Skip to content

Commit 34f8d30

Browse files
Merge pull request #266851 from AbbyMSFT/getting-started
Getting started
2 parents f0d707a + 92bbb12 commit 34f8d30

File tree

5 files changed

+66
-127
lines changed

5 files changed

+66
-127
lines changed
Lines changed: 21 additions & 53 deletions
Original file line numberDiff line numberDiff line change
@@ -1,65 +1,40 @@
11
---
2-
title: 'Plan your alerts and automated actions'
2+
title: Plan alerts and automated actions
33
description: Recommendations for deployment of Azure Monitor alerts and automated actions.
44
ms.author: abbyweisberg
55
ms.topic: conceptual
66
author: bwren
7-
ms.date: 05/31/2023
7+
ms.date: 02/15/2024
88
ms.reviewer: bwren
99
---
1010

11-
# Plan your alerts and automated actions
11+
# Plan alerts and automated actions
1212

13-
This article provides guidance on alerts in Azure Monitor. Alerts proactively notify you of important data or patterns identified in your monitoring data. You can view alerts in the Azure portal. You can create alerts that:
13+
Alerts proactively notify you of important data or patterns identified in your monitoring data. You can create alerts that:
1414

1515
- Send a proactive notification.
1616
- Initiate an automated action to attempt to remediate an issue.
1717

18-
## Alerting strategy
1918

20-
An alerting strategy defines your organization's standards for:
19+
Alert rules are defined by the type of data they use. Each has different capabilities and a different cost. The basic strategy is to use the alert rule type with the lowest cost that provides the logic you require. See [Choosing the right type of alert rule](alerts-types.md).
20+
21+
For more information about alerts, see [alerts overview](alerts-overview.md).
2122

22-
- The types of alert rules that you'll create for different scenarios.
23-
- How you'll categorize and manage alerts after they're created.
24-
- Automated actions and notifications that you'll take in response to alerts.
23+
## Alerting strategy
2524

2625
Defining an alert strategy assists you in defining the configuration of alert rules including alert severity and action groups.
2726

2827
For factors to consider as you develop an alerting strategy, see [Successful alerting strategy](/azure/cloud-adoption-framework/manage/monitor/alerting#successful-alerting-strategy).
2928

30-
## Alert rule types
31-
32-
Alerts in Azure Monitor are created by alert rules that you must create. For guidance on recommended alert rules, see the monitoring documentation for each Azure service. Azure Monitor doesn't have any alert rules by default.
33-
34-
Multiple types of alert rules are defined by the type of data they use. Each has different capabilities and a different cost. The basic strategy is to use the alert rule type with the lowest cost that provides the logic you require.
35-
36-
- Activity log rules. Creates an alert in response to a new activity log event that matches specified conditions. There's no cost to these alerts so they should be your first choice, although the conditions they can detect are limited. See [Create or edit an alert rule](alerts-create-new-alert-rule.md) for information on creating an activity log alert.
37-
- Metric alert rules. Creates an alert in response to one or more metric values exceeding a threshold. Metric alerts are stateful, which means that the alert will automatically close when the value drops below the threshold, and it will only send out notifications when the state changes. There's a cost to metric alerts, but it's often much less than log search alerts. See [Create or edit an alert rule](alerts-create-new-alert-rule.md) for information on creating a metric alert.
38-
- Log search alert rules. Creates an alert when the results of a scheduled query match specified criteria. They're the most expensive of the alert rules, but they allow the most complex criteria. See [Create or edit an alert rule](alerts-create-new-alert-rule.md) for information on creating a log search query alert.
39-
- [Application alerts](/previous-versions/azure/azure-monitor/app/monitor-web-app-availability). Performs proactive performance and availability testing of your web application. You can perform a ping test at no cost, but there's a cost to more complex testing. See [Monitor the availability of any website](/previous-versions/azure/azure-monitor/app/monitor-web-app-availability) for a description of the different tests and information on creating them.
40-
41-
## Alert severity
42-
43-
Each alert rule defines the severity of the alerts that it creates based on the following table. Alerts in the Azure portal are grouped by level so that you can manage similar alerts together and quickly identify alerts that require the greatest urgency.
44-
45-
| Level | Name | Description |
46-
|:---|:---|:---|
47-
| Sev 0 | Critical | Loss of service or application availability or severe degradation of performance. Requires immediate attention. |
48-
| Sev 1 | Error | Degradation of performance or loss of availability of some aspect of an application or service. Requires attention but not immediate. |
49-
| Sev 2 | Warning | A problem that doesn't include any current loss in availability or performance, although it has the potential to lead to more severe problems if unaddressed. |
50-
| Sev 3 | Informational | Doesn't indicate a problem but provides interesting information to an operator, such as successful completion of a regular process. |
51-
| Sev 4 | Verbose | Doesn't indicate a problem but provides detailed information that is verbose.
29+
## Automated responses to alerts
5230

