You can set up Logz.io log alerts to automatically get notified about issues that demand attention. Alerts are also great building blocks for Kibana dashboards and visualizations.
Logz.io alerts use a Kibana search query to continuously scan your logs and alert you when a certain set of conditions is met. The simplest alerts can use a simple search query or a particular filter, but others can be quite complex and involve several conditions with varying thresholds.
By customizing alerts, you can ensure that you’re notified of critical events.
You have the option to configure alerts to send out notification emails or messages over popular channels. Alternatively, you can create alerts that won’t send out notifications or will send them out less often. This can help to reduce alert fatigue. Either way, you can always review your triggered alerts in Kibana.
To reach this page, select Alerts & Events > Alert definitions from the top menu.
You’ll see a paginated list of all alerts configured for your account.
You can enable/disable alerts, as needed.
You can click the column headers to sort the list by severity or chronologically by when alerts were created or updated.
You can click the Menu button to edit, duplicate, or delete an alert.
To view the alert logs over the last 3 days, click the Menu button and select View last events.
You’ll be taken to Kibana Discover, with the logs filtered by the alert ID over the last 36 hours. Each log document represents an event when the alert triggered.
You can click the Investigate button to drill down on the raw logs that caused the alert to trigger.
You can filter the list of alerts by tags, severity, who created and/or updated the alert, and its status (whether it is active or disabled).