Search K
Appearance
Appearance
Analyse any plain-text log with a single node. Five analysis modes let you filter, aggregate and detect anomalies without writing code or Regex by hand (unless you want to).
| Label | Type | Required | Description |
|---|---|---|---|
| Log File Path | text | ✔ | Absolute path to the log file (e.g. C:\Logs\vault.log). |
| Mode | picklist | ✔ | What kind of analysis to run.Extract Log Entries · Spike Detection · Top Talkers · Session Reconstruction · Error Rate Analysis |
| Mode | Input | Description |
|---|---|---|
| Extract Log Entries | Keyword – simple contains filterRegex Pattern – advanced matchMax Results – stop after n lines | Returns a list of matched log lines. |
| Spike Detection | Event Keyword – required triggerIdentifier Regex – capture group for the “actor” (user/IP/vault …)Time Window (min)Spike Threshold | Flags bursts of activity per actor. |
| Top Talkers | Event Keyword – counter filterIdentifier Regex – capture actorTop N – how many to return | Ranks actors by event count. |
| Session Reconstruction | Identifier Regex – capture actorSession Start KeywordSession End Keyword | Outputs sessions with start/end/duration. |
| Error Rate Analysis | (no extra inputs) | Returns totalLines, errorLines, errorRate (0–1). |
| Name | Type | Content |
|---|---|---|
| AnalysisResult | object | JSON structure varies by mode (examples below). |
| Task Status | internal | Completed, Fail, or custom error text. |
Mode: Extract Log Entries
Keyword: ERROR
Regex Pattern: .* # optional
Max Results: 100[
"2025-06-17 12:52:53 PM Error: Soap Exception …",
"2025-06-17 12:52:54 PM Error: Soap Exception …",
…
](≥ 2 “DuplicateQueuedEvent” within 1 minute)
Mode: Spike Detection
Event Keyword: DuplicateQueuedEvent
Identifier Regex: mesg-id = (\\d+)
Time Window: 1
Spike Threshold: 2[
{
"actor": "638857615732635387",
"event": "DuplicateQueuedEvent",
"count": 6,
"windowStart": "2025-06-17T12:52:53Z",
"windowEnd": "2025-06-17T12:53:53Z"
}
]Mode: Top Talkers
Event Keyword: Begin executing event
Identifier Regex: vault '(.*?)'
Top N: 3[
{"Actor":"Drawing Approval", "Count":8},
{"Actor":"Drawing Approval2","Count":8},
{"Actor":"Vault", "Count":6}
]Mode: Session Reconstruction
Identifier Regex: vault '(.*?)'
Session Start Keyword: Begin executing event
Session End Keyword: End executing event[
{
"actor":"Vault",
"start":"2025-06-17T01:00:18Z",
"end":"2025-06-17T01:00:18Z",
"durationSeconds":0
},
…
]Mode: Error Rate Analysis{
"totalLines": 68,
"errorLines": 6,
"errorRate": 0.088
}Capture group → wrap in ( … ); the first group is used as actor. Example : vault '(.*?)' ➜ captures Vault, Drawing Approval, …
Escape [ and ] → \[ \] in the UI (double back-slash).
The node currently loads the entire file into memory. For multi-GB logs, stream processing is recommended – coming in a future version.