So, the first thing in order to get a watch up and running is come up with a query that will answer your question - even before you start writing a watch.
Once you got that, you wrap that watch into a search input and then come up with the watch condition and an logger action - once that works, create an email action.
it's important to go step by step.
Have you managed to write a decent query already? If not, please explain in more detail what the issue is, as otherwise it will be hard to help.
i tried this as per following : (fields.RequestPath = /documentService/v1/Document/uploadLink ) in Kibana logs for more than 12 hours?
means if we didnt receive the request path (/documentService/v1/Document/uploadLink) or the "uploadlink" word in our logs in next 12 hours so then fire an alert.
i tried this but dont think is the right one, can you please have a look...
The problem with this query is it fire an alert for example if the upload link "word" is either present or not in the logs, it will just fire.
The condition I am trying to apply is for example in the query of next 12 hours if the "word" upload link doesn't appear in the logs it should fire an event but in my script either the upload link is presnet or not present in the logs it will still fire an alert.
So my goal is to find a condition that if this word doesn't appear in the logs for x number of hours in the logs just shoot an alert.
Apache, Apache Lucene, Apache Hadoop, Hadoop, HDFS and the yellow elephant
logo are trademarks of the
Apache Software Foundation
in the United States and/or other countries.