AI-Powered Multi-Agent MCP Server for Automated Slack Alerts
In modern infrastructure, downtime is measured in dollars. IncidentFlow bridges the gap between raw system errors and human action:
CRITICAL, HIGH, MEDIUM, or LOW.If you are not a developer and just want to run the system, follow these simple steps:
IncidentFlow-v1.0.0.zip.install folder.install_exes.ps1 and select “Run with PowerShell”.git clone https://github.com/taoufikmohamed/incidentflow-dist.git
cd incidentflow-dist
.\install\install_exes.ps1
INCIDENTFLOW_API_KEY, DEESEEK_API_KEY, SLACK_WEBHOOK_URL) if they are not already set.The system uses the following environment variables (set automatically by the installer):
| Variable | Description |
|---|---|
INCIDENTFLOW_API_KEY |
Secure key for internal API communication. |
DEESEEK_API_KEY |
API Key for DeepSeek AI (for severity classification). |
SLACK_WEBHOOK_URL |
Webhook URL for your Slack channel. |
You can verify the system is working by sending a manual test incident.
.\test_flow.ps1
This script sends a simulated “CRITICAL” incident to the MCP server, which should then appear in your Slack.
To test how the AI classifies different types of incidents:
.\test_severity.ps1
nssm status IncidentFlow-MCP
nssm status IncidentFlow-Slack
nssm status IncidentFlow-LogAgent
Logs are located in the logs/ directory.
logs/IncidentFlow-MCP.errlogs/IncidentFlow-Slack.errTo tail the logs in real-time:
Get-Content logs\IncidentFlow-MCP.err -Wait
If you need to apply changes or restart the system:
nssm restart IncidentFlow-MCP
nssm restart IncidentFlow-Slack
nssm restart IncidentFlow-LogAgent
To completely remove IncidentFlow services and built executables:
.\install\uninstall_exes.ps1
This project is licensed under the MIT License - see the LICENSE file for details.