
Security News
libxml2 Maintainer Ends Embargoed Vulnerability Reports, Citing Unsustainable Burden
Libxml2’s solo maintainer drops embargoed security fixes, highlighting the burden on unpaid volunteers who keep critical open source software secure.
Log Analyzer MCP is a powerful Python-based toolkit designed to streamline the way you interact with log files. Whether you're debugging complex applications, monitoring test runs, or simply trying to make sense of verbose log outputs, this tool provides both a Command-Line Interface (CLI) and a Model-Context-Protocol (MCP) server to help you find the insights you need, quickly and efficiently.
Why use Log Analyzer MCP?
loganalyzer
CLI tool for scripting and direct analysis, or integrate the MCP server with compatible clients like Cursor for an AI-assisted experience.loganalyzer
CLI: Intuitive command-line tool for direct log interaction.analyze_tests
).run_unit_test
).create_coverage_report
).This package can be installed from PyPI (once published) or directly from a local build for development purposes.
Once the package is published to PyPI.
pip install log-analyzer-mcp
This will install the loganalyzer
CLI tool and make the MCP server package available for integration.
If you have cloned the repository and want to use your local changes:
Ensure Hatch is installed. (See Developer Guide)
Build the package:
hatch build
This creates wheel and sdist packages in the dist/
directory.
Install the local build into your Hatch environment (or any other virtual environment):
Replace <version>
with the actual version from the generated wheel file (e.g., 0.2.7
).
# If using Hatch environment:
hatch run pip uninstall log-analyzer-mcp -y && hatch run pip install dist/log_analyzer_mcp-<version>-py3-none-any.whl
# For other virtual environments:
# pip uninstall log-analyzer-mcp -y # (If previously installed)
# pip install dist/log_analyzer_mcp-<version>-py3-none-any.whl
For IDEs like Cursor to pick up changes to the MCP server, you may need to manually reload the server in the IDE. See the Developer Guide for details.
There are two primary ways to use Log Analyzer MCP:
As a Command-Line Tool (loganalyzer
):
As an MCP Server (e.g., with Cursor):
Configuration of the Log Analyzer MCP (for both CLI and Server) is primarily handled via environment variables or a .env
file in your project root.
LOG_DIRECTORIES
, LOG_PATTERNS_ERROR
, LOG_CONTEXT_LINES_BEFORE
, LOG_CONTEXT_LINES_AFTER
, etc., in the environment where the tool or server runs..env
File: Create a .env
file by copying .env.template
(this template file needs to be created and added to the repository) and customize the values.For a comprehensive list of all configuration options and their usage, please refer to the (Upcoming) Configuration Guide.
(Note: The .env.template
file should be created and added to the repository to provide a starting point for users.)
The MCP server can be launched in several ways:
Via an MCP Client (e.g., Cursor):
Configure your client to launch the log-analyzer-mcp
executable (often using a helper like uvx
). This is the typical way to integrate the server.
Example Client Configuration (e.g., in .cursor/mcp.json
):
{
"mcpServers": {
"log_analyzer_mcp_server_prod": {
"command": "uvx", // uvx is a tool to run python executables from venvs
"args": [
"log-analyzer-mcp" // Fetches and runs the latest version from PyPI
// Or, for a specific version: "log-analyzer-mcp==0.2.0"
],
"env": {
"PYTHONUNBUFFERED": "1",
"PYTHONIOENCODING": "utf-8",
"MCP_LOG_LEVEL": "INFO", // Recommended for production
// "MCP_LOG_FILE": "/path/to/your/logs/mcp/log_analyzer_mcp_server.log", // Optional
// --- Configure Log Analyzer specific settings via environment variables ---
// These are passed to the analysis engine used by the server.
// Example: "LOG_DIRECTORIES": "[\"/path/to/your/app/logs\"]",
// Example: "LOG_PATTERNS_ERROR": "[\"Exception:.*\"]"
// (Refer to the (Upcoming) docs/configuration.md for all options)
}
}
// You can add other MCP servers here
}
}
Notes:
log-analyzer-mcp
.Directly (for development/testing):
You can run the server directly using its entry point if needed. The log-analyzer-mcp
command (available after installation) can be used:
log-analyzer-mcp --transport http --port 8080
# or for stdio transport
# log-analyzer-mcp --transport stdio
Refer to log-analyzer-mcp --help
for more options. For development, using Hatch scripts defined in pyproject.toml
or the methods described in the Developer Guide is also common.
.env
and environment variable settings. (This document needs to be created.)loganalyzer
commands and options. (This document needs to be created.)To run tests and generate coverage reports, please refer to the comprehensive Testing Guidelines in the Developer Guide. This section covers using hatch test
, running tests with coverage, generating HTML reports, and targeting specific tests.
We welcome contributions! Please see CONTRIBUTING.md and the Developer Guide for guidelines on how to set up your environment, test, and contribute.
Log Analyzer MCP is licensed under the MIT License with Commons Clause. See LICENSE.md for details.
FAQs
MCP server and tools for analyzing test and runtime logs.
We found that log_analyzer_mcp demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Libxml2’s solo maintainer drops embargoed security fixes, highlighting the burden on unpaid volunteers who keep critical open source software secure.
Research
Security News
Socket investigates hidden protestware in npm packages that blocks user interaction and plays the Ukrainian anthem for Russian-language visitors.
Research
Security News
Socket researchers uncover how browser extensions in trusted stores are used to hijack sessions, redirect traffic, and manipulate user behavior.