Related Content in Splunk Observability Cloud
Related Content functionality: introduction, requirements, how to use.
Use Related Content
Select tiles in the Related Content bar to seamlessly navigate from one view to another in Splunk Observability Cloud. The following animation shows a user navigating from APM to Infrastructure Monitoring to Log Observer.
In the preceding example, the user navigates through the following sequence:
-
The user starts in APM by exploring the service dependency map. They select the Frontend service because it shows a high error rate.
In the Related Content bar at the bottom of the screen, the user sees an Infrastructure tile showing related EC2 instances and selects it. Results are grouped by component. For example, Infrastructure, Logs, APM. Hovering over the tile indicates whether there are any Related Content results to view.
-
Splunk Observability Cloud takes the user to Infrastructure where they select the first EC2 instance because it shows the highest CPU utilization.
In the Related Content bar, the user sees a tile showing logs related to the EC2 instance, so they click it.
-
Splunk Observability Cloud takes the user to Log Observer where they can drill down into the related logs to find the root cause of the problem.
Where can I see Related Content?
The following table describes when and where in Splunk Observability Cloud you can see Related Content:
Starting Point |
Possible Destinations |
---|---|
APM services |
Related Kubernetes clusters filtered by service, AWS EC2s, GCP GCEs, Azure VMs, all log lines for the service |
Database service |
Related database host or instance |
Database instance |
Related Database Query Performance, related APM services |
Host or Cloud compute instance (AWS EC2, GCP GCE, Azure VM) |
Related APM services, log lines for the specific instance |
Kubernetes cluster, node, pod, container |
Related log lines for the node |
Kubernetes pod or container |
Related APM service in that pod or container, log lines for that pod or container |
Specific log line |
Related APM service, trace, Kubernetes node/pod/container, Host or compute instance (AWS EC2, GCP GCE, Azure VM) |
Specific trace ID |
Related log line |
Configure the Collector to enable APM Related Content
The APM service dashboards include charts that indicate the health of the underlying infrastructure. The default configuration of the Splunk Distribution of the OpenTelemetry Collector automatically configures this for you, but if you’re using a custom configuration, read Configure the Collector to enable Related Content for Infra and APM.
Metadata compatibility example
For example, say Splunk Observability Cloud receives the following telemetry data:
-
Splunk APM receives a trace with the metadata key
trace_id:2b78e7c951497655
-
Splunk Log Observer receives a log with the metadata key
trace.id:2b78e7c951497655
Although these refer to the same trace ID value, the log and the trace cannot be correlated in Splunk Observability Cloud because the field names, trace_id
and trace.id
, do not match.
To solve this, rename your log metadata key trace.id
to trace_id
using the field copy processor in Logs Pipeline Management. Alternatively, you can re-instrument your log collection to make metadata key names align.
When the field names in APM and Log Observer match, the trace and the log with the same trace ID value can be correlated in Splunk Observability Cloud. Then, when you are viewing the trace in APM, you can select directly into the log with the same trace ID value and view the correlated log in Log Observer.
Splunk APM
To enable Related Content for APM use one of these span tags:
-
service.name
-
trace_id
Optionally, you can also use deployment.environment
with service.name
.
The default configuration of the Splunk Distribution of the OpenTelemetry Collector already provides these span tags. To ensure full functionality of Related Content, do not change any of the metadata key names or span tags provided by the Splunk OTel Collector.
Learn more:
-
About span tags in Splunk APM, see Manage services, spans, and traces in Splunk APM.
-
About deployment environments in Splunk APM, see Set up deployment environments in Splunk APM.
Leverage Related Content for APM and pod-specific Kubernetes data
For a Related Content tile in APM to link to data for a specific Kubernetes pod (k8s.pod.name
), you must first filter on a specific Kubernetes cluster (k8s.cluster.name
). APM cannot guarantee an accurate Related Content Kubernetes pod destination in Infrastructure Monitoring without both values because Kubernetes pod names are not required to be unique across clusters.
For example, consider a scenario in which Related Content needs to return data for a Kubernetes pod named Pod-B. As shown the following diagram, a Kubernetes implementation can have multiple pods with the same name. For Related Content to return the data for the correct Pod-B, you must also provide the name of the Kubernetes cluster the pod resides in. In this case, that name would be either Cluster-West or Cluster-East. This combination of filtering on cluster and pod names creates the unique combination that Related Content needs to link to the correct pod data in Infrastructure Monitoring.
Kubernetes log fields
The Splunk Distribution of the OpenTelemetry Collector injects the following fields into your Kubernetes logs. Do not modify them if you want to use Related Content.
-
k8s.cluster.name
-
k8s.node.name
-
k8s.pod.name
-
container.id
-
k8s.namespace.name
-
kubernetes.workload.name
Use one of these tag combinations to enable Related Content:
-
k8s.cluster.name
+k8s.node.name
-
k8s.cluster.name
+k8s.node.name
(optional) +k8s.pod.name
-
k8s.cluster.name
+k8s.node.name
(optional) +k8s.pod.name
(optional) +container.id
Learn more about the Collector for Kubernetes at Get started with the Collector for Kubernetes.
Remap log fields
The following table describes the four methods for remapping log fields:
Remapping Method |
Instructions |
---|---|
Log Field Aliasing |
Create and activate a field alias. See Create field aliases to learn how. Learn when to use Log Field Aliasing in the next section. |
Client-side |
Configure your app to remap the necessary fields. |
When to use Log Field Aliasing
Use Log Field Aliasing to remap fields in Splunk Observability Cloud when you cannot or do not want to create a copy processor because any of the following are true:
-
You use Log Observer Connect to get logs data and do not have access to Log Observer Pipeline Management.
-
You do not want to use indexing capacity by creating additional log processing rules.
-
You do not want to transform your data at index time.
-
You want the new alias to affect every log message, even those that came in from a time before you created the alias.
How to change your metadata key names
Change metric and traces names
Use the Splunk Distribution of the OpenTelemetry Collector to ensure that your metrics and traces have the metadata key names required to use Splunk Observability Cloud’s Related Content feature. If you did not use the Collector and your metrics or traces do not include the required metadata key names, you can instrument your applications and serverless functions to include them. See the following pages to learn how:
Change log names
If the required key names use different names in your log fields, remap them using one of the methods listed in Remap log fields.