Execute use when setting up log aggregation solutions using ELK, Loki, or Splunk. Trigger with phrases like "setup log aggregation", "deploy ELK stack", "configure Loki", or "install Splunk". Generates production-ready configurations for data ingestion, processing, storage, and visualization with proper security and scalability.
72
67%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Optimize this skill with Tessl
npx tessl skill review --optimize ./plugins/devops/log-aggregation-setup/skills/setting-up-log-aggregation/SKILL.mdDeploy centralized log aggregation platforms (ELK Stack, Grafana Loki, Splunk) with ingestion pipelines, structured parsing, retention policies, visualization dashboards, and alerting. Configure log shippers (Filebeat, Promtail, Fluentd) to collect from applications, containers, and system logs with proper security and scalability.
| Error | Cause | Solution |
|---|---|---|
Elasticsearch heap space exhausted | JVM heap too small for index volume | Increase ES_JAVA_OPTS heap size (set to 50% of available RAM, max 32GB) or add nodes |
Cannot connect to Elasticsearch | Network issue or Elasticsearch not started | Verify Elasticsearch is running and healthy; check firewall rules and bind address |
Failed to create index | Disk space full or index template misconfigured | Check disk usage with df -h; review index template settings and shard allocation |
Failed to parse log line | Grok pattern mismatch or unexpected log format | Test grok patterns with Kibana Grok Debugger; add fallback pattern for unmatched lines |
Promtail: too many open files | System file descriptor limit too low for log tailing | Increase ulimit -n to 65536; reduce the number of watched paths |
3a2d27d
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.