How to use it
Step 1
Paste several real log lines
Include success, failure, and edge-case examples so the pattern has to prove itself.
Step 2
Anchor the stable parts first
Start with timestamps, levels, or request IDs that you know are present.
Step 3
Review false positives
Make sure nearby but irrelevant lines do not match the same pattern.