pir

安装量: 58
排名: #12893

安装

npx skills add https://github.com/delexw/claude-code-misc --skill pir

Post Incident Record (PIR) Discover issues from PagerDuty, Datadog, Cloudflare, and Rollbar concurrently, auto-determine severity, and produce completed PIR forms for each issue. Arguments $ARGUMENTS[0] — What to investigate (e.g. "incidents last 24h" , "errors yesterday" , "outage last 1h" , "incidents 2026-03-01 to 2026-03-05" ). Passed directly to each sub-skill. Defaults to "incidents today" . $ARGUMENTS[1] — (optional) Comma-separated local repo paths for codebase root cause analysis (e.g. ~/repos/frontend,~/repos/backend ). $ARGUMENTS[2] — (optional) Cloudflare domain and zone ID in domain:zone_id format (e.g. example.com:abc123def456 ). Passed to the cloudflare-traffic-investigator skill. If not provided, the cloudflare skill will ask the user. PIR Form Fields Each PIR maps to these fields — see PIR Form Fields for format, examples, and output template: Field Required Source Impact Summary Yes Synthesised from all skills What Yes PagerDuty incident + Datadog + Cloudflare Who Yes Datadog (RUM/error tracking) + Cloudflare (user counts) Culprit Yes Cloudflare (JA4, traffic sources) + Datadog (error traces) + Rollbar (stack traces, error-deploy correlation) + PagerDuty (trigger details) + Codebase analysis (culprit commits) Incident date Yes Earliest detection across all sources (PagerDuty, Datadog, Cloudflare) When Yes PagerDuty created/resolved + Datadog timeline Remediation Optional PagerDuty notes + Datadog monitors Incident controller Optional PagerDuty escalation policy responders Severity Auto-Classification Determine severity from the collected data — do NOT ask the user: Severity Criteria SEV1 Service outage or >50% error rate on critical path; cascading failures; >30 min duration SEV2 Partial degradation; 10-50% error rate; single service affected; 10-30 min duration SEV3 Minor impact; <10% error rate; brief spike (<10 min); limited user impact Use the highest applicable severity when multiple criteria match. Execution Step 1: Prepare See step1-gather-date-range.md — If $ARGUMENTS[0] is empty, ask the user what to investigate. Otherwise proceed directly. Step 2: Discover — PagerDuty, Datadog, Cloudflare, Rollbar Run all four in parallel (each sub-skill uses context: fork for isolation): 2a. PagerDuty — Incidents See step2a-discover-incidents.md — Invokes Skill("pagerduty-oncall") . 2b. Datadog — Observability Data See step2b-discover-datadog.md — Invokes Skill("datadog-analyser") . 2c. Cloudflare — Traffic Analysis See step2c-discover-cloudflare.md — Invokes Skill("cloudflare-traffic-investigator") . Passes domain and zone ID from $ARGUMENTS[2] if provided. 2d. Rollbar — Error Tracking See step2d-discover-rollbar.md — Invokes Skill("rollbar-reader") . Step 3: Build Dynamic Skill See step3-build-skill.md — Creates a dynamic skill at ~/.claude/skills/pir-{slug}/ that contains all instructions for codebase analysis (conditional), PIR synthesis, and saving results. Discovery output files from Step 2 are referenced as lazy-loaded context. Step 4: Run Dynamic Skill See step4-run-skill.md — Invokes the dynamic skill. After completion, deletes the dynamic skill directory.

返回排行榜