You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-processing-rules.md
+7-10Lines changed: 7 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Alert processing rules for Azure Monitor alerts
3
-
description: Understand what alert processing rules in Azure Monitor are and how to configure and manage them.
3
+
description: Understand Azure Monitor alert processing rules and how to configure and manage them.
4
4
ms.topic: conceptual
5
5
ms.date: 2/23/2022
6
6
ms.reviewer: ofmanor
@@ -13,9 +13,9 @@ ms.reviewer: ofmanor
13
13
<aname="suppression-of-alerts"></a>
14
14
15
15
> [!NOTE]
16
-
> The previous name for alert processing rules was action rules. The Azure resource type of these rules remains **Microsoft.AlertsManagement/actionRules**for backward compatibility.
16
+
> Alert processing rules were previously known as 'action rules'. For backward compatibility, the Azure resource type of these rules is still **Microsoft.AlertsManagement/actionRules** .
17
17
18
-
Alert processing rules allow you to apply processing on fired alerts. You might be familiar with Azure Monitor alert rules, which are rules that generate new alerts. Alert processing rules are different. They're rules that modify the fired alerts themselves as they're being fired.
18
+
Alert processing rules allow you to apply processing on fired alerts. Alert processing rules are different from alert rules. Alert rules generate new alerts, while alert processing rules modify the fired alerts as they're being fired.
19
19
20
20
You can use alert processing rules to add [action groups](./action-groups.md) or remove (suppress) action groups from your fired alerts. You can apply alert processing rules to different resource scopes, from a single resource, or to an entire subscription. You can also use them to apply various filters or have the rule work on a predefined schedule.
21
21
@@ -25,13 +25,13 @@ Some common use cases for alert processing rules are described here.
25
25
26
26
Many customers set up a planned maintenance time for their resources, either on a one-time basis or on a regular schedule. The planned maintenance might cover a single resource, like a virtual machine, or multiple resources, like all virtual machines in a resource group. So, you might want to stop receiving alert notifications for those resources during the maintenance window. In other cases, you might prefer to not receive alert notifications outside of your business hours. Alert processing rules allow you to achieve that.
27
27
28
-
You could alternatively suppress alert notifications by disabling the alert rules themselves at the beginning of the maintenance window. Then you can reenable them after the maintenance is over. In that case, the alerts won't fire in the first place. That approach has several limitations:
28
+
You could suppress alert notifications by disabling the alert rules themselves at the beginning of the maintenance window, and reenable them after the maintenance is over. In that case, the alerts won't fire in the first place. That approach has several limitations:
29
29
30
30
* This approach is only practical if the scope of the alert rule is exactly the scope of the resources under maintenance. For example, a single alert rule might cover multiple resources, but only a few of those resources are going through maintenance. So, if you disable the alert rule, you won't be alerted when the remaining resources covered by that rule run into issues.
31
31
* You might have many alert rules that cover the resource. Updating all of them is time consuming and error prone.
32
32
* You might have some alerts that aren't created by an alert rule at all, like alerts from Azure Backup.
33
33
34
-
In all these cases, an alert processing rule provides an easy way to achieve the notification suppression goal.
34
+
In all these cases, an alert processing rule provides an easy way to suppress notifications.
35
35
36
36
## Management at scale
37
37
@@ -51,10 +51,6 @@ For those alert types, you can use alert processing rules to add action groups.
51
51
## Scope and filters for alert processing rules
52
52
<aname="filter-criteria"></a>
53
53
54
-
An alert processing rule definition covers several aspects, as described here.
55
-
56
-
### Which fired alerts are affected by this rule?
57
-
58
54
This section describes the scope and filters for alert processing rules.
59
55
60
56
Each alert processing rule has a scope. A scope is a list of one or more specific Azure resources, a specific resource group, or an entire subscription. *The alert processing rule applies to alerts that fired on resources within that scope*.
@@ -68,12 +64,13 @@ Alert rule ID | The rule applies only to alerts from a specific alert rule. The
68
64
Alert rule name | The rule applies only to alerts with this alert rule name. It can also be useful with a **Contains** operator. |
69
65
Description | The rule applies only to alerts that contain the specified string within the alert rule description field. |
70
66
Monitor condition | The rule applies only to alerts with the specified monitor condition, either **Fired** or **Resolved**. |
71
-
Monitor service | The rule applies only to alerts from any of the specified monitor services. For example, use **Platform** to have the rule apply only to metric alerts. |
67
+
Monitor service | The rule applies only to alerts from any of the specified monitoring services that are sending the signal. Different services are available depending on the type of signal. For example: </br>**- Platform**: For metric signals, the monitor service is the metric namespace. ‘Platform’ means the metrics are provided by the resource provider, namely 'Azure'.</br>**- Azure.ApplicationInsights**: Customer-reported metrics, sent by the Application Insights SDK.</br>**- Azure.VM.Windows.GuestMetrics**: VM guest metrics, collected by an extension running on the VM. Can include built-in operating system perf counters, and custom perf counters.</br>**- _\<Custom namespace\>_**: A custom metric namespace, containing custom metrics sent with the Azure Monitor Metrics API.</br>**- Log Analytics**: The service that provides the ‘Custom log search’ and ‘Log (saved query)’ signals.</br>**- Activity Log – Administrative**: The service that provides the ‘Administrative’ activity log events.</br>**- Activity Log – Policy**: The service that provides the 'Policy' activity log events.</br>**- Activity Log – Autoscale** The service that provides the ‘Autoscale’ activity log events.</br>**- Activity Log – Security**: The service that provides the ‘Security’ activity log events.</br>**- Resource health**: The service that provides the resource-level health status.</br>**- Service health**: The service that provides the subscription-level health status.|
72
68
Resource | The rule applies only to alerts from the specified Azure resource. For example, you can use this filter with **Does not equal** to exclude one or more resources when the rule's scope is a subscription. |
73
69
Resource group | The rule applies only to alerts from the specified resource groups. For example, you can use this filter with **Does not equal** to exclude one or more resource groups when the rule's scope is a subscription. |
74
70
Resource type | The rule applies only to alerts on resources from the specified resource types, such as virtual machines. You can use **Equals** to match one or more specific resources. You can also use **Contains** to match a resource type and all its child resources. For example, use `resource type contains "MICROSOFT.SQL/SERVERS"` to match both SQL servers and all their child resources, like databases.
75
71
Severity | The rule applies only to alerts with the selected severities. |
76
72
73
+
77
74
#### Alert processing rule filters
78
75
79
76
* If you define multiple filters in a rule, all the rules apply. There's a logical AND between all filters.
0 commit comments