Skip to main content
Glama
Fato07
by Fato07

log_analyzer_trace

Extract and follow trace IDs across log entries to group related events and visualize request flows through your system.

Instructions

Extract and follow trace/correlation IDs across log entries.

Automatically detects trace IDs (OpenTelemetry, X-Request-ID, AWS X-Ray, UUID)
and groups related log entries to show request flows through your system.

Args:
    file_path: Path to the log file to analyze
    trace_id: Specific trace ID to filter for (None for all traces)
    max_traces: Maximum number of trace groups to return (1-500, default: 100)
    max_lines: Maximum lines to process (100-100000, default: 10000)
    response_format: Output format - 'markdown' or 'json'

Returns:
    Trace groups showing request flows, including trace ID types detected,
    entry counts, time spans, and error indicators.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
file_pathYes
trace_idNo
max_tracesNo
max_linesNo
response_formatNomarkdown

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/Fato07/log-analyzer-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server