Skip to end of banner
Go to start of banner

ELK Log Search App

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 7 Next »

Granting access to view logs

Please follow the below steps for granting the view logs access to the user:

Go to Manage users

Screenshot 2024-01-23 181000-20240123-124024.png

Create a new user(if user not existed)

Screenshot 2024-01-23 181223-20240123-124244.png

Add user details. Choose login mode as 'Via Username and Password'

image-20240123-124342.png

If the user already exists, search for the user's name.

image-20240301-080626.png

In Role Management, choose the application as log.

  • Give Role log.viewer for enabling logging access to the user.

image-20240301-080724.png

 

Next, go to the home page and choose the Log Application. The below window reflects.

image-20240301-080949.png

Searching the Logs

The logs can be searched based on the following parameters:

Mandatory Fields

  1. Client: This parameter is crucial as it identifies the client entity whose logs you are interested in. The client entity name must be accurately provided to ensure the search results are relevant to the specific client in question.

  2. Channel: This specifies the channel for which the logs are required. Channels can represent ERP, Marketplace, POS or External Fulfillment System.

  3. Request Name: For users looking to find logs related to specific requests, this field allows the input of the request name. If the exact name is unknown or if a broader search is desired, an asterisk (*) can be used as a wildcard character to include all possible matches.

  4. From Date and To Date: These parameters define the temporal boundaries of your search. "From Date" is the starting point of the time range, while "To Date" marks its conclusion. Together, they allow users to search for logs within a specific timeframe, which is particularly useful for troubleshooting issues or analyzing events that occurred during a particular period.

Non-Mandatory Fields

  1. Request Body: Although optional, this field can be used to search for logs that contain specific information within the request body. It's useful for detailed analyses or when looking for logs that match certain criteria within the request content.

  2. Headers: Searching by headers can help in identifying logs that came with specific header information. This is useful for debugging or verifying that the correct headers were used in requests.

  3. Status: This parameter allows for the filtering of logs based on the status of the request. Status can be SUCCESS, FAILURE, or WARNING. It can help in quickly identifying failed requests or requests with warning.

  4. HTTP Status: Similar to the Status field, this allows for filtering based on the HTTP status code returned by the request. It's particularly useful for web services troubleshooting, where understanding the nature of HTTP responses (e.g., 200 OK, 404 Not Found) is critical.

  5. URI: For searches focused on specific endpoints or resources, the URI parameter can be used to locate logs related to particular URIs. This is beneficial when analyzing the traffic or issues related to specific parts of a service.

Understanding and utilizing these search parameters effectively can significantly enhance your ability to find and analyze the necessary logs, aiding in troubleshooting and analysis.

On click of the Search button, the results are displayed as shown below.

3be1a93a-e1cb-47e9-88d7-777771)-20240304-045718.png

Any of the log results can be expanded on click of the request name.

25a486e5-f7c2-4c13-9bd4-8787ypng-20240304-050130.png

When the "more" button is clicked, users can expand the request, response, headers, and other related information.

To copy a particular section such as request, response, headers, etc., simply click on the copy button located at the right end of the section.

Screenshot 2024-03-04 103502-20240304-050602.png

The sensitive details like phone and email are masked in the logs.

Copy, Download, or Generate a Link for a specific log

The JSON payload containing all fields can be easily copied using the copy button. Additionally, users have the option to download the payload by clicking on the Download button. Furthermore, there is also an option for users to generate a public link for the specific log.

Screenshot 2024-03-04 110019-20240304-053237.png

Configure Displayable Columns in Log Search App Results

Click on the Configure Columns button.

image-20240304-040402.png

Choose the columns to be added. Select All to show all columns in the table

image-20240304-040551.png

Manage Page Size

Page size represents the number of requests displayed on a page. Users can choose 100, 200, or 500.

image-20240304-041306.png

In cases where the number of results exceeds the defined page limit, users can employ the left and right arrows to navigate to the next page.

Screenshot 2024-03-04 094648-20240304-041716.png

Download All Logs

Click on the Download All Logs button to download all logs. Logs will be downloaded in JSON file on a single page.

image-20240304-041907.png

  • No labels