Extracts patterns, errors, and insights from operational logs using type-specific analysis templates
Extracts patterns, errors, and insights from operational logs using type-specific analysis templates. Triggers when users request error extraction, pattern detection, session summaries, or time analysis from log files.
/plugin marketplace add fractary/claude-plugins/plugin install fractary-logs@fractaryThis skill inherits all available tools. When active, it can use any tool Claude has access to.
docs/analysis-types.mdscripts/analyze-time.shscripts/extract-errors.shscripts/find-patterns.shscripts/generate-summary.shv2.0 Update: Now type-specific - uses log type templates and standards for analysis. Session analysis uses conversation structure, test analysis uses pass/fail metrics, build analysis uses exit codes.
You provide four types of analysis:
<CRITICAL_RULES>
When extracting errors:
When detecting patterns:
When summarizing session:
When analyzing time:
Purpose: Extract all error messages from logs
Usage: extract-errors.sh [issue_number]
Outputs: List of errors with context
Purpose: Find recurring patterns across logs
Usage: find-patterns.sh <since_date>
Outputs: Pattern frequency report
Purpose: Generate session summary
Usage: generate-summary.sh <session_file>
Outputs: Session summary
Purpose: Analyze time spent
Usage: analyze-time.sh <since_date> [until_date]
Outputs: Time analysis report
<COMPLETION_CRITERIA> Analysis complete when:
Error extraction:
šÆ STARTING: Error Analysis
Issue: #123
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
Reading logs...
ā Found 3 log files
Extracting errors...
ā Found 3 errors
ā
COMPLETED: Error Analysis
Error Analysis for Issue #123
Found 3 errors:
1. [2025-01-15 10:15] TypeError: Cannot read property 'user'
File: src/auth/middleware.ts:42
Context: JWT token validation
Session: session-123-2025-01-15.md
2. [2025-01-15 11:30] CORS error: Origin not allowed
File: src/main.ts:15
Context: OAuth redirect
Session: session-123-2025-01-15.md
3. [2025-01-15 14:00] Database connection timeout
File: src/database/connection.ts:89
Context: User lookup query
Build: 123-build.log
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
Next: Fix errors or analyze patterns with /fractary-logs:analyze patterns
Pattern detection:
šÆ STARTING: Pattern Analysis
Since: 2025-01-01
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
ā
COMPLETED: Pattern Analysis
Common Patterns (Last 30 days)
1. OAuth Configuration Issues (5 occurrences)
Issues: #123, #124, #130
Pattern: CORS errors during redirect
Common solution: Update origin whitelist in config
2. Database Connection Timeouts (3 occurrences)
Issues: #125, #127, #133
Pattern: High load on user table queries
Common solution: Add connection pooling, index optimization
3. JWT Token Expiration (8 occurrences)
Issues: #123, #126, #129, #131
Pattern: Users losing session mid-workflow
Common solution: Implemented refresh token mechanism
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
Next: Review specific issues or search for solutions
Session summary:
šÆ STARTING: Session Summary
Issue: #123
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
ā
COMPLETED: Session Summary
Session Summary: Issue #123 - User Authentication
**Duration**: 2h 30m (150 minutes)
**Date**: 2025-01-15 09:00 - 11:30 UTC
**Messages**: 47
**Code Blocks**: 12
**Files Modified**: 8
**Key Decisions**:
- OAuth2 over Basic Auth (security, easier third-party integration)
- JWT in HttpOnly cookies (prevent XSS)
- Redis for session storage (fast, scalable)
- 15-minute access tokens, 7-day refresh tokens
**Issues Encountered**:
- CORS configuration error (resolved in 15 minutes)
- Token refresh race condition (resolved in 30 minutes)
**Files Created**:
- src/auth/oauth/provider.interface.ts
- src/auth/oauth/google-provider.ts
- src/auth/oauth/github-provider.ts
- src/auth/jwt/token-manager.ts
**Outcome**: Successfully implemented, all tests passing
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
Next: Read full session with /fractary-logs:read 123
Time analysis:
šÆ STARTING: Time Analysis
Since: 2025-01-01
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
ā
COMPLETED: Time Analysis
Time Analysis (January 2025)
**Overall**:
- Total sessions: 23
- Total development time: 52h 30m
- Average session: 1h 45m
**By Issue Type**:
- Features: 35h (67%) - 15 sessions
- Bugs: 12h (23%) - 6 sessions
- Refactoring: 5h 30m (10%) - 2 sessions
**Longest Sessions**:
1. Issue #123 (User Auth): 2h 30m
2. Issue #125 (API Refactor): 2h 15m
3. Issue #130 (DB Migration): 2h 00m
**Most Productive Days**:
- Monday: 12h (5 sessions)
- Wednesday: 10h 30m (4 sessions)
- Friday: 9h (4 sessions)
āāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāāā
Next: Analyze specific patterns or issues
</OUTPUTS>
<DOCUMENTATION>
Analysis operations don't require documentation. Results are ephemeral insights.
</DOCUMENTATION>
<ERROR_HANDLING>
If no logs for analysis:
If cannot parse log format:
If logs missing expected fields:
If analysis script fails:
</ERROR_HANDLING>