Kubesense

Filters & Interesting Fields

The left sidebar of the Log Explorer provides a powerful faceted filtering system and automatic field extraction. Together, these features let you rapidly narrow down millions of log entries to find exactly what you need.

Filter Panel

Each filter category shows the count of matching log entries, making it easy to identify patterns and narrow down your investigation. You can select multiple values within each filter and combine filters across categories.

Type

Filter logs by severity level. KubeSense recognizes 10 log levels:

LevelDescription
ALERTCritical alerts requiring immediate attention
DEBUGDebug-level diagnostic messages
ERRORError conditions that need investigation
INFOInformational messages about normal operations
INFORMATIONExtended informational messages
NOTICENormal but significant conditions
TRACEFine-grained trace-level messages
UNKNOWNLogs with unrecognized or missing severity
WARNWarning conditions that may require attention
WARNINGExtended warning messages

Each level displays a count (e.g., ERROR 98.74K, INFO 81.71K) so you can immediately see the distribution of log severity across your infrastructure.

Filter Panel — Type, Source, and Format

Source

Filter by the source of log ingestion:

  • OTel — Logs collected via OpenTelemetry SDKs and the OpenTelemetry Collector
  • logs — Logs collected directly from container stdout/stderr or file-based log collection

Format

Filter by the detected log format. KubeSense automatically identifies the format of each log entry:

  • apache — Apache HTTP Server access and error logs
  • json — Structured JSON log entries
  • klog — Kubernetes-style klog format
  • logfmt — Key-value pair logfmt format
  • nginx — Nginx access and error logs
  • syslog — Standard syslog format
  • unknown — Logs that do not match a recognized format

Workload

Filter by Kubernetes workload name. This filter includes a search box for quickly finding specific workloads when you have a large number of deployments. The count next to each workload shows how many log entries it has emitted in the selected time range.

Filter Panel — Workload filter with search

Namespace

Filter by Kubernetes namespace to scope your investigation to a specific environment or team.

Node, Instance, and Container

Additional infrastructure-level filters let you drill down to specific nodes, pod instances, or containers. These filters are especially useful when troubleshooting node-level issues or investigating a specific replica of a workload.

Filter Panel — Namespace, Node, Instance, Container


Interesting Fields

The Interesting Fields section is a powerful feature that automatically extracts and surfaces key attributes from your log data. KubeSense parses your logs in real time, identifies recurring fields and attributes, and presents them as expandable facets.

Interesting Fields — Attribute pattern analysis

When you expand an interesting field, you see the distinct values for that attribute along with their occurrence counts. For example, if your logs contain a msg attribute, the Interesting Fields section might show:

ValueCount
Connection ended1.88K
Connection accepted1.88K
Connected to the server781
No SSO Settings found480
Alert rules fetched360

This is invaluable for identifying:

  • Anomalous patterns — A sudden spike in a specific message after a deployment
  • Error distribution — Which error messages dominate during an incident
  • Behavioral changes — New message patterns that appear after a release
  • Noise reduction — High-frequency messages that may be candidates for log pipeline filtering

You can also use the search box within Interesting Fields to quickly locate specific attributes across your log data.