch
to
or add hysteresis to stop
the noise.
- What fired: alert 88, host , fire pattern
. 7 fires in the last 1h, each 2–4m. Peak 84% (5%
over the 80% threshold).
- Investigation trail:
- ✅ Tier 1 — every fire was within 5% of threshold; duration
short; baseline already at 70–75%. Marginal fire — early-stop
triggered, Tier 2/3 skipped.
- Likely causes (low / co-occurring signal only): threshold
tuned too tight or is too sensitive. Evidence:
every fire was within 5% of threshold; baseline already runs
at 70–75%. Not promoted to a "cause" — single signal, no
corroboration.
- Ruled out: real CPU saturation incident (peaks too small
and short-lived; baseline already near threshold).
- Next steps: change to (smooths
transient spikes) OR raise threshold to 85% with hysteresis
(). Use
signoz:signoz_update_alert
to apply.
User: "RCA for the log volume alert that fired last night"
Agent:
-
Resolves alert: "Error Log Volume Spike" (id 14, no service
filter — groupBy
).
-
History: fired at 03:12 UTC, sustained 22m, broke down by service
in the alert annotations:
was the
firing series.
-
Tier 1: re-runs log count for inventory in fire window. Peak
3,400 errors/min vs 1,000/min threshold (240% over). Pre-fire
baseline 12/min. Real, large fire.
-
Tier 2: neighbor signals for
:
- Request error rate: +600%.
- p99 latency: +30% (mild).
- CPU: -80% (collapsed). Memory: -60%.
- Pod restarts (k8s): 4 in fire window.
-
Tier 3: logs for inventory in fire window. Top message: "OOMKilled
restarting" (1,200 occurrences). Top trace error: graceful-shutdown
exceptions.
-
Output:
TL;DR: log volume alert 14 fired at 03:12 UTC for
, sustained 22m at 240% over threshold.
Most likely cause: inventory pods OOM-killed and restarted 4
times (high confidence). Check container memory limits for the
inventory deployment.
- What fired: alert 14 fired at 03:12 UTC for service
, sustained 22m, 240% over threshold.
- Investigation trail:
- ✅ Tier 1 — peak 3,400 errors/min vs 1,000/min threshold;
pre-fire baseline 12/min. Real fire.
- ✅ Tier 2 — request error rate +600%; CPU/memory collapsed
(−80%/−60%); 4 pod restarts in window.
- ❌ p99 latency — only +30%, not a latency-driven incident.
- ✅ Tier 3 — top log message "OOMKilled restarting" (1,200
occurrences); top trace error: graceful-shutdown exceptions.
- Likely causes (high confidence): inventory pods OOM-killed
and restarted 4 times during the window. Evidence converges
across topology (single service), temporal precedence (memory
fell to zero before error spike), shared entity (all log lines
from ), and a single coherent
pattern (OOM → restart → graceful-shutdown noise).
- Ruled out: a true application error-rate change (errors
are restart noise, not request-path failures); upstream
traffic surge (throughput unchanged).
- Next steps: check container memory limits for inventory
pods; review recent deploys; consider whether the alert should
exclude restart-related error patterns or whether the
underlying OOM is the real concern.
Additional resources
references/neighbor-signals.md
— lookup table mapping resource type
(service / host / k8s) to the neighbor signals to pull in Tier 2.
references/baseline-comparison.md
— query templates that pair
fire-window and baseline-window calls cleanly, including how to
format signoz:signoz_execute_builder_query
for both.
- skill — to decode the rule before
investigating, if the user is unfamiliar with what the alert
monitors.
signoz-generating-queries
skill — for ad-hoc follow-up queries on the same
resource scope.