Aim of this article | This section shows how to set up advanced alerts which scan the log and watch out for specific logging levels (errors, warnings etc.). This option is only for experienced users who are familiar with logging levels and log files structure. Inexpert usage can result in false positives and redundant alerts. |
---|---|
Related sections | Account Notifications (Reference Manual) |
Required permissions | Alerts - edit |
To create a new alert:
Go to Account > Notifications > Alert Rules.
Click New Rule.
Fill in the following fields:
Rule Name – Enter a name of the rule.
Enable – Allows you to turn on and off the rule.
Select Service – Select either IM instance or partition or Accelerator whose log file should be monitored.
Accelerator can be selected only from the Global Alerts section.Matching Rule – Define what logging level from the log file should trigger the alert.
To trigger an alert for lines with the status ERROR
level:ERROR
To trigger an alert for any line in the log
level:*
Email Notifications – Enter emails of people who should get the alert notification. The email contains identification of the account and partition/integration, the number of alert occurrences, the last record ID and in the attachment the first five records (JSON) which triggered the alert.
The limit for this field is 4000 characters.Webhook Notification – Enter MS Teams or Slack webhook URL, so that you receive the notification in one of these channels. For details see How to Get Webhook URL.
Frequency – Currently, the alert is executed every 5 minutes and this value cannot be changed.
Occurrence – Allows you to specify after how many occurrences of the given logging level the alert should be triggered.
Severity – Allows you to decide on the criticality of the alert. Select from: Critical, High, Medium or Low.
Save the rule.