Patrick Devine 1b272d5bcd change `github.com/jmorganca/ollama` to `github.com/ollama/ollama` (#3347) | 10 months ago | |
---|---|---|
.. | ||
Modelfile | 1 year ago | |
loganalysis.py | 1 year ago | |
logtest.logfile | 1 year ago | |
readme.md | 10 months ago | |
requirements.txt | 1 year ago |
This example shows one possible way to create a log file analyzer. It uses the model mattw/loganalyzer which is based on codebooga, a 34b parameter model.
To use it, run:
python loganalysis.py <logfile>
You can try this with the logtest.logfile
file included in this directory.
mattw/loganalyzer
model installed: ollama pull mattw/loganalyzer
pip install -r requirements.txt
python loganalysis.py logtest.logfile
The first part of this example is a Modelfile that takes codebooga
and applies a new System Prompt:
SYSTEM """
You are a log file analyzer. You will receive a set of lines from a log file for some software application, find the errors and other interesting aspects of the logs, and explain them so a new user can understand what they mean. If there are any steps they can do to resolve them, list the steps in your answer.
"""
This model is available at https://ollama.com/mattw/loganalyzer. You can customize it and add to your own namespace using the command ollama create <namespace/modelname> -f <path-to-modelfile>
then ollama push <namespace/modelname>
.
Then loganalysis.py scans all the lines in the given log file and searches for the word 'error'. When the word is found, the 10 lines before and after are set as the prompt for a call to the Generate API.
data = {
"prompt": "\n".join(error_logs),
"model": "mattw/loganalyzer"
}
Finally, the streamed output is parsed and the response field in the output is printed to the line.
response = requests.post("http://localhost:11434/api/generate", json=data, stream=True)
for line in response.iter_lines():
if line:
json_data = json.loads(line)
if json_data['done'] == False:
print(json_data['response'], end='')
There is a lot more that can be done here. This is a simple way to detect errors, looking for the word error. Perhaps it would be interesting to find anomalous activity in the logs. It could be interesting to create embeddings for each line and compare them, looking for similar lines. Or look into applying Levenshtein Distance algorithms to find similar lines to help identify the anomalous lines.
Try different models and different prompts to analyze the data. You could consider adding retrieval augmented generation (RAG) to this to help understand newer log formats.