Log Rule

A robust Infraon Infinity solution must monitor certain events in real-time to facilitate swift responses to security threats. Log rules are essential components that define how log data is processed, examined, and acted upon within logging and monitoring systems.

Note: Ensure you have the appropriate permissions before creating or modifying alerts.

Infraon's alerting system allows you to set up rules that continuously scan log data for specific conditions. When these conditions are met, the system triggers predefined alerts.

In essence, rules are predetermined scenarios that, when matched, initiate an alarm, event, or configured action. Each rule consists of three key elements:

  • A specific query to be executed

  • Parameters that determine what constitutes a rule match

  • A set of alerts to be triggered when a match occurs

Rule Types:

Infraon Infinity allows you to set up rules that can trigger alarms or send notifications to users through email or SMS. These rules are based on specific criteria you define, such as error rate thresholds or particular log patterns. The system offers two main types of rules:

Custom Query

Custom query rules use tailored search parameters to identify alert-worthy conditions in your log data. To set up a custom query rule:

  • Formulate a query that filters the log data you want to monitor

  • Design the query to capture the exact conditions that should trigger an alert

  • Specify how often the system should run this query to check for matching log entries (e.g., every 5 minutes)

Threshold Rule

Activates when defined thresholds are reached. Select the metric or data point for monitoring. For instance, you could track the number of error logs or the average response time. Establish the alert triggers, such as limits for high error frequencies or unexpected data surges.

  • Trigger Condition: For example, if the error tally reaches over 100 in 5 minutes.

  • Alert Frequency: The regularity of condition assessment (e.g., every 5 minutes).

Instructions to add a New Log rule 

  • Go to Infraon configuration -> IT Operations -> Rules and click on the ‘New Rule’ button at the top right corner and Add Log rule option to continue. 

  • Refer to the table below to add the details respectively.

Add Log Rule | Details

Label

Action/ Description

Example

Log Rule

Name

Add a name to the Log rule

Description

Add a brief description of the Log rule

Status

Activate the rule by switching the toggle button on. The rule will only function when its status is on.

Rule Type

Select the respective rule type from the below call-out boxes.

Custom query and Threshold Count.

Criteria

Index Pattern/ Data View

Select the type of data to be entered.

Value

Input the relevant value in the Multi-Index field to specify which index the rule should be applied to.

Windows*, or windows-2024.09.12, windows-2024.09.13

Custom Filters

Add custom filters to define specific conditions for your logs or metrics.

For example, you might want to filter logs where the status_code is 500 and the response_time exceeds 2s.

Check Every

This will run periodically and detect alerts within the specific time frame.

2 seconds/minutes

Look Back

Add time to the look-back period to prevent missed alerts.

3 seconds/minutes

Group By

Add the field by which you want to group. This could be any field from your logs or metrics.

For example, you might group by service_name to get separate alerts for each service.

Count

Add the respective count from the drop-down box below.

Hostname, IP Address, Message, Agent Name, Host ID.

Threshold

Set a limit for how many times a certain event can happen. This limit is based on the group of users you're looking at.

2,3,4…. Etc.

Action

Severity

Choose the appropriate urgency level for the event this rule will generate from the drop-down box below.

Critical, Major, and Minor are the highest and Minor the lowest.

Alarm/ Event Message

Enter a personalized notification text that will appear in the event when the rule is triggered.

Once the details have been added, click “Save” to confirm the rule configurations.

Last updated