In this article, we will learn How to Send Email Alerts Using Elastic Stack. Monitoring your system’s health is very important in today’s IT environments. Elastic Stack, commonly known as ELK Stack, helps collect and visualize logs and metrics. But sometimes, visual dashboards aren’t enough we need alerts when something goes wrong. That’s where email alerts come in. Today we’ll learn how to send email notifications using connectors in the Elastic Stack when critical alerts like high CPU or memory usage are triggered.
Table of Contents
Prerequisites
- AWS Account with Ubuntu 24.04 LTS EC2 Instance.
- At least 2 CPU cores and 4 GB of RAM for smooth performance.
- Docker and Docker Compose installed.
Step #1:Install Docker and Docker Compose
First update the package list.
sudo apt update

If Docker and Docker Compose are not already installed, you can install them using the following command.
sudo apt install -y docker.io docker-compose

docker.io
: Installs the Docker engine.docker-compose
: Installs Docker Compose for managing multi-container applications.
Step #2:Create Docker Compose File
Create a Docker Compose YAML file to define the Elastic Stack services.
sudo nano docker-compose.yml

Paste the following content into the file.
version: "3"
services:
elasticsearch:
image: "docker.elastic.co/elasticsearch/elasticsearch:8.17.2"
environment:
- "ES_JAVA_OPTS=-Xms1g -Xmx1g"
- "discovery.type=single-node"
ports:
- "9200:9200"
volumes:
- elasticsearch_data:/usr/share/elasticsearch/data
kibana:
image: "docker.elastic.co/kibana/kibana:8.17.2"
ports:
- "5601:5601"
filebeat:
image: "docker.elastic.co/beats/filebeat:8.17.2"
user: root
volumes:
- /MY_WORKDIR/filebeat.yml:/usr/share/filebeat/filebeat.yml:ro
- /var/lib/docker:/var/lib/docker:ro
- /var/run/docker.sock:/var/run/docker.sock
metricbeat:
image: docker.elastic.co/beats/metricbeat:8.17.2
user: root
volumes:
- /MY_WORKDIR/metricbeat.yml:/usr/share/metricbeat/metricbeat.yml:ro
- /var/run/docker.sock:/var/run/docker.sock
- /sys/fs/cgroup:/hostfs/sys/fs/cgroup:ro
- /proc:/hostfs/proc:ro
- /:/hostfs:ro
volumes:
elasticsearch_data:

Step #3:Prepare Configuration Files For Beats
Create a working directory for your configuration files.
sudo mkdir /MY_WORKDIR

Inside the directory create a filebeat.yml file.
sudo nano /MY_WORKDIR/filebeat.yml

Paste the following config in it.
filebeat.inputs:
- type: container
paths:
- '/var/lib/docker/containers/*/*.log'
processors:
- add_docker_metadata:
host: "unix:///var/run/docker.sock"
- decode_json_fields:
fields: ["message"]
target: "json"
overwrite_keys: true
output.elasticsearch:
hosts: ["elasticsearch:9200"]
indices:
- index: "filebeat-%{[agent.version]}-%{+yyyy.MM.dd}"
logging.json: true
logging.metrics.enabled: false

Create a metricbeat.yml file.
sudo nano /MY_WORKDIR/metricbeat.yml

Paste the following config in it.
metricbeat.modules:
- module: system
metricsets:
- cpu
- memory
- network
- filesystem
- process
- process_summary
enabled: true
period: 10s
processes: ['.*']
hostfs: "/hostfs"
- module: docker
metricsets:
- container
- cpu
- diskio
- healthcheck
- info
- memory
- network
hosts: ["unix:///var/run/docker.sock"]
period: 10s
enabled: true
output.elasticsearch:
hosts: ["http://elasticsearch:9200"]
monitoring:
enabled: true

Step #4:Start the Elastic Stack using Docker Composer
Start the services using Docker Compose.
sudo docker-compose up -d

Verify that the containers are running.
sudo docker ps -a

Step #5:Set Password for Elastic User
Elasticsearch 8.x enables security by default. Reset the password for the elastic user using following command.
sudo docker exec -it ubuntu_elasticsearch_1 /usr/share/elasticsearch/bin/elasticsearch-reset-password -u elastic -i

Update the Filebeat configuration to include the Elasticsearch credentials.
sudo nano /MY_WORKDIR/filebeat.yml

