Create your query by building out your filter statement using keys and values with your search terms, comparators, and logical operators:
AND connected.
Additionally, filter the logs by
Segments.
This simplifies the querying for a selected bucket.
An example use case is provided at Segment logs by bucket.
For a wildcard search, use the * operator together with your search term.
For example, when searching for all logs with the term transaction in the content field, filter for content = *transaction*.
Note that filters are case-sensitive.
See the full reference for the Filter field.
For status and loglevel you can pick an option in the list of presets (see here how log severity is transformed).
For other filters, add a comparison operator (equals, contains, not contains, does not equal, starts with, ends with) and a desired value.
For example, if you want to query log records from syslog with all statuses, then select all options for status, add a log.source attribute, pick the contains operator, and insert the syslog value.
If you use the equals sign (=)
Logs provides autocomplete suggestions for values, with retrieval of these values being free of charge.
Use the date picker to apply the correct timeframe for your query.
Select Run query to execute the query.
After your query has returned records in the result table, you can search for keywords in this data. Use the Search in results field to filter the table to your keyword. This filtering won't execute a new query, but will only show the already returned and loaded results in your browser.