VCF Log Insight Health Check

v1.0.1

Check the health, uptime, and node status of Aria Operations for Logs (Log Insight) in a VCF environment.

0· 110·0 current·0 all-time
byRohit Kasture@kasture-rohit

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for kasture-rohit/vcf-loginsight-health.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "VCF Log Insight Health Check" (kasture-rohit/vcf-loginsight-health) from ClawHub.
Skill page: https://clawhub.ai/kasture-rohit/vcf-loginsight-health
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Required env vars: LOGINSIGHT_HOST, LOGINSIGHT_API_TOKEN
Required binaries: curl, jq
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install vcf-loginsight-health

ClawHub CLI

Package manager switcher

npx clawhub@latest install vcf-loginsight-health
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name, description, required binaries (curl, jq), and required environment variables (LOGINSIGHT_HOST, LOGINSIGHT_API_TOKEN) all match the stated purpose of querying Log Insight APIs. No unrelated credentials, binaries, or config paths are requested.
Instruction Scope
Instructions are narrowly scoped to two API calls (/api/v1/health and /api/v1/cluster/nodes) and summarizing results. A notable detail: curl is invoked with -k (insecure) which disables TLS certificate verification; this is sometimes necessary for appliances with self-signed certs but is a security risk (MITM exposure). The SKILL.md does not instruct reading other files or unrelated environment variables.
Install Mechanism
Instruction-only skill with no install spec and no code files — nothing is written to disk by an installer. This is the lowest-risk install model.
Credentials
Only LOGINSIGHT_HOST and LOGINSIGHT_API_TOKEN are required and the primary credential is the API token — these are appropriate and proportionate for querying the service. No unrelated secrets or broad credential access is requested.
Persistence & Privilege
Skill is not always-enabled and does not request persistent system privileges or modify other skills' configuration. It uses exec at runtime to call curl, which is expected for this purpose.
Assessment
This skill appears to do exactly what it says: run two Log Insight API calls and summarize results. Before installing: 1) Confirm the skill will run only in a trusted environment (it executes curl and will transmit your API token to LOGINSIGHT_HOST). 2) Avoid using a high-privilege API token; create a scoped token with minimum needed permissions and rotate/expire it. 3) If possible, avoid or justify the use of curl -k; prefer a valid TLS certificate on the Log Insight endpoint to prevent MITM risk. 4) Treat LOGINSIGHT_API_TOKEN as sensitive — do not paste it into chats or logs. 5) Verify the skill source (the GitHub homepage) if you need higher assurance about authorship. If you accept those caveats, the skill is coherent with its stated purpose.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

Binscurl, jq
EnvLOGINSIGHT_HOST, LOGINSIGHT_API_TOKEN
Primary envLOGINSIGHT_API_TOKEN
latestvk973fdmkv699dpwsf2cfq0c0as849mws
110downloads
0stars
2versions
Updated 3w ago
v1.0.1
MIT-0

VCF Log Insight Health Check

When the user asks to check the health of the Log Insight or Aria Operations for Logs cluster, follow these steps:

  1. Verify Credentials: Ensure LOGINSIGHT_HOST and LOGINSIGHT_API_TOKEN are available in the environment.
  2. Fetch Cluster Health: Use the exec tool to run the following command to check the cluster status:
    curl -s -k -X GET "https://$LOGINSIGHT_HOST/api/v1/health" \
      -H "Authorization: Bearer $LOGINSIGHT_API_TOKEN" \
      -H "Accept: application/json" | jq '.'
    
  3. Fetch Node Status: Use the exec tool to run the following command to check individual node uptime and status:
    curl -s -k -X GET "https://$LOGINSIGHT_HOST/api/v1/cluster/nodes" \
      -H "Authorization: Bearer $LOGINSIGHT_API_TOKEN" \
      -H "Accept: application/json" | jq '.nodes[] | {id, ip, status, uptime}'
    
  4. Report to User: Summarize the JSON output into a clean, readable table detailing the overall health and the status of each node. Point out any errors or disconnected nodes explicitly.

Comments

Loading comments...