Skip to main content
Glama

create_group

Create an NSX security group with membership based on tags, IP addresses, or segment paths to enforce distributed firewall policies.

Instructions

[WRITE] Create an NSX security group with optional membership criteria.

Membership criteria are ANDed together when multiple are provided:

  • tag_scope / tag_value: include VMs matching the NSX tag

  • ip_addresses: include specific IP addresses or CIDRs

  • segment_paths: include all VMs on specified segments

Args: group_id: Unique group identifier (alphanumeric, hyphens, underscores). display_name: Human-readable group name. description: Optional description. tag_scope: NSX tag scope for VM membership (e.g. 'env'). tag_value: NSX tag value for VM membership (e.g. 'production'). ip_addresses: List of IP addresses or CIDRs (e.g. ['10.0.1.0/24']). segment_paths: List of NSX segment policy paths. target: Optional NSX Manager target name from config.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
group_idYes
display_nameYes
descriptionNo
tag_scopeNo
tag_valueNo
ip_addressesNo
segment_pathsNo
targetNo
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

Annotations indicate a write operation (readOnlyHint=false). The description adds a '[WRITE]' prefix and details the AND logic for membership criteria, which goes beyond the annotation. It provides useful behavioral context without contradiction.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

The description is structured with a concise summary line, bullet-like membership criteria, and a clear args list. Every sentence adds value without redundancy.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness3/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

The description covers parameters well but does not mention return values, output format, error conditions, or prerequisites (e.g., authentication). Given the complexity (8 params, no output schema), additional context would improve completeness.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters5/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

The input schema has 0% description coverage for its 8 parameters. The description compensates fully by listing each parameter in an 'Args:' block with clear explanations, adding significant meaning beyond the schema's titles and types.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states 'Create an NSX security group with optional membership criteria.' It uses a specific verb (Create) and resource (NSX security group), distinguishing it from sibling tools like delete_group, list_groups, etc.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description explains that membership criteria are ANDed and lists the criteria types, providing context for when to use. However, it does not explicitly specify when not to use this tool or mention alternative tools.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/zw008/VMware-NSX-Security'

If you have feedback or need assistance with the MCP directory API, please join our Discord server