Tutorial: Get started with Log Analytics queries
This tutorial shows you how to use Log Analytics to write, execute, and manage Azure Monitor log queries in the Azure portal. You can use Log Analytics queries to search for terms, identify trends, analyze patterns, and provide many other insights from your data.
In this tutorial, you learn how to use Log Analytics to:
- Understand the log data schema
- Write and run simple queries, and modify the time range for queries
- Filter, sort, and group query results
- View, modify, and share visuals of query results
- Save, load, export, and copy queries and results
Open Log Analytics
To use Log Analytics, you need to be signed in to an Azure account. If you don't have an Azure account, create one for free.
To complete most of the steps in this tutorial, you can use this demo environment, which includes plenty of sample data. With the demo environment, you won't be able to save queries or pin results to a dashboard.
You can also use your own environment, if you're using Azure Monitor to collect log data on at least one Azure resource. To open a Log Analytics workspace, in your Azure Monitor left navigation, select Logs.
Understand the schema
A schema is a collection of tables grouped under logical categories. The Demo schema has several categories from monitoring solutions. For example, the LogManagement category contains Windows and Syslog events, performance data, and agent heartbeats.
The schema tables appear on the Tables tab of the Log Analytics workspace. The tables contain columns, each with a data type shown by the icon next to the column name. For example, the Event table contains text columns like Computer and numerical columns like EventCategory.
Write and run basic queries
Log Analytics opens with a new blank query in the Query editor.
Write a query
Azure Monitor log queries use a version of the Kusto query language. Queries can begin with either a table name or a search command.
The following query retrieves all records from the Event table:
The pipe (|) character separates commands, so the output of the first command is the input of the next command. You can add any number of commands to a single query. The following query retrieves the records from the Event table, and then searches them for the term error in any property:
Event | search "error"
A single line break makes queries easier to read. More than one line break splits the query into separate queries.
Another way to write the same query is:
search in (Event) "error"
In the second example, the search command searches only records in the Events table for the term error.
By default, Log Analytics limits queries to a time range of the past 24 hours. To set a different time range, you can add an explicit TimeGenerated filter to the query, or use the Time range control.
Use the Time range control
To use the Time range control, select it in the top bar, and then select a value from the dropdown list, or select Custom to create a custom time range.
- Time range values are in UTC, which could be different than your local time zone.
- If the query explicitly sets a filter for TimeGenerated, the time picker control shows Set in query, and is disabled to prevent a conflict.
Run a query
To run a query, place your cursor somewhere inside the query, and select Run in the top bar or press Shift+Enter. The query runs until it finds a blank line.
Log Analytics limits results to a maximum of 10,000 records. A general query like
Event returns too many results to be useful. You can filter query results either through restricting the table elements in the query, or by explicitly adding a filter to the results. Filtering through the table elements returns a new result set, while an explicit filter applies to the existing result set.
Filter by restricting table elements
Event query results to Error events by restricting table elements in the query:
In the query results, select the dropdown arrow next to any record that has Error in the EventLevelName column.
In the expanded details, hover over and select the ... next to EventLevelName, and then select Include "Error".
Notice that the query in the Query editor has now changed to:
Event | where EventLevelName == "Error"
Select Run to run the new query.
Filter by explicitly filtering results
To filter the
Event query results to Error events by filtering the query results:
In the query results, select the Filter icon next to the column heading EventLevelName.
In the first field of the pop-up window, select Is equal to, and in the next field, enter error.
Sort, group, and select columns
To sort query results by a specific column, such as TimeGenerated [UTC], select the column heading. Select the heading again to toggle between ascending and descending order.
Another way to organize results is by groups. To group results by a specific column, drag the column header to the bar above the results table labeled Drag a column header and drop it here to group by that column. To create subgroups, drag other columns to the upper bar. You can rearrange the hierarchy and sorting of the groups and subgroups in the bar.
To hide or show columns in the results, select Columns above the table, and then select or deselect the columns you want from the dropdown list.
View and modify charts
You can also see query results in visual formats. Enter the following query as an example:
Event | where EventLevelName == "Error" | where TimeGenerated > ago(1d) | summarize count() by Source
By default, results appear in a table. Select Chart above the table to see the results in a graphic view.
The results appear in a stacked bar chart. Select other options like Stacked Column or Pie to show other views of the results.
You can change properties of the view, such as x and y axes, or grouping and splitting preferences, manually from the control bar.
You can also set the preferred view in the query itself, using the render operator.
Pin results to a dashboard
To pin a results table or chart from Log Analytics to a shared Azure dashboard, select Pin to dashboard on the top bar.
In the Pin to another dashboard pane, select or create a shared dashboard to pin to, and select Apply. The table or chart appears on the selected Azure dashboard.
A table or chart that you pin to a shared dashboard has the following simplifications:
- Data is limited to the past 14 days.
- A table shows only up to four columns and the top seven rows.
- Charts with many discrete categories automatically group less populated categories into a single others bin.
Save, load, or export queries
Once you create a query, you can save or share the query or results with others.
To save a query:
Select Save on the top bar.
In the Save dialog, give the query a Name, using the characters a–z, A–Z, 0-9, space, hyphen, underscore, period, parenthesis, or pipe.
Select whether to save the query as a Query or a Function. Functions are queries that other queries can reference.
To save a query as a function, provide a Function Alias, which is a short name for other queries to use to call this query.
If you are in a Log Analytics workspace, provide a Category for Query explorer to use for the query. (Categories aren't available for Applications Insights queries)
To load a saved query, select Query explorer at upper right. The Query explorer pane opens, listing all queries by category. Expand the categories or enter a query name in the search bar, then select a query to load it into the Query editor. You can mark a query as a Favorite by selecting the star next to the query name.
Export and share queries
To export a query, select Export on the top bar, and then select Export to CSV - all columns, Export to CSV - displayed columns, or Export to Power BI (M query) from the dropdown list.
The following video shows you how to integrate Log Analytics with Excel.
To share a link to a query, select Copy link on the top bar, and then select Copy link to query, Copy query text, or Copy query results to copy to the clipboard. You can send the query link to others who have access to the same workspace.
Advance to the next tutorial to learn more about writing Azure Monitor log queries.