Contextual AI icon

Contextual AI

Access Contextual AI tools for agents, parsing, querying, and reranking.

Overview

The node provides access to Contextual AI tools, including managing agents. Specifically, the "Delete Agent" operation allows users to delete an existing agent by specifying its unique ID. This is useful in scenarios where you want to programmatically remove agents that are no longer needed or to clean up resources.

For example, if you have created multiple AI agents for different tasks and want to automate their lifecycle management, this node can delete an agent based on its ID, helping maintain a tidy environment.

Properties

Name Meaning
Agent ID The unique identifier of the agent to delete. This is required.
Authentication Method of authentication to use. Options: API Key

Output

The output of the node is a JSON object representing the result of the delete operation. Typically, this would include confirmation of deletion or any relevant status message returned by the Contextual AI service. The exact structure depends on the API response but generally confirms whether the agent was successfully deleted.

No binary data output is expected from this operation.

Dependencies

  • Requires an API key credential for authenticating with the Contextual AI service.
  • The node depends on the external Contextual AI API to perform agent deletion.
  • Proper configuration of the API key credential within n8n is necessary.

Troubleshooting

  • Common issues:

    • Invalid or missing Agent ID: Ensure the Agent ID provided exists and is correctly formatted.
    • Authentication errors: Verify that the API key credential is valid and has sufficient permissions.
    • Network or API downtime: Check connectivity and the status of the Contextual AI service.
  • Error messages:

    • "Agent not found": The specified Agent ID does not exist; verify the ID.
    • "Unauthorized": Authentication failed; check the API key.
    • "Request failed": Could indicate network issues or invalid request parameters.

Resolving these typically involves verifying input values, credentials, and network connectivity.

Links and References

Discussion