Tools
Log Analysis
openclaw plugin for log pattern detection and anomaly highlighting. day 13 of 20 days of claw.
Install
openclaw plugins install -l
Configuration Example
{
"plugins": {
"log-analysis": {
"scanExecOutput": true,
"defaultSeverityThreshold": "warning",
"maxLogLines": 10000
}
}
}
README
# log-analysis
openclaw plugin for pattern detection and anomaly highlighting. scans log files, exec output, and text blocks for errors, warnings, and critical issues.
regex-based. no ML, no cloud, no dependencies. ships with 15 built-in patterns covering stack traces, OOM, segfaults, permission errors, timeouts, and more.
## install
```bash
openclaw plugins install -l .
```
## config
```json
{
"plugins": {
"log-analysis": {
"scanExecOutput": true,
"defaultSeverityThreshold": "warning",
"maxLogLines": 10000
}
}
}
```
### options
| option | default | what it does |
|--------|---------|-------------|
| `scanExecOutput` | `true` | auto-scan exec tool output for error patterns |
| `defaultSeverityThreshold` | `"warning"` | minimum severity to report |
| `maxLogLines` | `10000` | max lines to analyze per file |
## tools
- **analyze_log** - analyze a log file or text block for patterns
- **log_watch** - check last 100 lines of a file for issues
- **log_summary** - summarize error/warning frequency with pattern breakdown
- **log_patterns** - list/add/remove detection patterns
## hooks
- **after_tool_call** - auto-scans exec tool output for error patterns, surfaces warnings inline
## built-in patterns
stack traces (JS + Python), segfaults, OOM, permission denied, connection refused, timeouts, disk full, DNS failures, rust panics, non-zero exit codes, kill signals, deprecation notices, and generic ERROR/WARN/FATAL keywords.
add your own patterns at runtime with the `log_patterns` tool.
## day 13 of [20 days of claw](https://github.com/StressTestor)
tools
Comments
Sign in to leave a comment