Make sure to set up alerting in Kibana. For details, see Setup and prerequisites.

Within the Logs, Metrics, and Uptime apps, alerting enables you to detect complex conditions defined by a rule. When a condition is met, the rule tracks it as an alert and responds by triggering one or more actions.

Alerting can be centrally managed from the Kibana Management UI and provides a set of built-in rule types and connectors for you to use.

Extend your rules by connecting them to actions that use built-in connectors for email, IBM Resilient, Index, JIRA, Microsoft Teams, PagerDuty, Server log, ServiceNow ITSM, and Slack. Also supported is a powerful webhook output letting you tie into other third-party systems. Connectors allow actions to talk to these services and integrations.