Add the username and password fields under output.elasticsearch.
output.elasticsearch:
hosts: ["elasticsearch:9200"]
username: "elastic"
password: "devopshint"
indices:
- index: "filebeat-%{[agent.version]}-%{+yyyy.MM.dd}"

Save and exit the file.
Update the Metricbeat configuration to include the Elasticsearch credentials.
sudo nano /MY_WORKDIR/metricbeat.yml

Add the username and password fields under output.elasticsearch.
output.elasticsearch:
hosts: ["elasticsearch:9200"]
username: "elastic"
password: "devopshint"

Restart the containers. First shut down the containers.
sudo docker-compose down

Then start them again.
sudo docker-compose up -d

Step #6:Secure Kibana with Service Token
To securely connect Kibana to Elasticsearch, generate a service account token.
curl -u elastic:devopshint -X POST "http://localhost:9200/_security/service/elastic/kibana/credential/token/my-token"; echo

Save the value field from the response.
Generate an encryption key.
openssl rand -hex 32

Save the generated encryption key.
Update the docker-compose.yml file to include the service account token and encryption keys.
sudo nano docker-compose.yml

Add the following environment variables to the kibana service.
kibana:
image: "docker.elastic.co/kibana/kibana:8.17.2"
ports:
- "5601:5601"
environment:
- ELASTICSEARCH_HOSTS=http://elasticsearch:9200
- ELASTICSEARCH_SERVICEACCOUNTTOKEN=AAEAAWVsYXN0aWMva2liYW5hL215LXRva2VuOnEwby1YUGlyU1JhZnFxaEozS012aVE
- XPACK_SECURITY_ENCRYPTIONKEY=2145ee3c3cc4e7853c77e96a7cd7e0fe102ea5ffa948e368132b525af018db0c
- XPACK_ENCRYPTEDSAVEDOBJECTS_ENCRYPTIONKEY=2145ee3c3cc4e7853c77e96a7cd7e0fe102ea5ffa948e368132b525af018db0c
- XPACK_REPORTING_ENCRYPTIONKEY=2145ee3c3cc4e7853c77e96a7cd7e0fe102ea5ffa948e368132b525af018db0c
- XPACK_SECURITY_SECURE_COOKIES=true
depends_on:
- elasticsearch

Save and exit the file.
Restart the services.
sudo docker-compose down

sudo docker-compose up -d

Verify that the containers are running.
sudo docker ps -a

Step #7:Access Kibana Observability
Open your browser and navigate to http://<EC2-PUBLIC-IP>:5601. Log in using the elastic username and the password you set earlier.

Click on Explore on my own.

Go to Observability.

You will see the Overview there.

Now lets go to Infrastructure Inventory to see the metrics.

Step #8:Create a Email Alert
Next lets set up alert for that go to Alerts as shown below and click on Manage Rules.

Click on Create rule to create a rule for alert.

We will create a Metric threshold rule.

Write a Name for your rule. As conditions as
- WHEN Average
- OF system.cpu.total.pct
- IS ABOVE 0.9 %
And click on Save.

You can see the rule created successfully. Now go back to Alerts.

As you can see below alert is triggered.

Now go to Stack Management Under the Kibana Section.

Go to the Connectors.

Click on Create connector.

To set up an Email connector you need to upgrade your license so go to Manage license.

Select Start trial to Start a 30-day trial.

Click on Start my trial.

Now you can see Our Trial license is active.

Now again go back to connectors and select Email as a connector.

Enter the relative fields as shown below,
- Connector name: Alert Email Connector
- Sender: sender-email-id
- Service: Gmail
- Username: your-email-id
- Password: App Password (Generated from Google Account)
Click on Save & test.

Now enter the email id in To field where you want to send the email. Then Subject like High CPU Usage and Message along with it CRITICAL: High CPU Usage !! and click on Run to Run the test.

In Results you can see the Test is successful message

Now check your Gmail to see if it has send an alert.

And you can see the alert below.

Conclusion:
Using email alerts in Elastic Stack helps you stay informed when system issues happen even if you’re not watching dashboards 24/7. With the help of connectors, it’s easy to configure alert rules that notify you immediately via email. Whether it’s high CPU usage or low disk space, timely alerts can help prevent downtime and fix problems faster. By setting up connectors and alert rules, you’ve made your monitoring setup much more powerful and proactive.
Related Articles:
Observability Dashboard Overview in Elastic Stack
Observability Dashboard Overview in Elastic Stack (Logs and Infrastructure) – Part 2
Send Java Gradle App Logs to Elastic Stack
Reference: