Configuring flow alerts
A flow alert is designed to notify you when any combination of alert events occurs in a specific sequence within a defined time frame.
For example, to monitor when the rate of HTTP requests increase because of high CPU utilization, you can define a Flow Alert that triggers when an alert that monitors a high HTTP error rate triggers within a defined timeframe followed by a high CPU utilization alert.
Some uses of flow alerts include:
-
Comprehensive data correlation: You can correlate alerting on logs, metrics, and security events. This multifaceted approach provides a holistic view of your system's performance, not just isolated slices of information, ensuring you have all the data you need to make informed decisions.
-
Advanced root cause analysis: Flow alerts can be configured to identify the root cause of an issue. With the ability to define an alert that already pinpoints the root cause, you can promptly respond to issues, thus reducing system downtime and enhancing operational efficiency.
-
Reduced alert fatigue: Traditional monitoring systems often flood users with redundant alerts, leading to alert fatigue and the potential overlooking of critical issues. By applying an ordered, time-bound criteria filter, flow alerts significantly reduce false alerts. This means that you only get alerted when all the set conditions are met, saving you from unnecessary notification noise.
You can further declutter your notifications by enabling phantom mode for individual alerts comprising a flow alert. Then, only the flow alert triggers the notification sequence and creates an incident, while its constituent alerts remain silenced.
-
Customizable alert sequences: With flow alerts you can define your alerting sequence with a simple drag-and-drop interface. Create a flow that triggers only if all criteria are met by order and time, providing an intuitive and custom monitoring experience.
-
Efficient troubleshooting: With the ability to visualize the sequence of alerts on a canvas, troubleshooting becomes easier and more efficient. You can easily identify patterns, understand the chain of events leading to an alert, and quickly act to rectify the issue.
-
Optimized resource utilization: You will save significant time and resources by reducing false alerts and enabling root cause identification. This optimization lets your team focus on more strategic tasks, rather than being occupied with a constant stream of false alerts.
Understanding flow logs building blocks
The flow builder tool is used to visually combine and then chain the user-defined alerts that will trigger a flow alert. The basic building blocks of the flow alert are stages and groups.
A group represents a logical combination of individual user-defined alerts. The group supports OR, AND, and NOT logical operators to combine multiple individual alerts.
A stage represents alert groups that need to trigger within a specified timeframe. Multiple groups can be present in a stage.
Flow logs limitations
Flow logs have the following limitations:
-
The cumulative timeframe for all stages cannot exceed 168 hours (1 week). If you insert a timeframe exceeding the limit, the input will reset to zero.
-
A maximum of 30 alerts can be included into a single flow alert.
-
The following alert types do not support the
NOTlogical operator:
Prereqs
- Learn about alerts in IBM Cloud Logs. For more information, see Alerting.
- Check that you have an Event Notifications instance that is in the same account as your IBM Cloud Logs instance and permisions to configure resources in the Event Notifications instance.
- Check that the outbound integration between the IBM Cloud Logs instance and the Event Notifications instance is configured. For more information, see Configuring an outbound integration to connect.
Launch alerts management
Complete the following steps:
- In the console, click the Navigation Menu icon
> Resource list.
- Select your instance of IBM Cloud Logs.
- In the IBM Cloud Logs navigation, click the Alerts icon
> Alerts Management.
- Click New alert.
Choose the type of alert to configure
Complete the following steps:
-
Choose the alert type. For more information, see Alert types.
-
In the Details section, complete the following steps:
-
Enter a name and a description.
-
The maximum length of the name is 4096 characters.
-
The maximum length of the description is 4096 characters.
-
-
Define the severity of the alert.
Valid values are:
Info,Warning,Error, andCritical.This option is only available in certain regions. Your region might not have this option available.
-
Add labels.
Labels are key:value pairs that you can use later for quick searching.
-
Define the alert flow
-
Click Open Flow Builder. The builder dialog dispays with the previously configured alerts in the Existing alerts panel.
-
Drag and drop existing alerts from the Existing alerts panel into the flow builder workspace area.
-
Organize alerts into groups and stages.
-
Set a timefram for each stage.
-
Click Apply to save the alert flow.
-
Select the Group By keys.
The available keys will be the intersection group between the different alerts. For example, if Alert A is grouped by
Regionand byCluster, and Alert B is grouped byRegionand byPod, the alert flow will only be able to be grouped byRegion, and not byClusterorPod, since that is the only group by option available to both alerts in the flow. You can see which group by options are available for each alert in the alert builder by hovering over the alert and viewing the alert description.
Configure the notification details
Complete the following steps:
-
Configure Notify every to define how often you want to get an event once the alert is triggered. By default is set to 0 hours and 10 minutes.
-
Enable Resolve automatically to get an event when the event has been resolved.
When the alert's condition is no longer triggering events, the event that is trigered initially is marked as resolved.
-
Enable Enable phantom mode to indicate that this alert is a phantom alert.
A Phantom alert serves as a building block for flow alerts.
A Phantom alert does not trigger independent event notifications.
When you enable this option, Notifications section is removed from the alert definition.
-
Add an integration.
You must have an outbound integration defined to be able to add an integration. For more information, see Configuring the integration with the Event Notifications service.
Set a schedule and what log content to include
Complete the following steps:
-
In the Schedule section, set a Schedule to control when this alert is enabled. You can choose specific days and times.
-
In the Notification Content section, define whether you want to include a sample log line or only some fields in the event that is triggered.
Choose specific JSON keys to include in the alert notification, or leave this blank to include the full log text in the alert message:
-
Option 1: Leave blank to include one log line that matches the filtering conditions of the alert.
-
Option 2: Specify JSON keys to include selected fields in the format of key:value pairs. Notice that to be able to add fields, your log records must be in JSON format.
JSON keys containing a
.in their name cannot be used as selected fields. -
Option 3: Specify a JSON path as the filter.
-
When an alert is triggered, there are limitations to the amout of data that is included in the event. For more information on these limitations, see Data size.
Save the alert configuration
Complete the following steps:
-
Verify the alert.
Click Verify to evaluate data to find out how many times the alert matched the criteria in the last 24 hours.
Verify evaluates data in the Priority insights pipeline only. If your alert is configured to trigger on data that is available in the Analyze and alert pipeline, notice that this feature is not available.
-
Click CREATE ALERT.
Verifying your alert
Trigger an alert. Once an alert is triggered and processed, the system sends notifications to the designated users or teams through various channels such as email, Slack, SMS, or integrated incident management platforms. You can then go to the Incidents page to see information about the alerts that are triggered. For more information, see Managing triggered alerts in IBM Cloud Logs.