53-
Assess the severity of the condition each rule is identifying to assign an appropriate level. Define the types of issues you assign to each severity level and your standard response to each in your alerts strategy.
54-
55-
## Action groups
56-
57-
Automated responses to alerts in Azure Monitor are defined in [action groups](action-groups.md). An action group is a collection of one or more notifications and actions that are fired when an alert is triggered. A single action group can be used with multiple alert rules and contain one or more of the following items:
31+
Use [action groups](action-groups.md) to define automated responses to alerts. An action group is a collection of one or more notifications and actions triggered by the alert. A single action group can be used with multiple alert rules and contain one or more of the following items:
5832

5933
- **Notifications**: Messages that notify operators and administrators that an alert was created.
6034
- **Actions**: Automated processes that attempt to correct the detected issue.
6135

62-
## Notifications
36+
37+
### Notifications
6338

6439
Notifications are messages sent to one or more users to notify them that an alert has been created. Because a single action group can be used with multiple alert rules, you should design a set of action groups for different sets of administrators and users who will receive the same sets of alerts. Use any of the following types of notifications depending on the preferences of your operators and your organizational standards:
6540

@@ -69,13 +44,13 @@ Notifications are messages sent to one or more users to notify them that an aler
6944
- Voice
7045
- Email Azure Resource Manager role
7146

72-
## Actions
47+
### Actions
7348

7449
Actions are automated responses to an alert. You can use the available actions for any scenario that they support, but the following sections describe how each action is typically used.
7550

7651
### Automated remediation
7752

78-
Use the following actions to attempt automated remediation of the issue identified by the alert:
53+
Use the following actions for automated remediation of the issue identified by the alert:
7954

8055
- **Automation runbook**: Start a built-in runbook or a custom runbook in Azure Automation. For example, built-in runbooks are available to perform such functions as restarting or scaling up a virtual machine.
8156
- **Azure Functions**: Start an Azure function.
@@ -86,27 +61,20 @@ Use the following actions to attempt automated remediation of the issue identifi
8661
- **Webhooks**: Send the alert to an incident management system that supports webhooks such as PagerDuty and Splunk On-Call.
8762
- **Secure webhook**: Integrate ITSM with Microsoft Entra authentication.
8863

64+
## Alerting at scale
65+
66+
As part of your alerting strategy, you'll want to alert on issues for all your critical Azure applications and resources. See [Alerting at-scale](alerts-overview.md#alerting-at-scale) for guidance.
67+
8968
## Minimize alert activity
9069

9170
You want to create alerts for any important information in your environment. But you don't want to create excessive alerts and notifications for issues that don't warrant them. To minimize your alert activity to ensure that critical issues are surfaced while you don't generate excess information and notifications for administrators, follow these guidelines:
9271

