It only takes a few minutes to add an ElastAlert server to any of your Logit ELK stacks. Once enabled, you'll be able to edit and setup alerting rules for all your stacks.

If you don't yet have a Logit account, sign up on the Logit homepage and create your account.

Here's how the 14 day free trial works:

  1. You can create up to 3 production ready ELK stacks in a trial.
  2. All free for 14 days, no credit card required.
  3. After your free trial ends, products start at $49 per month.

Provision your ElastAlert server

When you login in your stacks are displayed on the dashboard. To enable alerts for a stack, choose the settings button.

Next, choose Alerts and then click Provision ElastAlert for this stack 

Then create your ElastAlert rule

Use the code block below to quickly get started with your Pagerduty alert.

name: Production App Errors

type: any

# (Required)
# Index to search, wildcard supported

index: logstash-*

## Receive an alert for every single match

  minutes: 0

# (Required)
# A list of elasticsearch filters used for find events
# These filters are joined with AND and nested in a filtered query

- query:
      query: "type: error"

# (Required)
# The alert used when a match is found

- "pagerduty"

# Integration Key generated by PagerDuty
pagerduty_service_key: your_pagerduty_service_key

# The name of the monitoring client that is triggering this event
pagerduty_client_name: your_pagerduty_client_name

How to use the code

  1. Paste the code into the alert replacing any existing rule.
  2. Then just edit the code to match the filter query you need, in this case we are looking for matches on "type:error".
  3. Choose test to run the rule against your data over the last 24hrs.
  4. Once happy, choose update to apply and save the rule.

Now you're all set to send Pagerduty alerts from Logit.

What's next?

Did this answer your question?