Skip to content

AI Assistant Tools Reference

The AI assistant uses 44 structured tools to retrieve live data from the Console rather than generating answers from conversation context alone. Each tool maps to a specific data source: ClickHouse events, the PostgreSQL fleet database, or the Console API layer. When you ask a question, the assistant selects the appropriate tools, executes them, and assembles the results into an answer.

This page lists all 44 tools grouped by area, what each one returns, and example prompts that trigger it.


How tools work

Tool calls are visible in the assistant's reasoning output. Each call includes the tool name and parameters. Results are shown before the assistant composes its final answer, so you can verify what data was retrieved.

The assistant will not use a tool it does not need. Asking a narrow question about one sensor does not cause the assistant to fetch fleet-wide data.


Fleet and sensor health

#ToolWhat it returnsExample prompt
1get_sensor_eventsRuntime events from ClickHouse for a sensor (filterable by kind, severity, time window)Show me the last 10 critical events on sensor upf-prod-01
2get_sensor_detailSensor identity, health state, role, tags, last heartbeat, and enrollment statusTell me about sensor upf-prod-01
10get_fleet_summaryFleet health overview: sensor counts by state, alert counts, overall postureHow many sensors are unhealthy right now?
13get_sensor_trustCertificate trust status, expiry, renewal state, and trust alerts for a sensorIs the certificate on this sensor due for renewal?
32get_resource_metricsSensor CPU, memory, and resource usageHow is resource usage on this O-DU node?
40get_groupsSensor group membershipsWhich group is this sensor in?

Events and activity

#ToolWhat it returnsExample prompt
1get_sensor_eventsRuntime events from ClickHouse, with filters for event kind, severity, process, timeShow process exec events from the last hour
12search_eventsFull-text event search across all sensorsSearch for events mentioning /tmp/backdoor
33get_active_flowsActive TCP flow records with process attributionWhat connections is this process making?
34get_dns_eventsDNS query and resolution eventsWhat domains did this process resolve?
35get_privilege_eventsUID and capability change eventsShow privilege changes on this AMF node today
36get_namespace_eventsLinux namespace creation eventsWere any user namespaces created recently?
25get_shell_sessionsSSH and interactive shell session recordsWere there any interactive shell sessions on this node?
5get_process_treeReconstructed process ancestry for a specific event or processWhat spawned this suspicious binary?

Alerts and investigations

#ToolWhat it returnsExample prompt
3get_alert_detailFull alert context including event kind, sensor, process, MITRE mapping, and linked eventsExplain this critical alert
4get_investigationInvestigation timeline, notes, evidence links, and case statusSummarize the current investigation
11get_attack_chainsActive or recent correlated attack chain eventsAre any multi-stage attacks active?
27get_investigationsList of investigations, filterable by status or sensorShow open investigations on telecom nodes
28create_investigationCreates a new investigation caseCreate an investigation for this alert
29add_events_to_investigationLinks specific runtime events to an existing investigationAdd these events to the current case

Behavioral analytics and anomalies

#ToolWhat it returnsExample prompt
7get_anomaly_scoresBehavioral anomaly scores with contributing factorsWhat is the anomaly score on this UPF?
8get_baselinesProcess and network behavioral baselines for a sensorWhat is the baseline for this binary?
42get_entity_profileDetailed process or binary behavioral profileProfile this binary before I write an enforcement rule
44get_correlationCross-sensor event correlation for a pattern or behaviorDoes this behavior appear on other sensors?

Integrity and security signals

#ToolWhat it returnsExample prompt
30get_fim_alertsFile integrity monitoring hash mismatch alertsWere any binaries modified on this node?
31get_kernel_guardKernel integrity check resultsIs the kernel intact on this sensor?

Runtime controls and policy

#ToolWhat it returnsExample prompt
14get_enforcement_stateCurrent enforcement policies and their active stateWhat is being enforced on this sensor?
15get_policy_packsAssigned policy pack info including ID, version, and enforcement stateWhich pack is assigned to this gNB node?
37get_custom_rulesCustom tracing policies and their targetsWhat custom rules are active on UPF nodes?
38get_suppression_rulesAlert suppression rules with scope and reasonWhat suppressions apply to this site?
39get_admission_rulesKubernetes admission control rulesWhich admission rules apply to this cluster?
43get_coverage_reportDetection coverage summary for active packs and rulesWhat detections cover these NF roles?

