Overview
The assistant uses tools to search logs, create artifacts, manage alerts, and connect to external services.
Tools are how the assistant interacts with your data and systems. When you ask a question, the assistant determines which tools it needs and calls them to gather information and take actions.
How tools work
The assistant has access to a set of tools, each designed for a specific purpose. When you ask a question like "Why are we seeing elevated error rates?", the assistant might:
- Use the log search tool to find recent error logs
- Use the artifact tool to create a chart showing error trends
- Use the alert tool to check for related active alerts
You see each tool call as it happens, including the parameters the assistant used and the results it received. This transparency lets you understand the investigation process and verify the assistant's findings.
Available tool categories
Log Search
Search, filter, and analyze logs from your data sources and backends.
Artifacts
Generate charts, tables, and code outputs to visualize findings.
Alerts
Create, query, and manage alerts based on investigation findings.
Integrations
Access external services through MCP connectors like Linear, Slack, and Datadog.
Tool visibility
Every tool call appears in the conversation with:
- Tool name: Which tool the assistant called
- Parameters: The inputs the assistant provided
- Results: What the tool returned
You can expand any tool call to see the full details. If the assistant searches logs, you see the exact query it ran. If it creates a chart, you see the underlying data.
Tool calls are part of the thread history. When you share a thread with a teammate, they see all the tool calls and can verify the investigation themselves.
Tool permissions
Some tools require specific permissions or configurations:
- MCP tools require the corresponding connector to be installed
- Alert tools respect your role permissions
- Status page tools require status components to be configured
If the assistant tries to use a tool you do not have access to, it will explain what permission is needed and suggest alternatives.