log▌
7 indexed skills · max 10 per page
alicloud-observability-sls-log-query-test
cinience/alicloud-skills · Cloud
Category: test \n SLS 日志查询Minimal Viable Test \n Prerequisites \n \n 配置 ALIBABACLOUD_ACCESS_KEY_ID 、 ALIBABACLOUD_ACCESS_KEY_SECRET 。 \n 配置 SLS_ENDPOINT 、 SLS_PROJECT 、 SLS_LOGSTORE 。 \n GoalsSkill: skills/observability/sls/alicloud-observability-sls-log-query/ 。 \n \n Test Steps \n \n 执行 5 分钟窗口的基础查询(如 * | select count(*) )。 \n 记录耗时与返回行数。 \n 若失败,记录完整错误码。 \n \n Expected Results \n \n 查询成功返回统计结果,或返回可诊断错误。 \n
log-aggregation
aj-geddes/useful-ai-prompts · Productivity
Build comprehensive log aggregation systems to collect, parse, and analyze logs from multiple sources, enabling centralized monitoring, debugging, and compliance auditing.
log-analysis
aj-geddes/useful-ai-prompts · Productivity
Logs are critical for debugging and monitoring. Effective log analysis quickly identifies issues and enables root cause analysis.
alicloud-observability-sls-log-query
cinience/alicloud-skills · Cloud
Category: service
okx-audit-log
okx/onchainos-skills · Productivity
$21
recipe-log-deal-update
googleworkspace/cli · Productivity
Append deal status updates to a Google Sheets sales tracking spreadsheet. \n \n Requires gws-sheets and gws-drive skills to locate and modify the Sales Pipeline sheet \n Workflow: find the tracking sheet by name, read existing pipeline data, then append new deal rows with date, company, status, amount, quarter, and owner fields \n Integrates with Google Drive and Sheets APIs to maintain a centralized sales pipeline log \n
log-analysis
supercent-io/skills-template · Productivity
Parse application logs to identify errors, performance issues, and security anomalies. \n \n Supports multiple log formats including Apache, Nginx, application logs, and JSON with grep-based pattern matching \n Covers error debugging, performance analysis (response times, throughput), security audits (SQL injection, XSS, brute force), and incident response \n Includes pre-built grep patterns for HTTP error codes, time-based analysis, IP-based traffic analysis, and suspicious access patterns \n R