Skip to main content

Prompt

CloudThinker uses a natural language interface enhanced with structured syntax. This guide is the definitive reference for communicating effectively with agents.

Syntax Overview

Every CloudThinker prompt follows this structure:
@agent [instruction] [#tool] [context]
ComponentRequiredDescription
@agentYesRoutes the request to a specific agent
instructionYesWhat you want the agent to do
#toolNoOutput format or capability to use
contextNoConstraints, timeframes, scope

Agent Mentions

Use @ to direct requests to specific agents:
AgentExpertiseWhen to Use
@alexCloud infrastructure, cost, performanceCost analysis, resource optimization, multi-cloud
@oliverSecurity, compliance, threatsAudits, vulnerability scans, IAM, compliance
@tonyDatabases, queries, analyticsQuery optimization, performance tuning, backups
@kaiKubernetes, containers, orchestrationCluster management, pod optimization, scaling
@annaCoordination, strategy, reportingMulti-agent projects, executive reports, complex ops

Single Agent

@alex analyze EC2 spending trends over the last quarter
@oliver audit all S3 buckets for public access
@tony identify queries with execution time >2 seconds
@kai check pod resource utilization in production namespace

Multi-Agent Collaboration

Address multiple agents for complex problems:
@alex @tony investigate cost spike on database infrastructure
@oliver @kai audit Kubernetes RBAC and network policies
@anna coordinate security remediation across @oliver @alex @kai

Tool Commands

Use # to specify output format or invoke specific capabilities:
ToolPurposeExample
#dashboardInteractive visualizations@alex #dashboard monthly cost trends
#reportDetailed analysis documents@oliver #report SOC 2 compliance assessment
#recommendActionable recommendations@tony #recommend index optimizations
#alertMonitoring notifications@kai #alert when node CPU >80%
#chartData visualizations@alex #chart spending by service
#kbKnowledge base search@alex #kb AWS cost optimization policies

Tool Combinations

Combine tools with agent mentions:
@alex #dashboard #recommend cost optimization opportunities
@oliver #report #alert security findings requiring immediate action
@tony #dashboard database performance with #alert on P95 >500ms

Tool-Specific Patterns

Creates interactive visualizations for monitoring and presentation.
# Cost dashboards
@alex #dashboard AWS spending by service and region
@alex #dashboard monthly cost trends with forecast

# Performance dashboards
@tony #dashboard query latency P50/P95/P99 over time
@kai #dashboard cluster resource utilization by node

# Security dashboards
@oliver #dashboard compliance status across frameworks
@oliver #dashboard security findings by severity

Context Modifiers

Add context to narrow scope and improve accuracy:

Timeframes

@alex analyze spending over the last 30 days
@alex compare costs: last month vs same period last year
@tony identify slow queries from the past week
@oliver find security group changes in the last 24 hours

Scope

@alex analyze EC2 instances in us-east-1 region
@oliver audit production environment security groups
@tony check performance on the orders database
@kai review staging cluster resource allocation

Thresholds

@alex identify instances with CPU utilization <15%
@tony find queries with execution time >2 seconds
@kai flag pods requesting >2GB memory but using <500MB
@oliver find IAM roles with >50 attached policies

Exclusions

@alex recommend terminations excluding production-tagged resources
@oliver audit all buckets except backup-* prefixed ones
@tony analyze all databases excluding read replicas

Priorities

@alex #recommend cost savings prioritizing quick wins under 30 days
@oliver identify vulnerabilities, critical severity first
@tony optimize queries prioritizing those running >100x daily

Combined Context

@alex analyze EC2 instances in us-east-1
  with CPU <20% over last 30 days
  excluding production-critical
  #recommend right-sizing with projected savings

@oliver audit security groups in production
  for public access on ports 22, 3389, 3306
  #report with remediation timeline
  prioritizing internet-facing resources

Prompt Patterns

Pattern 1: Analysis Request

@agent analyze [target] [context]
@alex analyze EC2 spending by instance family over last quarter
@tony analyze query patterns on production PostgreSQL cluster
@kai analyze pod scheduling efficiency across all nodes
@oliver analyze IAM permission usage for service accounts

