You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: gdi/opentelemetry/data-processing.rst
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,7 +117,6 @@ See and manage logs
117
117
118
118
To see and manage your logs, use :ref:`lo-connect-landing`.
119
119
120
-
.. caution:: Splunk Log Observer is no longer available for new users. You can continue to use Log Observer if you already have an entitlement. Learn more in :ref:`logs-logs`.
Copy file name to clipboardExpand all lines: get-started/o11y.rst
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,8 +95,6 @@ Now that you've explored and familiarized yourself with the data you have coming
95
95
96
96
- Customize your APM experience by setting up business workflows and creating span tags that add metadata to traces sent to APM. For more information, see :ref:`apm-workflows` and :ref:`apm-add-context-trace-span`.
97
97
98
-
- Customize your :ref:`logs pipeline <logs-pipeline>` to add value to your raw logs.
:description: View and search a log's fields and values in JSON. Link to related content. Extract a field to create a processing rule.
8
+
:description: View and search a log's fields and values in JSON. Link to related content.
9
9
10
10
After you find a set of log records that contain specific useful information, you can view the contents of an individual record to get a complete view of the data in the log, broken down by fields and values and displayed in JSON format in the :strong:`Fields` panel. You can also see the number of times each field appears in all of your logs.
11
11
12
-
Once you have identified an interesting field, you can perform a field extraction and use it to transform your data. See :ref:`logs-processors` for more information.
13
-
14
-
.. note:: Only customers with a Splunk Log Observer entitlement in Splunk Observability Cloud can create a field extraction processor. If you are using Log Observer Connect, you can view and search Splunk Cloud Platform or Splunk Enterprise data in Log Observer, but you cannot transform it.
15
-
16
-
17
-
To view the contents of an individual log record and create a field extraction rule, follow these steps:
12
+
To view the contents of an individual log record, follow these steps:
18
13
19
14
#. Select a log record line in the Logs table to display the Log Details panel.
20
15
@@ -27,7 +22,6 @@ To view the contents of an individual log record and create a field extraction r
27
22
* To copy the field value to the clipboard, select :menuselection:`Copy`
28
23
* To filter to the Logs table so it only displays log records containing the selected value, select :menuselection:`Add to filter`.
29
24
* To filter the Logs table so it doesn't display log records containing the selected value, select :menuselection:`Exclude from filter`.
30
-
* To create a new log processing rule based on the selected field, select :menuselection:`Extract Field`. To learn more about extracting fields to create log processors, see :new-page-ref:`logs-processors`.
31
25
* To add the field as a new column in the Logs table, select :menuselection:`Add field as column`.
32
26
* Select :menuselection:`View <field_name>` to go to the appropriate view in the Splunk Observability Cloud. For
33
27
example, if you select a field related to Kubernetes, Splunk Observability Cloud displays related data in the Kubernetes Navigator.
0 commit comments