Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit d14bf5d

Browse files
Merge pull request #1558 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents 2957360 + fdd4a6a commit d14bf5d

File tree

87 files changed

+322
-1654
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

87 files changed

+322
-1654
lines changed
-263 KB
Loading
357 KB
Loading

_images/logs/lo-openinsplunk.png

86.2 KB
Loading

_includes/logs/query-logs.rst

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,27 @@
1-
#. Navigate to :guilabel:`Log Observer`. In the content control bar, enter a time range in the time picker if you know it.
2-
#. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. You can only query indexes from one Splunk platform instance or Splunk Observability Cloud instance at a time. You can only query Splunk platform indexes if you have the appropriate role and permissions in the Splunk platform instance. Select :guilabel:`Apply`.
3-
#. In the content control bar next to the index picker, select :guilabel:`Add Filter`.
4-
#. To search on a keyword, select the :guilabel:`Keyword` tab, type the keyword or phrase you want to search on, then press Enter. If you want to search on a field, select the :guilabel:`Fields` tab, enter the field name, then press Enter.
5-
#. To continue adding keywords or fields to the search, select :guilabel:`Add Filter`.
6-
#. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
7-
#. Optionally, if you are viewing Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, you can open your query results in the Splunk platform to use SPL to further filter or work with the query results. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
1+
1. Navigate to :guilabel:`Log Observer`. Upon opening, Log Observer runs an initial search of all indexes you have access to and returns the most recent 150,000 logs. The search then defaults to Pause in order to save Splunk Virtual Compute (SVC) resources. Control your SVC resources, which impact performance and cost, by leaving your search on Pause when you are not monitoring incoming logs, and select Play when you want to see more incoming logs.
2+
3+
.. image:: /_images/logs/LogObserverEnhancementsUI.png
4+
:width: 90%
5+
:alt: The Log Observer UI is displayed.
6+
7+
8+
2. In the content control bar, enter a time range in the time picker if you want to see logs from a specific historical period. To select a time range, you must select :guilabel:`Infinite` from the :guilabel:`Search Records` field in step 5 below. When you select :guilabel:`150,000`, Log Observer returns only the most recent 150,000 logs regardless of the time range you select.
9+
10+
3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. When you do not select an index, Log Observer runs your query on all indexes to which you have access. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. You can query indexes from only one Splunk platform instance or Splunk Observability Cloud instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions.
11+
12+
4. In the content control bar next to the index picker, select :guilabel:`Add Filter`. Select the :guilabel:`Keyword` tab to search on a keyword or phrase. Select the :guilabel:`Fields` tab to search on a field. Then press Enter. To continue adding keywords or fields to the search, select :guilabel:`Add Filter` again.
13+
14+
5. Next, select :guilabel:`Unlimited` or :guilabel:`150,000` from the :guilabel:`Search Records` field to determine the number of logs you want to return on a single search. Select :guilabel:`150,000` to optimize your Splunk Virtual Compute (SVC) resources and control performance and cost. However, only the most recent 150,000 logs display. To see a specific time range, you must select :guilabel:`Infinite`.
15+
16+
6. To narrow your search, use the :guilabel:`Group by` drop-down list to select the field or fields by which you want to group your results, then select :guilabel:`Apply`. To learn more about aggregations, see :ref:`logs-aggregations`.
17+
18+
7. Select :guilabel:`Run search`.
19+
20+
8. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
21+
22+
9. Optionally, if you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
823

924
.. image:: /_images/logs/lo-openinsplunk.png
10-
:width: 100%
25+
:width: 90%
1126
:alt: The Open in Splunk platform icon is at the top, right-hand side of the Logs table.
1227

admin/references/data-retention.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,8 @@ The following table shows the retention time period for each data type in APM.
8787
Data retention in Log Observer
8888
============================================
8989

90-
The retention period for indexed logs in Splunk Log Observer is 30 days. If you send logs to S3 through the Infinite Logging feature, then the data retention period depends on the policy you purchased for your Amazon S3 bucket. To learn how to set up Infinite Logging rules, see :ref:`logs-infinite`.
90+
The retention period for indexed logs in Splunk Log Observer is 30 days.
91+
9192

9293
.. _oncall-data-retention:
9394

admin/subscription-usage/subscription-usage-overview.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,6 @@ Learn more at :ref:`per-product-limits` and the following docs:
6464

