Post a JSON payload to any URL the moment a log entry matches your conditions.
An alert watches your incoming log stream and fires a notification whenever an entry matches all of its conditions. Each alert can have multiple delivery channels. Use the Test button to fire a sample notification immediately, and the Alert Log to review delivery history.
| Condition | How it matches |
|---|---|
| Logspace | Restrict to a specific logspace, or leave blank to match all. |
| Level | Exact match — e.g. ERROR only fires on error-level entries. |
| Program contains | Case-insensitive substring match on the program field. |
| Message contains | Case-insensitive substring match on the message field. |
{"level": "{level}", "message": "{message}", "program": "{program}", "timestamp": "{timestamp}", "logspace": "{logspace}", "uuid": "{uuid}"}
| Placeholder | Value |
|---|---|
{level} | Log level (e.g. ERROR) |
{message} | Log message text |
{program} | Program / source name |
{timestamp} | ISO 8601 timestamp of the log entry |
{logspace} | Name of the logspace |
{uuid} | UUID of the logspace |
PagerDuty Events API v2
{"routing_key": "YOUR_PAGERDUTY_KEY", "event_action": "trigger", "payload": {"summary": "{message}", "severity": "error", "source": "{program}"}}
Slack incoming webhook
{"text": "[{level}] {program}: {message}"}
Generic JSON API
{"alert": true, "level": "{level}", "text": "{message}", "source": "{program}", "ts": "{timestamp}"}
Content-Type: application/json.