Use this file to discover all available pages before exploring further.
CloudThinker uses a natural language interface enhanced with structured syntax. This guide is the definitive reference for communicating effectively with agents.
Running cloud operations traditionally requires knowing the right commands for the right tool — aws ec2 describe-instances --filters "Name=instance-state-name,Values=running" to list running EC2 instances, kubectl get pods --all-namespaces --field-selector=status.phase=Pending for pending pods, gcloud compute instances list --filter="status=RUNNING" for GCP VMs. Each tool has different syntax, different output formats, and different ways of expressing the same concept.This means:
Only specialists can run operations — developers and non-engineers are locked out
Context is lost between tools — you can’t ask a question that spans AWS + K8s in one command
Automation requires scripting expertise — connecting data from multiple tools means writing Python or bash
CloudThinker Language solves this with a unified syntax that works identically across all agents and all connected systems.
@alex analyze EC2 spending trends over the last quarter@oliver audit all S3 buckets for public access@tony identify queries with execution time >2 seconds@kai check pod resource utilization in production namespace
Creates interactive visualizations for monitoring and presentation.
# Cost dashboards@alex #dashboard AWS spending by service and region@alex #dashboard monthly cost trends with forecast# Performance dashboards@tony #dashboard query latency P50/P95/P99 over time@kai #dashboard cluster resource utilization by node# Security dashboards@oliver #dashboard compliance status across frameworks@oliver #dashboard security findings by severity
Generates comprehensive analysis documents with findings and recommendations.
# Compliance reports@oliver #report SOC 2 Type II assessment with evidence@oliver #report GDPR data processing audit# Optimization reports@alex #report quarterly cost optimization summary@tony #report database performance analysis with recommendations# Executive reports@anna #report infrastructure health for board presentation
Produces prioritized, actionable recommendations with implementation steps.
# Cost recommendations@alex #recommend reserved instance purchases based on usage@alex #recommend resources for right-sizing or termination# Performance recommendations@tony #recommend index changes for slow queries@kai #recommend HPA policies for variable workloads# Security recommendations@oliver #recommend security group rule changes
Configures monitoring alerts for proactive notification.
# Cost alerts@alex #alert when daily spend exceeds $5,000@alex #alert on resources with >50% cost increase week-over-week# Performance alerts@tony #alert when query P95 latency exceeds 500ms@kai #alert on pod OOMKilled events or node pressure# Security alerts@oliver #alert on security group changes allowing 0.0.0.0/0@oliver #alert on failed login attempts >10 per minute
@alex analyze spending over the last 30 days@alex compare costs: last month vs same period last year@tony identify slow queries from the past week@oliver find security group changes in the last 24 hours
@alex identify instances with CPU utilization <15%@tony find queries with execution time >2 seconds@kai flag pods requesting >2GB memory but using <500MB@oliver find IAM roles with >50 attached policies
@alex analyze EC2 instances in us-east-1 with CPU <20% over last 30 days excluding production-critical #recommend right-sizing with projected savings@oliver audit security groups in production for public access on ports 22, 3389, 3306 #report with remediation timeline prioritizing internet-facing resources
@alex analyze EC2 spending by instance family over last quarter@tony analyze query patterns on production PostgreSQL cluster@kai analyze pod scheduling efficiency across all nodes@oliver analyze IAM permission usage for service accounts
@oliver audit S3 buckets for public access and encryption@oliver audit IAM policies for privilege escalation paths@alex audit infrastructure for unused or orphaned resources@kai audit RBAC configuration against least-privilege principles
@alex recommend cost optimizations maintaining 99.9% availability@tony recommend index changes for queries >500ms execution time@kai optimize pod resource requests based on actual utilization
@alex investigate cost spike on database services last week@tony investigate slow query performance on orders table@kai investigate pod crash loops in payment namespace@oliver investigate failed authentication attempts from unusual IPs
# Step 1: Broad overview@alex #dashboard cloud spending trends# Step 2: Identify problem area@alex which services drove the November cost spike?# Step 3: Deep dive@alex break down RDS costs by instance type and utilization# Step 4: Actionable recommendation@alex #recommend RDS optimization prioritizing underutilized instances
@alex compare reserved instances vs savings plans for our EC2 usage pattern@tony compare these approaches for database scaling: 1. Read replicas 2. Sharding by customer_id 3. Migration to Aurora Serverless Include: cost, complexity, performance impact@oliver compare SOC 2 vs ISO 27001 based on our customer requirements
@alex #recommend instance right-sizing where: - CPU utilization <20% for >14 days - Not tagged as burst-capable - Not in auto-scaling groups - Savings >$50/month@oliver prioritize security findings: - Critical: internet-exposed + known CVE - High: production + public access - Medium: everything else
@CloudThinker alex what's our AWS spending this week?@CloudThinker oliver any critical security findings?@CloudThinker tony why are queries slow on production?@CloudThinker kai check EKS cluster health
All syntax works identically in Slack—just add the @CloudThinker prefix.