Rule types

edit

A rule is a set of conditions, schedules, and actions that enable notifications. Kibana provides rules built into the Elastic Stack and rules registered by one of the Kibana apps. You can create most rules types in Stack Management > Rules and Connectors. For information on creating security rules, refer to Create a detection rule.

Some rule types are subscription features, while others are free features. For a comparison of the Elastic subscription levels, see the subscription page.

Stack rules

edit

Stack rules are built into Kibana. To access the Stack Rules feature and create and edit rules, users require the all privilege. See feature privileges for more information.

Elasticsearch query

Run a user-configured Elasticsearch query, compare the number of matches to a configured threshold, and schedule actions to run when the threshold condition is met.

Index threshold

Aggregate field values from documents using Elasticsearch queries, compare them to threshold values, and schedule actions to run when the thresholds are met.

Transform rules

[beta] This functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features. Run scheduled checks on a continuous transform to check its health. If a continuous transform meets the conditions, an alert is created and the associated action is triggered.

Tracking containment

Run an Elasticsearch query to determine if any documents are currently contained in any boundaries from a specified boundary index and generate alerts when a rule’s conditions are met.

Observability rules

edit

Observability rules are categorized into APM and User Experience, Logs, Metrics, Stack Monitoring, and Uptime.

If you create a rule in the Observability app, its alerts are not visible in Stack Management > Rules and Connectors. They are visible only in the Observability app.

APM and User Experience

Detect complex conditions in APM data and trigger built-in actions when the conditions are met.

Logs rules

Detect complex conditions in the Logs app.

Metrics rules

Detect complex conditions in the Metrics app.

Stack Monitoring

Provide Kibana alerting rules out-of-the box to notify you of potential issues in the Elastic Stack.

Uptime rules

Detect complex conditions in the Uptime app.

Machine learning rules

edit

[beta] This functionality is in beta and is subject to change. The design and code is less mature than official GA features and is being provided as-is with no warranties. Beta features are not subject to the support SLA of official GA features. Machine learning rules run scheduled checks on an anomaly detection job to detect anomalies with certain conditions. If an anomaly meets the conditions, an alert is created and the associated action is triggered.

Security rules

edit

Security rules detect suspicious source events with pre-built or custom rules and create alerts when a rule’s conditions are met. For more information, refer to Security rules.

Alerts associated with security rules are visible only in the Elastic Security app; they are not visible in Stack Management > Rules and Connectors.