Skip to content

Log Analyzer Node

Analyse any plain-text log with a single node. Five analysis modes let you filter, aggregate and detect anomalies without writing code or Regex by hand (unless you want to).

⚙ Inputs

LabelTypeRequiredDescription
Log File PathtextAbsolute path to the log file (e.g. C:\Logs\vault.log).
ModepicklistWhat kind of analysis to run.
Extract Log Entries · Spike Detection · Top Talkers · Session Reconstruction · Error Rate Analysis

Mode-specific inputs

ModeInputDescription
Extract Log EntriesKeyword – simple contains filter
Regex Pattern – advanced match
Max Results – stop after n lines
Returns a list of matched log lines.
Spike DetectionEvent Keyword – required trigger
Identifier Regex – capture group for the “actor” (user/IP/vault …)
Time Window (min)
Spike Threshold
Flags bursts of activity per actor.
Top TalkersEvent Keyword – counter filter
Identifier Regex – capture actor
Top N – how many to return
Ranks actors by event count.
Session ReconstructionIdentifier Regex – capture actor
Session Start Keyword
Session End Keyword
Outputs sessions with start/end/duration.
Error Rate Analysis(no extra inputs)Returns totalLines, errorLines, errorRate (0–1).

🗃 Outputs

NameTypeContent
AnalysisResultobjectJSON structure varies by mode (examples below).
Task StatusinternalCompleted, Fail, or custom error text.

💻 Examples

1 – Extract only ERROR lines

text
Mode:              Extract Log Entries
Keyword:           ERROR
Regex Pattern:     .*             # optional
Max Results:       100

Result

json
[
  "2025-06-17 12:52:53 PM Error: Soap Exception …",
  "2025-06-17 12:52:54 PM Error: Soap Exception …",

]

2 – Detect duplicate-event spikes

(≥ 2 “DuplicateQueuedEvent” within 1 minute)

text
Mode:              Spike Detection
Event Keyword:     DuplicateQueuedEvent
Identifier Regex:  mesg-id = (\\d+)
Time Window:       1
Spike Threshold:   2

Result

json
[
  {
    "actor": "638857615732635387",
    "event": "DuplicateQueuedEvent",
    "count": 6,
    "windowStart": "2025-06-17T12:52:53Z",
    "windowEnd":   "2025-06-17T12:53:53Z"
  }
]

3 – Top 3 busiest vaults

text
Mode:              Top Talkers
Event Keyword:     Begin executing event
Identifier Regex:  vault '(.*?)'
Top N:             3

Result

json
[
  {"Actor":"Drawing Approval", "Count":8},
  {"Actor":"Drawing Approval2","Count":8},
  {"Actor":"Vault",            "Count":6}
]

4 – Reconstruct job runtimes

text
Mode:                     Session Reconstruction
Identifier Regex:         vault '(.*?)'
Session Start Keyword:    Begin executing event
Session End Keyword:      End executing event

Result

json
[
  {
    "actor":"Vault",
    "start":"2025-06-17T01:00:18Z",
    "end":"2025-06-17T01:00:18Z",
    "durationSeconds":0
  },

]

5 – Overall error rate

text
Mode:  Error Rate Analysis

Result

json
{
  "totalLines": 68,
  "errorLines": 6,
  "errorRate": 0.088
}

📝 Regex quick tips

Capture group → wrap in ( … ); the first group is used as actor. Example : vault '(.*?)' ➜ captures Vault, Drawing Approval, …

Escape [ and ] → \[ \] in the UI (double back-slash).

⚠ Large files

The node currently loads the entire file into memory. For multi-GB logs, stream processing is recommended – coming in a future version.

Tentech 2024