|
1 | | -1. Navigate to :guilabel:`Log Observer`. Upon opening, Log Observer runs an initial search of all indexes you have access to and returns the first 150,000 logs. Then, the search defaults to paused. To search for more logs, follow the steps below to determine, filters, and aggregations. |
2 | | -.. note:: Control your Splunk Virtual Compute (SVC) resources by leaving search on Pause and selecting :guilabel:`150,000` rather than "Infinite" results. Pushing :guilabel:`Play` to run a streaming search uses more system resources than running a manual search. Streaming searches can impact performance and cost. Monitor resource usage to ensure optimal performance. Switch from streaming searches back to manual searches to optimize resource usage. |
| 1 | +1. Navigate to :guilabel:`Log Observer`. Upon opening, Log Observer runs an initial search of all indexes you have access to and returns the first 150,000 logs. The search then defaults to Pause in order to save Splunk Virtual Compute (SVC) resources. Control your SVC resources, which impact performance and cost, by leaving your search on Pause and selecting :guilabel:`150,000` rather than :guilabel:`Infinite` results. |
3 | 2 |
|
4 | | -.. image:: /_images/logs/LogObserverEnhancements.png |
5 | | - :width: 100% |
6 | | - :alt: The Open in Splunk platform icon is at the top, right-hand side of the Logs table. |
| 3 | + .. image:: /_images/logs/LogObserverEnhancements.png |
| 4 | + :width: 90% |
| 5 | + :alt: The Log Observer UI is displayed. |
| 6 | + |
| 7 | + Perform the remaining steps to determine filters and aggregations. |
7 | 8 |
|
8 | | -2. In the content control bar, enter a time range in the time picker if you know it. |
| 9 | +2. In the content control bar, enter a time range in the time picker. |
9 | 10 |
|
10 | | -3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. |
| 11 | +3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. |
11 | 12 |
|
12 | | -.. note:: You can only query indexes from one Splunk platform instance or Splunk Observability Cloud instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions in the Splunk platform instance. |
| 13 | +You can query indexes from only one Splunk platform instance or Splunk Observability Cloud instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions. |
13 | 14 |
|
14 | 15 | 4. In the content control bar next to the index picker, select :guilabel:`Add Filter`. |
15 | 16 |
|
16 | 17 | 5. Select the :guilabel:`Keyword` tab to search on a keyword or phrase. Select the :guilabel:`Fields` tab to search on a field. Then press Enter. To continue adding keywords or fields to the search, select :guilabel:`Add Filter` again. |
17 | 18 |
|
18 | | -6. Next, select :guilabel:`Unlimited` or :guilabel:`150,000` results to determine the number of results you want to return on a single search. Select :guilabel:`150,000` to optimize your Splunk Virtual Compute (SVC) resources and control performance and cost. |
| 19 | +6. Next, select :guilabel:`Unlimited` or :guilabel:`150,000` to determine the number of results you want to return on a single search. Select :guilabel:`150,000` to optimize your Splunk Virtual Compute (SVC) resources and control performance and cost. |
19 | 20 |
|
20 | | -7. To narrow your search, use the :guilabel:`Group by` drop-down list to select the field or fields by which you want to group your results, then select :guilabel:`Apply`. To learn more about aggregation, see :ref:`logs-aggregations`. |
| 21 | +7. To narrow your search, use the :guilabel:`Group by` drop-down list to select the field or fields by which you want to group your results, then select :guilabel:`Apply`. To learn more about aggregations, see :ref:`logs-aggregations`. |
21 | 22 |
|
22 | 23 | 8. Select :guilabel:`Run search`. |
23 | 24 |
|
24 | 25 | 9. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`. |
25 | 26 |
|
26 | | -10. Optionally, if you are viewing Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, you can open your query results in the Splunk platform to use SPL to further filter or work with the query results. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table. |
| 27 | +10. Optionally, if you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table. |
27 | 28 |
|
28 | 29 | .. image:: /_images/logs/lo-openinsplunk.png |
29 | | - :width: 100% |
| 30 | + :width: 90% |
30 | 31 | :alt: The Open in Splunk platform icon is at the top, right-hand side of the Logs table. |
31 | 32 |
|
0 commit comments