6565
* Data ingest can be limited at the source by Cloud providers. You can track this with the metric ``sf.org.num.<cloudprovidername>ServiceClientCallCountThrottles``.
6666

67-
* :ref:`Log Observer Connect limits <lo-connect-limits>` and :ref:`Log Observer limits <logs-limits>`
67+
* :ref:`Log Observer Connect limits <lo-connect-limits>`
6868

6969
* :ref:`System limits for Splunk RUM <rum-limits>`

admin/subscription-usage/synthetics-usage.rst

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,8 @@ Splunk Synthetic Monitoring offers metrics you can use to track your subscriptio
2525
- Total number of synthetic runs by organization. To filter by test type:
2626
- ``test_type=browser``
2727
- ``test_type=API``
28-
- ``test_type=uptime``
28+
- ``test_type=http``
29+
- ``test_type=port``
2930

3031

3132
See also

alerts-detectors-notifications/slo/create-slo.rst

Lines changed: 15 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Follow these steps to create an SLO.
1919
#. From the landing page of Splunk Observability Cloud, go to :strong:`Detectors & SLOs`.
2020
#. Select the :strong:`SLOs` tab.
2121
#. Select :guilabel:`Create SLO`.
22-
#. Configure the service level indicator (SLI) for your SLO.
22+
#. Configure the service level indicator (SLI) for your SLO. You can use a service or any metric of your choice as the system health indicator.
2323

2424
To use a service as the system health indicator for your SLI configuration, follow these steps:
2525

@@ -46,21 +46,22 @@ Follow these steps to create an SLO.
4646
* - :guilabel:`Filters`
4747
- Enter any additional dimension names and values you want to apply this SLO to. Alternatively, use the ``NOT`` filter, represented by an exclamation point ( ! ), to exclude any dimension values from this SLO configuration.
4848

49-
To use a custom metric as the system health indicator for your SLI configuration, follow these steps:
49+
To use a metric of your choice as the system health indicator for your SLI configuration, follow these steps:
5050

51-
.. list-table::
52-
:header-rows: 1
53-
:widths: 40 60
54-
:width: 100%
51+
#. For the :guilabel:`Metric type` field, select :guilabel:`Custom metric` from the dropdown menu. The SignalFlow editor appears.
52+
#. In the SignalFlow editor, you can see the following code sample:
5553

56-
* - :strong:`Field name`
57-
- :strong:`Actions`
58-
* - :guilabel:`Metric type`
59-
- Select :guilabel:`Custom metric` from the dropdown menu
60-
* - :guilabel:`Good events (numerator)`
61-
- Search for the metric you want to use for the success request count
62-
* - :guilabel:`Total events (denominator)`
63-
- Search for the metric you want to use for the total request count
54+
.. code-block:: python
55+
56+
G = data('good.metric', filter=filter('sf_error', 'false'))
57+
T = data('total.metric')
58+
59+
* Line 1 defines ``G`` as a data stream of ``good.metric`` metric time series (MTS). The SignalFlow ``filter()`` function queries for a collection of MTS with value ``false`` for the ``sf_error`` dimension. The filter distinguishes successful requests from total requests, making ``G`` the good events variable.
60+
* Line 2 defines ``T`` as a data stream ``total.metric`` MTS. ``T`` is the total events variable.
61+
62+
Replace the code sample with your own SignalFlow program. You can define good events and total events variables using any metric and supported SignalFlow function. For more information, see :new-page:`Analyze data using SignalFlow <https://dev.splunk.com/observability/docs/signalflow>` in the Splunk Observability Cloud Developer Guide.
63+
64+
#. Select appropriate variable names for the :guilabel:`Good events (numerator)` and :guilabel:`Total events (denominator)` dropdown menus.
6465

6566
.. note:: Custom metric SLO works by calculating the percentage of successful requests over a given compliance period. This calculation works better for counter and histogram metrics than for gauge metrics. Gauge metrics are not suitable for custom metric SLO, so you might get confusing data when selecting gauge metrics in your configuration.
6667

alerts-detectors-notifications/slo/custom-metric-scenario.rst

Lines changed: 13 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -17,32 +17,22 @@ Use custom metric as service level indicator (SLI)
1717

