Use the left nav in the Logs UI as an easy workflow through all logs, attributes, patterns, live-tail logging, and queries. Manage your log data by dropping or parsing data, creating data partitions, and setting up alerts. Hash or mask any sensitive data in your logs with obfuscation expressions and rules. Get more details about specific logs and their attributes from the center nav.
To explore your logging data, follow this basic workflow.
To spot suspicious spikes or drops in log messages, click Patterns on the left nav.
To look at logs for a specific time period, click that point (or click and drag an area) on the chart, or use the time picker.
The left nav includes options to help you narrow the focus of your initial search results or to quickly find outliers.
If you're not sure where to start, click Attributes on the left nav, then select additional values as needed. For example, if a host listed under the hostname attribute is generating significantly more error messages than the others, select that value to apply it to your search.
Focusing on the most useful logs can help you with:
Optimizing performance: To organize data within an account and to optimize query performance, create data partition rules.
Reviewing deployments: To immediately see how your system responds to deployments or other app changes, enable live-tail logging.
Bypassing unrelated details: To view all the logs for a specific value, review the attributes list in the Log details for the selected log, then continue to add or remove attributes as needed.
Finding the root cause: To help identify an issue's root cause before it occurred or its impact after an event, click ... in the Log details to show surrounding logs.
Getting more context: To see logs related to other telemetry data for your apps and hosts, use logs in context.
Use any of the core New Relic UI functions (specific account, time range, metrics and events, query builder, etc.) to share the data with charts, add to dashboards, etc. For more information, see the examples in this document.
By default core and full users have unlimited access to all features in the Logs UI. Basic users will have access to only some of the Log UI features. The list below outlines the Logs UI capabilities for basic users.
Included for Basic Users:
Ability to search for logs
Ability to view log patterns, parsing rules, partitions, drop filters, and obfuscation rules and expressions for our Data Plus customers.
Ability to create drop filters
Ability to create private views
Creating drop filters can also be limited by restricting the NRQL Drop Rules capability. A custom role can be created to restrict this capability and added on to the basic users if required. This drop rule capability is outlined here in our capability defintions:
Save your views
You can save your logs query, table configuration, time range, and attribute grouping in a saved view, so that you can quickly return to it later. To save a log analytics view after you've configured the view:
Click Saved views in the Logs UI left nav, then click Save current view.
Give your saved view the name you want for it to be listed in the Saved views list.
Select which aspects from the current view you want to save.
Select the permission level if you want others to view or edit, then save this view.
Here are a few examples of how you can use the Logs UI to get detailed information.
You can create alert conditions directly in the Logs UI: