Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit c2c378f

Browse files
Merge pull request #2697 from splunk/tcarter-releaseDayFix
tcarter-releaseDayFix
2 parents a301a28 + f6e1966 commit c2c378f

File tree

3 files changed

+52
-11
lines changed

3 files changed

+52
-11
lines changed

_images/logs/indexSelection.png

212 KB
Loading

_includes/logs/query-logs.rst

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,13 @@
88

99
2. In the content control bar, enter a time range in the time picker if you want to see logs from a specific historical period. To select a time range, you must select :guilabel:`Unlimited` from the :guilabel:`Search Records` field in step 5 below. When you select :guilabel:`150,000`, Log Observer returns only the most recent 150,000 logs regardless of the time range you select.
1010

11-
3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. When you do not select an index, Log Observer runs your query on all indexes to which you have access. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. You can query indexes from only one Splunk platform instance or Splunk Observability Cloud instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions.
11+
3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`. In the pop-up window, first select a Splunk platform (Splunk Cloud Platform or Splunk Enterprise) connection in the :guilabel:`Connection selection` section. Then, in the :guilabel:`Index selection` section, select which index you want to query in Log Observer Connect.
12+
13+
.. image:: /_images/logs/indexSelection.png
14+
:width: 90%
15+
:alt: The Log Observer index selection pop-up is displayed.
16+
17+
.. note:: You can query indexes from only one Splunk platform instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions in Splunk platform.
1218

1319
4. In the content control bar next to the index picker, select :guilabel:`Add Filter`. Select the :guilabel:`Keyword` tab to search on a keyword or phrase. Select the :guilabel:`Fields` tab to search on a field. Then press Enter. To continue adding keywords or fields to the search, select :guilabel:`Add Filter` again.
1420

@@ -18,9 +24,11 @@
1824

1925
7. Select :guilabel:`Run search`.
2026

21-
8. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
27+
8. [Optional] If you want to stop the current search, select :guilabel:`Cancel search`. Partial results do not display. To continue your search, select :guilabel:`Run search` again.
28+
29+
9. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
2230

23-
9. Optionally, if you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
31+
10. [Optional] If you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
2432

2533
.. image:: /_images/logs/lo-openinsplunk.png
2634
:width: 90%

logs/severity-key.rst

Lines changed: 41 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,48 @@ Ensure the correct mapping of your severity key
77
.. meta::
88
:description: Log Observer Connect relies on the correct mapping of the severity key. Confirm that your severity key is correctly mapped.
99

10-
The Log Observer Connect timeline displays a histogram of logged events over time, grouped by values of the message field :guilabel:`severity`. The severity key is a field that all logs contain. It has the values :guilabel:`DEBUG`, :guilabel:`ERROR`, :guilabel:`INFO`, :guilabel:`UNKNOWN`, and :guilabel:`WARNING`. Your logs might use a different field name for the severity key. Because the severity key in many logs is called :guilabel:`level`, Log Observer Connect automatically remaps the log field :guilabel:`level` to :guilabel:`severity`.
10+
The Log Observer Connect timeline displays a histogram of logged events over time, grouped by values of the message field :guilabel:`severity`. The severity key is a field that all logs contain. It has the values :guilabel:`debug`, :guilabel:`error`, :guilabel:`info`, :guilabel:`unknown`, and :guilabel:`warning`. Your logs might use a different field name for the severity key.
1111

12-
If your logs call the severity key by a different name, that's okay. To ensure that Log Observer Connect can read your field, transform your field name to :guilabel:`severity` or add a :guilabel:`severity` alias to your field name. To transform your field name, see :new-page:`Extract fields from event data using Ingest Processor <https://docs.splunk.com/Documentation/SplunkCloud/9.3.2408/IngestProcessor/FieldExtractionPipeline>`. To add an alias to your field name, see :ref:`logs-alias`.
12+
If your logs call the severity key or its values by different names, that's okay. Ensure that Log Observer Connect can read your field and value names. Log Observer Connect assigns :guilabel:`unknown` to all values that it does not recognize.
1313

14-
The mapping of your severity key and its values is case sensitive. The key and its values must appear exactly as follows:
14+
.. note:: The names of your severity key and its values are not case sensitive.
15+
16+
Your severity key can have any of the following names:
1517

1618
* severity
17-
* DEBUG
18-
* ERROR
19-
* INFO
20-
* UNKNOWN
21-
* WARNING
19+
* level
20+
* otel.log.severity.text
21+
22+
The following table lists the values that Log Observer Connect recognizes for each severity name:
23+
24+
.. list-table::
25+
:header-rows: 1
26+
:widths: 50, 50
27+
28+
* - :guilabel:`Severity field names`
29+
- :guilabel:`Severity value names`
30+
31+
* - severity
32+
- | info, information
33+
| err, error
34+
| warn, warning
35+
| debug
36+
| critical
37+
38+
* - level
39+
- | info, information
40+
| err, error
41+
| warn, warning
42+
43+
* - otel.log.severity.text
44+
- | normal
45+
| warn, warning
46+
47+
48+
If your severity key or values do not match any of the names in the previous table, do one of the following to turn them to names that Log Observer Connect recognizes:
49+
50+
* Use a field extraction to transform your field name. See :new-page:`Extract fields from event data using Ingest Processor <https://docs.splunk.com/Documentation/SplunkCloud/9.3.2408/IngestProcessor/FieldExtractionPipeline>` to learn how.
51+
52+
* Add a :guilabel:`severity` alias to your field name. See :ref:`logs-alias` to learn how.
53+
54+
When you create an alias for your severity key name, the original key name and its aliases continue to function for Log Observer queries. On the Log Observer timeline histogram, the severity key name and all its aliases are combined into one and represented as "severity".

0 commit comments

Comments
 (0)