Compliance

#ToolWhat it returnsExample prompt
9get_compliance_statusCompliance report snapshot with passing, failing, and partial controlsWhat is our WG11 compliance posture?
41get_license_statusCurrent license state: plan, node count, validity, grace periodIs the license up to date?

Kubernetes and network

#ToolWhat it returnsExample prompt
17get_kubernetes_podsPod inventory with restart state, node placement, and security postureWhich pods restarted during the outage?
6get_network_connectionsActive network connections for a sensor with process attributionShow connections from this SMF process

SBOM and vulnerabilities

#ToolWhat it returnsExample prompt
16get_sbomSBOM scan results for a sensor or container imageAre there critical CVEs in this UPF image?

Telecom

#ToolWhat it returnsExample prompt
18get_telco_nf_inventory5G NF detection results: detected roles, confidence scores, evidenceWhich NFs were detected on this sensor?
19get_ngap_kpisNGAP procedure KPIs from ngap_kpi_historyDid the NGAP failure rate spike after maintenance?
20get_pfcp_sessionsPFCP session state: count, latency, anomaliesHow many active PFCP sessions does this UPF have?
21get_gtpu_tunnelsGTP-U tunnel inventory: TEID count, anomalies, visibility gapAre there any GTP-U tunnel anomalies?
22get_oran_statusO-RAN interface status: E2, O1, O2, xApp peer stateWhat is the E2 interface status on this Near-RT RIC?
23get_slo_metricsNF SLO data: availability, MTTR, breach statusIs the AMF meeting its 5-nines SLO?
24get_tls_inventoryTLS session inventory: coverage classification per NF and interfaceAre SBI interfaces using TLS on all core nodes?

Audit and diagnostics

#ToolWhat it returnsExample prompt
26get_audit_logConsole audit log entries filterable by actor, action, or timeWho changed enforcement on this sensor?

Complete tool list

The following is the authoritative ordered list of all 44 tools from ai_chat.rs:

#Tool nameDescription
1get_sensor_eventsQuery ClickHouse for sensor events
2get_sensor_detailFetch sensor info from fleet
3get_alert_detailFetch alert context
4get_investigationFetch investigation data
5get_process_treeReconstruct process ancestry
6get_network_connectionsActive connections for a sensor
7get_anomaly_scoresBehavioral anomaly context
8get_baselinesProcess and network baselines
9get_compliance_statusCompliance report snapshot
10get_fleet_summaryFleet health overview
11get_attack_chainsCorrelated attack chain events
12search_eventsFull-text event search
13get_sensor_trustCertificate trust status
14get_enforcement_stateCurrent enforcement policies
15get_policy_packsAssigned pack info
16get_sbomSBOM for a sensor or image
17get_kubernetes_podsPod inventory
18get_telco_nf_inventory5G NF detection results
19get_ngap_kpisNGAP procedure KPIs
20get_pfcp_sessionsPFCP session state
21get_gtpu_tunnelsGTP-U tunnel inventory
22get_oran_statusO-RAN interface status
23get_slo_metricsNF SLO data
24get_tls_inventoryTLS session inventory
25get_shell_sessionsSSH and shell session records
26get_audit_logConsole audit log
27get_investigationsList investigations
28create_investigationCreate new investigation
29add_events_to_investigationLink events to a case
30get_fim_alertsFIM hash mismatch alerts
31get_kernel_guardKernel integrity status
32get_resource_metricsSensor resource usage
33get_active_flowsTCP flow records
34get_dns_eventsDNS query and resolution events
35get_privilege_eventsUID and capability change events
36get_namespace_eventsNamespace creation events
37get_custom_rulesCustom tracing policies
38get_suppression_rulesAlert suppression list
39get_admission_rulesKubernetes admission control rules
40get_groupsSensor group memberships
41get_license_statusCurrent license state
42get_entity_profileProcess or binary behavioral profile
43get_coverage_reportDetection coverage summary
44get_correlationCross-sensor event correlation

Using the AI assistant

In the Console, open the AI Assistant chat panel (the chat icon in the navigation bar) and type your question. Example:

In the Console, open the AI Assistant chat and type: What is the anomaly score on sensor upf-prod-01?

The assistant selects the relevant tools, fetches live data from the Console, and composes its answer. Tool calls and their results are visible in the reasoning output before the final answer.


Further reading

Released under the Telovix Commercial License.