Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit e8d316b

Browse files
Merge pull request #2346 from splunk/OD-6400-LogObserverOptimizations
tcarter-OD-6400-LogObserverOptimizations
2 parents 8291a98 + 215ef08 commit e8d316b

File tree

4 files changed

+26
-14
lines changed

4 files changed

+26
-14
lines changed
357 KB
Loading

_images/logs/lo-openinsplunk.png

86.2 KB
Loading

_includes/logs/query-logs.rst

Lines changed: 23 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,27 @@
1-
#. Navigate to :guilabel:`Log Observer`. In the content control bar, enter a time range in the time picker if you know it.
2-
#. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. You can only query indexes from one Splunk platform instance or Splunk Observability Cloud instance at a time. You can only query Splunk platform indexes if you have the appropriate role and permissions in the Splunk platform instance. Select :guilabel:`Apply`.
3-
#. In the content control bar next to the index picker, select :guilabel:`Add Filter`.
4-
#. To search on a keyword, select the :guilabel:`Keyword` tab, type the keyword or phrase you want to search on, then press Enter. If you want to search on a field, select the :guilabel:`Fields` tab, enter the field name, then press Enter.
5-
#. To continue adding keywords or fields to the search, select :guilabel:`Add Filter`.
6-
#. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
7-
#. Optionally, if you are viewing Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, you can open your query results in the Splunk platform to use SPL to further filter or work with the query results. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
1+
1. Navigate to :guilabel:`Log Observer`. Upon opening, Log Observer runs an initial search of all indexes you have access to and returns the most recent 150,000 logs. The search then defaults to Pause in order to save Splunk Virtual Compute (SVC) resources. Control your SVC resources, which impact performance and cost, by leaving your search on Pause when you are not monitoring incoming logs, and select Play when you want to see more incoming logs.
2+
3+
.. image:: /_images/logs/LogObserverEnhancementsUI.png
4+
:width: 90%
5+
:alt: The Log Observer UI is displayed.
6+
7+
8+
2. In the content control bar, enter a time range in the time picker if you want to see logs from a specific historical period. To select a time range, you must select :guilabel:`Infinite` from the :guilabel:`Search Records` field in step 5 below. When you select :guilabel:`150,000`, Log Observer returns only the most recent 150,000 logs regardless of the time range you select.
9+
10+
3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. When you do not select an index, Log Observer runs your query on all indexes to which you have access. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. You can query indexes from only one Splunk platform instance or Splunk Observability Cloud instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions.
11+
12+
4. In the content control bar next to the index picker, select :guilabel:`Add Filter`. Select the :guilabel:`Keyword` tab to search on a keyword or phrase. Select the :guilabel:`Fields` tab to search on a field. Then press Enter. To continue adding keywords or fields to the search, select :guilabel:`Add Filter` again.
13+
14+
5. Next, select :guilabel:`Unlimited` or :guilabel:`150,000` from the :guilabel:`Search Records` field to determine the number of logs you want to return on a single search. Select :guilabel:`150,000` to optimize your Splunk Virtual Compute (SVC) resources and control performance and cost. However, only the most recent 150,000 logs display. To see a specific time range, you must select :guilabel:`Infinite`.
15+
16+
6. To narrow your search, use the :guilabel:`Group by` drop-down list to select the field or fields by which you want to group your results, then select :guilabel:`Apply`. To learn more about aggregations, see :ref:`logs-aggregations`.
17+
18+
7. Select :guilabel:`Run search`.
19+
20+
8. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
21+
22+
9. Optionally, if you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
823

924
.. image:: /_images/logs/lo-openinsplunk.png
10-
:width: 100%
25+
:width: 90%
1126
:alt: The Open in Splunk platform icon is at the top, right-hand side of the Logs table.
1227

logs/keyword.rst

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -7,14 +7,11 @@ Search logs by keywords or fields
77
.. meta::
88
:description: Search and filter logs by keyword, field, or field values.
99

10-
.. include:: /_includes/log-observer-transition.rst
1110

12-
You can search Splunk Observability Cloud logs if your Splunk Observability Cloud instance ingests logs. If your organization has integrated its Splunk platform (Splunk Cloud Platform or Splunk Enterprise) instance with its Splunk Observability Cloud instance, you can search Splunk platform logs that your Splunk platform role has permissions to see in Splunk platform. If you cannot access a log in your Splunk platform instance, you cannot access it in Splunk Observability Cloud.
11+
In Log Observer Connect, you can search Splunk platform logs that your Splunk platform role has permissions to see. If you cannot access a log in your Splunk platform instance, you cannot access it in Splunk Observability Cloud. If your Splunk Observability Cloud instance ingests logs, you can search Splunk Observability Cloud logs.
1312

14-
You can search logs that you have permissions to see for particular keywords, field names, or field values.
15-
16-
To search your logs, follow these steps:
13+
You can search for keywords, field names, or field values. To search your logs, follow these steps:
1714

1815
.. include:: /_includes/logs/query-logs.rst
1916

20-
When you add keywords, field names, or field values to the filters, Log Observer narrows the results in the Timeline and the Logs table so that only records containing the selected fields and values appear. To learn how you can use a productive search in the future, see :ref:`logs-save-share`.
17+
When you add keywords, field names, or field values to the filters, Log Observer narrows the results in the Timeline and the Logs table so that only records containing the selected fields and values appear. To learn how you can reuse a productive search in the future, see :ref:`logs-save-share`.

0 commit comments

Comments
 (0)