Make sure to set up alerting in Kibana. For details, see Setup and prerequisites.
Within the Logs, Metrics, and Uptime apps, alerting enables you to detect complex conditions defined by a rule. When a condition is met, the rule tracks it as an alert and responds by triggering one or more actions.
Extend your rules by connecting them to actions that use built-in connectors for email, IBM Resilient, Index, JIRA, Microsoft Teams, PagerDuty, Server log, ServiceNow ITSM, and Slack. Also supported is a powerful webhook output letting you tie into other third-party systems. Connectors allow actions to talk to these services and integrations.