Skip to main content
Glama
Fato07
by Fato07

log_analyzer_trace

Extract and follow trace IDs across log entries to group related events and visualize request flows through your system.

Instructions

Extract and follow trace/correlation IDs across log entries. Automatically detects trace IDs (OpenTelemetry, X-Request-ID, AWS X-Ray, UUID) and groups related log entries to show request flows through your system. Args: file_path: Path to the log file to analyze trace_id: Specific trace ID to filter for (None for all traces) max_traces: Maximum number of trace groups to return (1-500, default: 100) max_lines: Maximum lines to process (100-100000, default: 10000) response_format: Output format - 'markdown' or 'json' Returns: Trace groups showing request flows, including trace ID types detected, entry counts, time spans, and error indicators.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
file_pathYes
trace_idNo
max_tracesNo
max_linesNo
response_formatNomarkdown

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Fato07/log-analyzer-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server