9372
- See [Successful alerting strategy](/azure/cloud-adoption-framework/manage/monitor/alerting#successful-alerting-strategy) to determine whether a symptom is an appropriate candidate for alerting.
94-
- Use the **Automatically resolve alerts** option in metric alert rules to resolve alerts when the condition has been corrected.
95-
- Use the **Suppress alerts** option in log search alert rules to avoid creating multiple alerts for the same issue.
96-
- Ensure that you use appropriate severity levels for alert rules so that high-priority issues can be analyzed together.
73+
- Use the **Automatically resolve alerts** option in [metric alert rules](alerts-create-metric-alert-rule.md) to resolve alerts when the condition has been corrected.
74+
- Use the **Suppress alerts** option in [log search query alert rules](alerts-create-log-alert-rule.md) to avoid creating multiple alerts for the same issue.
75+
- Ensure that you use appropriate severity levels for alert rules so that high-priority issues are analyzed.
9776
- Limit notifications for alerts with a severity of Warning or less because they don't require immediate attention.
9877

99-
## Create alert rules at scale
100-
101-
Typically, you'll want to alert on issues for all your critical Azure applications and resources. Use the following methods for creating alert rules at scale:
102-
103-
- Azure Monitor supports monitoring multiple resources of the same type with one metric alert rule for resources that exist in the same Azure region. For a list of Azure services that are currently supported for this feature, see [Supported resources for metric alerts in Azure Monitor](alerts-metric-near-real-time.md).
104-
- For metric alert rules for Azure services that don't support multiple resources, use automation tools such as the Azure CLI and PowerShell with Resource Manager templates to create the same alert rule for multiple resources. For samples, see [Resource Manager template samples for metric alert rules in Azure Monitor](resource-manager-alerts-metric.md).
105-
- To return data for multiple resources, write queries in log search alert rules. Use the **Split by dimensions** setting in the rule to create separate alerts for each resource.
106-
107-
> [!NOTE]
108-
> Resource-centric log search alert rules currently in public preview allow you to use all resources in a subscription or resource group as a target for a log search alert.
109-
11078
## Next steps
11179

11280
[Optimize cost in Azure Monitor](../best-practices-cost.md).

articles/azure-monitor/best-practices-alerts.md

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,20 +11,18 @@ ms.reviewer: abbyweisberg
1111
# Best practices for Azure Monitor alerts
1212
This article provides architectural best practices for Azure Monitor alerts, alert processing rules, and action groups. The guidance is based on the five pillars of architecture excellence described in [Azure Well-Architected Framework](/azure/architecture/framework/).
1313

14-
14+
For more information about alerts and notifications, see [Azure Monitor alerts overview](./alerts/alerts-overview.md).
1515

1616
## Reliability
1717
In the cloud, we acknowledge that failures happen. Instead of trying to prevent failures altogether, the goal is to minimize the effects of a single failing component. Use the following information to minimize failure of your Azure Monitor alert rule components.
1818

1919
[!INCLUDE [waf-alerts-reliability](includes/waf-alerts-reliability.md)]
2020

21-
2221
## Security
2322
Security is one of the most important aspects of any architecture. Azure Monitor provides features to employ both the principle of least privilege and defense-in-depth. Use the following information to maximize the security of Azure Monitor alerts.
2423

2524
[!INCLUDE [waf-alerts-security](includes/waf-alerts-security.md)]
2625

27-
2826
## Cost optimization
2927
Cost optimization refers to ways to reduce unnecessary expenses and improve operational efficiencies. You can significantly reduce your cost for Azure Monitor by understanding your different configuration options and opportunities to reduce the amount of data that it collects. See [Azure Monitor cost and usage](cost-usage.md) to understand the different ways that Azure Monitor charges and how to view your monthly bill.
3028

@@ -33,13 +31,11 @@ Cost optimization refers to ways to reduce unnecessary expenses and improve oper
3331
3432
[!INCLUDE [waf-alerts-cost](includes/waf-alerts-cost.md)]
3533

36-
3734
## Operational excellence
3835
Operational excellence refers to operations processes required keep a service running reliably in production. Use the following information to minimize the operational requirements for supporting Azure Monitor alerts.
3936

4037
[!INCLUDE [waf-alerts-operation](includes/waf-alerts-operation.md)]
4138

42-
4339
## Performance efficiency
4440
Performance efficiency is the ability of your workload to scale to meet the demands placed on it by users in an efficient manner.
4541
Alerts offer a high degree of performance efficiency without any design decisions.

0 commit comments

Comments
 (0)