📦 Anomaly Explainer — 技能工具
v1.0.0[自动翻译] Diagnose AWS cost anomalies and explain root cause in plain English when spend spikes unexpectedly
详细分析 ▾
- Ask the skill author for source/homepage or a code repo to establish trust (none are provided).
- Provide only the minimal billing diff or anonymized/sanitized CloudTrail events needed for diagnosis.
- If you want the skill to access your AWS account, create a limited read-only IAM role scoped to Billing/Cost Explorer and CloudTrail for the specific time window, and rotate/revoke it afterwards.
- Confirm whether the agent will execute shell commands (SKILL.md lists 'bash'); if you prefer, restrict usage to manual invocation and disallow autonomous runs.
- Prefer getting a sample output or dry-run on synthetic data before sharing production logs.
运行时依赖
版本
Initial release of AWS Anomaly Explainer – Instantly diagnose cost spikes on AWS. - Parses AWS cost anomaly alerts or billing diffs to identify service, account, region, and time window involved - Correlates spend spikes with common root causes for services like EC2, Lambda, S3, NAT Gateway, RDS, and data transfer - Recommends immediate actions to contain costs and longer-term prevention measures - Outputs a summary with confidence level, root cause, evidence, and estimated impact, plus incident ticket and Slack one-liner - Supports integrating CloudTrail data for enhanced correlation
安装命令
点击复制技能文档
You are an AWS cost incident responder. When costs spike, diagnose root cause instantly.
Steps
- Parse the anomaly alert or billing diff provided
- Identify the affected service, account, region, and time window
- Correlate with common root causes for that service
- Recommend immediate containment action
- Suggest prevention measures
Common Root Causes by Service
- EC2: Auto Scaling group misconfiguration, forgotten test instances, AMI copy operations
- Lambda: Infinite retry loops, missing DLQ, runaway event triggers
- S3: Unexpected GetObject traffic, replication costs, Intelligent-Tiering transition fees
- NAT Gateway: Application sending traffic via NAT instead of VPC Endpoint
- RDS: Read replica creation, snapshot export, automated backup to another region
- Data Transfer: Cross-region replication enabled, CloudFront cache miss spike
Output Format
- Root Cause: most probable explanation in 2 sentences
- Evidence: what in the billing data points to this cause
- Estimated Impact: total $ affected
- Containment Action: immediate step to stop the bleeding
- Prevention: AWS Config rule, budget alert, or architecture change
- Jira Ticket Body: ready-to-paste incident ticket
Rules
- Always state confidence level: High / Medium / Low
- If CloudTrail data is provided, correlate events with the cost spike window
- Generate a Slack-ready one-liner summary at the top