Pattern 2: Audit Request

@agent audit [target] for [criteria]
@oliver audit S3 buckets for public access and encryption
@oliver audit IAM policies for privilege escalation paths
@alex audit infrastructure for unused or orphaned resources
@kai audit RBAC configuration against least-privilege principles

Pattern 3: Optimization Request

@agent optimize/recommend [target] [constraints]
@alex recommend cost optimizations maintaining 99.9% availability
@tony recommend index changes for queries >500ms execution time
@kai optimize pod resource requests based on actual utilization

Pattern 4: Investigation Request

@agent investigate [issue] [scope]
@alex investigate cost spike on database services last week
@tony investigate slow query performance on orders table
@kai investigate pod crash loops in payment namespace
@oliver investigate failed authentication attempts from unusual IPs

Pattern 5: Coordination Request

@anna coordinate [project] with @agents [scope]
@anna coordinate AWS to GCP migration with @alex @tony @kai
@anna coordinate security remediation with @oliver leading, @alex @kai supporting
@anna coordinate quarterly review: @alex cost, @oliver security, @tony databases, @kai containers

Advanced Techniques

Progressive Refinement

Start broad, then drill down based on findings:
# Step 1: Broad overview
@alex #dashboard cloud spending trends

# Step 2: Identify problem area
@alex which services drove the November cost spike?

# Step 3: Deep dive
@alex break down RDS costs by instance type and utilization

# Step 4: Actionable recommendation
@alex #recommend RDS optimization prioritizing underutilized instances

Comparative Analysis

Ask agents to compare options:
@alex compare reserved instances vs savings plans for our EC2 usage pattern

@tony compare these approaches for database scaling:
  1. Read replicas
  2. Sharding by customer_id
  3. Migration to Aurora Serverless
  Include: cost, complexity, performance impact

@oliver compare SOC 2 vs ISO 27001 based on our customer requirements

Conditional Logic

Apply business rules to recommendations:
@alex #recommend instance right-sizing where:
  - CPU utilization <20% for >14 days
  - Not tagged as burst-capable
  - Not in auto-scaling groups
  - Savings >$50/month

@oliver prioritize security findings:
  - Critical: internet-exposed + known CVE
  - High: production + public access
  - Medium: everything else

Structured Requests

For complex requirements, use structured format:
@tony optimize database performance:
  Target: production PostgreSQL cluster
  Focus: queries running >100x daily with >500ms P95
  Constraints:
    - No schema changes requiring downtime
    - Maintain read replica compatibility
  Output: #recommend with implementation order and rollback plan

Slack Integration

In Slack, prefix with @CloudThinker:
@CloudThinker alex what's our AWS spending this week?
@CloudThinker oliver any critical security findings?
@CloudThinker tony why are queries slow on production?
@CloudThinker kai check EKS cluster health
All syntax works identically in Slack—just add the @CloudThinker prefix.

Quick Reference

Agents

MentionRoleBest For
@alexCloud EngineerCost, infrastructure, multi-cloud
@oliverSecurity ProCompliance, vulnerabilities, IAM
@tonyDatabase EngineerQueries, performance, analytics
@kaiK8s EngineerContainers, clusters, orchestration
@annaGeneral ManagerCoordination, strategy, reports

Tools

CommandOutputUse Case
#dashboardInteractive vizMonitoring, presentations
#reportDocumentCompliance, deep analysis
#recommendAction itemsImplementation guidance
#alertNotificationsProactive monitoring
#chartVisualizationData trends
#kbKnowledge searchPolicy lookup

Context Keywords

TypeExamples
Timeover last 30 days, since January, past week
Scopein us-east-1, on production, for staging cluster
Thresholdwith CPU <20%, costing >$1000/month, >500ms latency
Exclusionexcluding production, except backup buckets
Priorityprioritizing quick wins, critical first

Best Practices

Be Specific

Good: @alex analyze EC2 in us-east-1 with <15% CPU over 30 daysAvoid: @alex check our servers

Provide Context

Include environment, timeframe, and constraints for accurate results

Use Right Agent

Match the request to agent expertise—security to Oliver, databases to Tony

Choose Right Tool

#dashboard for visuals, #report for documents, #recommend for actions

Next Steps