Toolverse
All skills

deepgram-observability

by jeremylongshore

Set up comprehensive observability for Deepgram integrations with metrics, traces, and alerts.\nUse when implementing monitoring for Deepgram operations, setting up dashboards,\nor configuring alerting for Deepgram integration health.\nTrigger with phrases like \

Installation

Pick a client and clone the repository into its skills directory.

Installation

Quick info

Category
Security

About this skill

Set up comprehensive observability for Deepgram integrations with metrics, traces, and alerts.\nUse when implementing monitoring for Deepgram operations, setting up dashboards,\nor configuring alerting for Deepgram integration health.\nTrigger with phrases like \

How to use

  1. Wyzwól skill frazą taką jak "deepgram monitoring", "deepgram metrics", "deepgram observability", "monitor deepgram", "deepgram alerts" lub "deepgram dashboard". Skill automatycznie rozpozna kontekst i przygotuje się do konfiguracji.

  2. Zdefiniuj metryki Prometheus dla Deepgram, które będą śledzić: całkowitą liczbę żądań (deepgram_requests_total), czas trwania żądań w sekundach (deepgram_request_duration_seconds) z bucketsami dla percentyli, liczbę przetworzonych minut audio oraz szacunkowe koszty. Skill wygeneruje kod TypeScript z biblioteką prom-client.

  3. Skonfiguruj rozproszone ślady za pomocą OpenTelemetry, aby śledzić przepływ żądań end-to-end i czasy odpowiedzi API Deepgram. Skill dostarczy konfigurację eksportera.

  4. Ustaw strukturalne logowanie JSON przy użyciu Pino do rejestrowania szczegółów żądań, błędów i ścieżki audytu. Skill wygeneruje szablon konfiguracji.

  5. Skonfiguruj reguły AlertManager dla krytycznych warunków: wskaźnik błędów powyżej 5%, opóźnienie P95 powyżej 10 sekund oraz trafienia limitów szybkości. Skill dostarczy gotowe reguły.

  6. Wygeneruj dashboard Grafany w formacie JSON, aby wizualizować wszystkie metryki w jednym miejscu. Zaimportuj plik JSON do Grafany i połącz źródło danych Prometheus.

Related skills

senior-security

by davila7

Comprehensive security engineering skill for application security, penetration testing, security architecture, and compliance auditing. Includes security assessment tools, threat modeling, crypto implementation, and security automation. Use when designing security architecture,

Security
2482

academic-researcher

by Shubhamsaboo

Academic research assistant for literature reviews, paper analysis, and scholarly writing.\nUse when: reviewing academic papers, conducting literature reviews, writing research summaries,\nanalyzing methodologies, formatting citations, or when user mentions academic research,

Security
1260

content-creator

by alirezarezvani

Create SEO-optimized marketing content with consistent brand voice. Includes brand voice analyzer, SEO optimizer, content frameworks, and social media templates. Use when writing blog posts, creating social media content, analyzing brand voice, optimizing SEO, planning content

Security
25124

1password

by openclaw

Set up and use 1Password CLI (op). Use when installing the CLI, enabling desktop app integration, signing in (single or multi-account), or reading/injecting/running secrets via op.

Security
1174

accessibility-compliance

by wshobson

Implement WCAG 2.2 compliant interfaces with mobile accessibility, inclusive design patterns, and assistive technology support. Use when auditing accessibility, implementing ARIA patterns, building for screen readers, or ensuring inclusive user experiences.

Security
2173

solidity-security

by wshobson

Master smart contract security best practices to prevent common vulnerabilities and implement secure Solidity patterns. Use when writing smart contracts, auditing existing contracts, or implementing security measures for blockchain applications.

Security
10105