Upload logs, get instant AI analysis, and track error resolution across Wave's platform
☁️ Query Grafana Cloud Logs
⚙️ Choose Your Analysis Method
Upload log files or paste content directly for instant AI-powered analysis
📁 Upload Log File
Drag & drop or browse for .log/.txt files up to 50MB
📝 Paste Log Content
Copy and paste log entries for quick analysis
📊 Analysis Results
Detected Log Type:Unknown-
Analyzing logs...
💬 Ask Follow-up Questions
Ask questions about the analysis results to get more insights...
Pattern Analysis
📋 Raw Analysis Data ▼
Click to expand/collapse raw JSON data
⚡ High Velocity Error Detection
Objects and actors generating excessive logs
📋 Define Known Issues
Add known issues to deprioritize during analysis, helping AI focus on new problems
➕ Add New Common Issue
📝 Current Common Issues
No common issues defined yet. Add issues above or import from Error Management.
⚙️ Customize Wave Analysis Context
Train the AI on Wave's specific logging patterns, terminology, and priorities. This context is automatically included in every analysis to provide more accurate, Wave-focused insights.
📋 Wave Logging Structure
Describe how Wave structures log files, common log formats, and file naming conventions:
🏢 Wave Terminology
Define Wave-specific terms, component names, and technical vocabulary:
🎯 Analysis Focus Areas
Specify what the AI should prioritize when analyzing Wave logs:
🔧 Non-Scaling Servers Context
Define characteristics and analysis considerations specific to Non-Scaling servers (hostname prefix "uehi-ns-"):
💡 How This Works
The context you provide here will be automatically included in every AI analysis request. This helps the
AI:
Understand Wave-specific terminology and components
Recognize patterns specific to your logging structure
Provide more accurate problem identification
Suggest solutions tailored to Wave's architecture
Tip: Keep this information updated as your systems evolve for the best analysis results.
🔐 Configure AI & Integrations
Set up API keys for AI providers and external integrations. All keys are encrypted and stored securely on your system.