Alert Notifications
Alert Notification notifies you when an alert rule is triggered. You can set it to send a notification every time the alert rule is triggered, or send it manually from Incidents. By defining how and when you are notified, alert notifications help ensure timely response, reduce the risk of security incidents, and support effective incident handling.
Logpoint supports multiple notification types, allowing you to integrate alerts into your existing workflows and tools:
Email Sends alert details directly to specified email addresses when an alert rule is triggered. You must configure the SMTP service before using email notifications.
HTTP Sends an HTTP or HTTPS request to a specified URL when an alert rule is triggered. Supported request methods include GET, POST, PUT, DELETE, PATCH, and HEAD.
IncMan Sends critical event notifications directly to IncMan Incident Management for centralized incident handling.
SSH Executes a command or script on a remote server via SSH using data from the triggered alert.
SSH for Syslog Sends alert data to a remote system over SSH in syslog format.
SMTP for Syslog Sends alert data using SMTP in syslog format.
SMS Sends alerts to a mobile device via SMS. The SMSC server must be accessible from Logpoint before configuring SMS notifications.
SNMP Sends alerts to an SNMP-enabled network management system for integration with monitoring tools.
For SMTP
For SMTP, you can include the Jinja2 syntax in the Message textbox to deliver more information about the alert rule fired. Using Jinja2, you can explain the incident in an elaborate way and can fetch individual data while the alert is fired.
{{rows_count}} returns the count of the rows.
{{rows}} returns the list of rows returned from a search query.
{{rows}} returns a list in a machine-readable format which is difficult to read. Use filter functions with your Jinja syntax for a readable list. The available filter functions are as follows:
readable This command has its effect according to the query provided in the alert; for plain search, it returns the result in a list, whereas for queries with a chart/time chart, it displays the output in a tabular form. Use this filter as:
date
You can convert the fields containing UNIX timestamps in year/month/day format. Use this filter as:
time This command converts the UNIX timestamp and displays the time in the format hour:minute:second. Use this filter as:
datetime You can use this syntax to convert datetime from UNIX timestamp. The result is displayed in the year/month/day hour:minute:second format. Use this filter as:
You can also provide additional parameters to specify the required format.
Syntax to specify the format:
For example:
Iteration Through Values
You can iterate through the values returned from {{rows}}, use loops to view the items returned.
For query
You can use the following syntax in the message:
This outputs the device_ip for every list returned by rows.
For Simple Search
You can use the readable function in case of simple search queries. If the parameters returned from the search queries contain UNIX timestamps, then you can use the date, time, or datetime to convert them into a readable form.
For searches with chart/timechart You can use the readable function to clearly understand the values returned from the {{rows}}. If grouping functions used in the search query return the parameters containing UNIX timestamps, then you can convert filter functions date, time, and datetime into readable form. All the filter functions except the readable should be used in loops.
When using a timechart in a search query, the timechart function is considered an aggregation function because it returns a UNIX timestamp for the search results. Therefore, when you use timechart count(), the count() part is the primary aggregation function. You can use the Jinja syntax as:
where colx is the displacement count of the timechart function.
Timechart can be represented with the timestamp, so you can write Jinja syntax as:
Order of Operations
For query:
Use the following jinja syntax:
The grouping function is written as it is in the query making device_ip and source_address same in query and syntax. Aggregation functions can be mentioned with their aliases; max(port) in the search query is denoted as MAX in jinja syntax. You can use the position of the functions and name them accordingly.
For the query above:
The numbering starts from the first grouping function and goes from left to right as:
The complex functions such as step(destination_port,100) can not be used directly in jinja, the only way to use them is by using displacement count.
Example:
Once the grouping functions are done with naming, the order moves to the beginning of the aggregation function and the numbering goes as:
If aliases are used for aggregation functions, they can be written directly in jinja syntax. In the example above, for max(port) the Jinja syntax can be written as:
For SSH
For SSH in the SSH command, you can use the following Jinja2 keywords:
Keyword
Syntax Definition
{{rows_count}}
Number of rows
{{alert_name}}
Name of the alert
{{correlation_name}}
Name of the correlation
{{detection_timestamp}}
Detection timestamp
{{risk_level}}
Risk level
For example:
For the query User Login, you can use the command:
After the alert is fired, the login_alert text is created at the destination location with the number of rows and the risk level of the alert.
Last updated
Was this helpful?