1818
From the :guilabel:`Detectors & SLOs` page, Kai configures the SLI and sets up a target for their SLO. Kai follows these steps:
1919

20-
#. Kai wants to use custom metrics as the system health indicators, so they select the :guilabel:`Custom metric` from the :guilabel:`Metric type` menu.
21-
#. Kai enters the custom metrics they want to measure in the following fields:
20+
#. Kai wants to use a Synthetics metric as the system health indicators, so they select the :guilabel:`Custom metric` from the :guilabel:`Metric type` menu.
21+
#. Kai enters following program into the SignalFlow editor:
2222

23-
.. list-table::
24-
:header-rows: 1
25-
:widths: 10 20 30 40
23+
.. code-block:: python
2624
27-
* - Field
28-
- Metric name
29-
- Filters
30-
- Description
25+
G = data('synthetics.run.count', filter=filter('test', 'Monitoring Services - Emby check') and filter('success', 'true'))
26+
T = data('synthetics.run.count', filter=filter('test', 'Monitoring Services - Emby check'))
3127
32-
* - :guilabel:`Good events (numerator)`
33-
- :strong:`synthetics.run.count`
34-
- Kai adds the following filters for this metric:
35-
36-
* :strong:`test = Emby check`
37-
* :strong:`success = true`
38-
- Kai uses the :strong:`success = true` filter to count the number of successful requests for the Emby service on the Buttercup Games website.
28+
Kai defines variables ``G`` and ``T`` as two streams of ``synthetics.run.count`` metric time series (MTS) measuring the health of requests sent to the Emby service. To distinguish between the two data streams, Kai applies an additional filter on the ``success`` dimension in the definition for ``G``. This filter queries for a specific collection of MTS that track successful requests for the Emby service. In Kai's SignalFlow program, ``G`` is a data stream of good events and ``T`` is a data stream of total events.
3929

40-
* - :guilabel:`Total events (denominator)`
41-
- :strong:`synthetics.run.count`
42-
- Kai adds the following filter for this metric:
30+
.. image:: /_images/images-slo/custom-metric-slo-scenario.png
31+
:width: 100%
32+
:alt: This image shows Kai's SLO configuration using the ``synthetics.run.count`` metric and appropriate filters.
4333

44-
* :strong:`test = Emby check`
45-
- Kai uses the same metric name and the :strong:`test = Emby check` filter to track the same Synthetics Browser test. However, Kai doesn't include the :strong:`success = true` dimension filter in order to count the number of total requests for the Emby service on the Buttercup Games website.
34+
35+
#. Kai assigns ``G`` to the :guilabel:`Good events (numerator)` dropdown menu and ``T`` to the :guilabel:`Total events (denominator)` dropdown menu.
4636

4737
#. Kai enters the following fields to define a target for their SLO:
4838

@@ -64,11 +54,6 @@ From the :guilabel:`Detectors & SLOs` page, Kai configures the SLI and sets up a
6454

6555
#. Kai subscribes to receive an alert whenever there is a breach event for the SLO target.
6656

67-
.. image:: /_images/images-slo/custom-metric-slo-scenario.png
68-
:width: 100%
69-
:alt: This image shows Kai's SLO configuration using the ``synthetics.run.count`` metric and appropriate filters.
70-
71-
7257
Summary
7358
=======================
7459

@@ -80,3 +65,5 @@ Learn more
8065
For more information about creating an SLO, see :ref:`create-slo`.
8166

8267
For more information about the Synthetics Browser test, see :ref:`browser-test`.
68+
69+
For more information on SignalFlow, see :new-page:`Analyze data using SignalFlow <https://dev.splunk.com/observability/docs/signalflow>` in the Splunk Observability Cloud Developer Guide.

apm/apm-scenarios/troubleshoot-business-workflows.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,4 +81,4 @@ Learn more
8181

8282
* For details about business workflows, see :ref:`apm-workflows`.
8383
* For details about using Related Content, see :ref:`get-started-relatedcontent`.
84-
* For more information about using Splunk Log Observer to detect the source of problems, see :ref:`get-started-logs`.
84+
* For more information about using Splunk Log Observer Connect to detect the source of problems, see :ref:`logs-intro-logconnect`.

0 commit comments

Comments
 (0)