You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 22, 2017. It is now read-only.
I am trying to use the ELK stack for monitoring production systems and I would love for there to be a feature in Kibana that can see that a query (eg. message description contains "lost connection" or "fatal error") has hits and if the hits exceed some number of hits in some number of minutes (eg 5 hits in 10 minutes) it sends an email to a pre-configured email address containing a link to a dashboard at the time of the error and contains fields from the events that triggered the alert. I know there is some sort of this functionality in the logstash config file but that would require editing the config every time you want to add a new alert. Is this possible?
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
I am trying to use the ELK stack for monitoring production systems and I would love for there to be a feature in Kibana that can see that a query (eg. message description contains "lost connection" or "fatal error") has hits and if the hits exceed some number of hits in some number of minutes (eg 5 hits in 10 minutes) it sends an email to a pre-configured email address containing a link to a dashboard at the time of the error and contains fields from the events that triggered the alert. I know there is some sort of this functionality in the logstash config file but that would require editing the config every time you want to add a new alert. Is this possible?
The text was updated successfully, but these errors were encountered: