You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Recommendations for deployment of Azure Monitor alerts and automated actions.
4
4
ms.author: abbyweisberg
5
5
ms.topic: conceptual
6
6
author: bwren
7
-
ms.date: 05/31/2023
7
+
ms.date: 02/15/2024
8
8
ms.reviewer: bwren
9
9
---
10
10
11
-
# Plan your alerts and automated actions
11
+
# Plan alerts and automated actions
12
12
13
-
This article provides guidance on alerts in Azure Monitor. Alerts proactively notify you of important data or patterns identified in your monitoring data. You can view alerts in the Azure portal. You can create alerts that:
13
+
Alerts proactively notify you of important data or patterns identified in your monitoring data. You can create alerts that:
14
14
15
15
- Send a proactive notification.
16
16
- Initiate an automated action to attempt to remediate an issue.
17
17
18
-
## Alerting strategy
19
18
20
-
An alerting strategy defines your organization's standards for:
19
+
Alert rules are defined by the type of data they use. Each has different capabilities and a different cost. The basic strategy is to use the alert rule type with the lowest cost that provides the logic you require. See [Choosing the right type of alert rule](alerts-types.md).
20
+
21
+
For more information about alerts, see [alerts overview](alerts-overview.md).
21
22
22
-
- The types of alert rules that you'll create for different scenarios.
23
-
- How you'll categorize and manage alerts after they're created.
24
-
- Automated actions and notifications that you'll take in response to alerts.
23
+
## Alerting strategy
25
24
26
25
Defining an alert strategy assists you in defining the configuration of alert rules including alert severity and action groups.
27
26
28
27
For factors to consider as you develop an alerting strategy, see [Successful alerting strategy](/azure/cloud-adoption-framework/manage/monitor/alerting#successful-alerting-strategy).
29
28
30
-
## Alert rule types
31
-
32
-
Alerts in Azure Monitor are created by alert rules that you must create. For guidance on recommended alert rules, see the monitoring documentation for each Azure service. Azure Monitor doesn't have any alert rules by default.
33
-
34
-
Multiple types of alert rules are defined by the type of data they use. Each has different capabilities and a different cost. The basic strategy is to use the alert rule type with the lowest cost that provides the logic you require.
35
-
36
-
- Activity log rules. Creates an alert in response to a new activity log event that matches specified conditions. There's no cost to these alerts so they should be your first choice, although the conditions they can detect are limited. See [Create or edit an alert rule](alerts-create-new-alert-rule.md) for information on creating an activity log alert.
37
-
- Metric alert rules. Creates an alert in response to one or more metric values exceeding a threshold. Metric alerts are stateful, which means that the alert will automatically close when the value drops below the threshold, and it will only send out notifications when the state changes. There's a cost to metric alerts, but it's often much less than log search alerts. See [Create or edit an alert rule](alerts-create-new-alert-rule.md) for information on creating a metric alert.
38
-
- Log search alert rules. Creates an alert when the results of a scheduled query match specified criteria. They're the most expensive of the alert rules, but they allow the most complex criteria. See [Create or edit an alert rule](alerts-create-new-alert-rule.md) for information on creating a log search query alert.
39
-
-[Application alerts](/previous-versions/azure/azure-monitor/app/monitor-web-app-availability). Performs proactive performance and availability testing of your web application. You can perform a ping test at no cost, but there's a cost to more complex testing. See [Monitor the availability of any website](/previous-versions/azure/azure-monitor/app/monitor-web-app-availability) for a description of the different tests and information on creating them.
40
-
41
-
## Alert severity
42
-
43
-
Each alert rule defines the severity of the alerts that it creates based on the following table. Alerts in the Azure portal are grouped by level so that you can manage similar alerts together and quickly identify alerts that require the greatest urgency.
44
-
45
-
| Level | Name | Description |
46
-
|:---|:---|:---|
47
-
| Sev 0 | Critical | Loss of service or application availability or severe degradation of performance. Requires immediate attention. |
48
-
| Sev 1 | Error | Degradation of performance or loss of availability of some aspect of an application or service. Requires attention but not immediate. |
49
-
| Sev 2 | Warning | A problem that doesn't include any current loss in availability or performance, although it has the potential to lead to more severe problems if unaddressed. |
50
-
| Sev 3 | Informational | Doesn't indicate a problem but provides interesting information to an operator, such as successful completion of a regular process. |
51
-
| Sev 4 | Verbose | Doesn't indicate a problem but provides detailed information that is verbose.
29
+
## Automated responses to alerts
52
30
53
-
Assess the severity of the condition each rule is identifying to assign an appropriate level. Define the types of issues you assign to each severity level and your standard response to each in your alerts strategy.
54
-
55
-
## Action groups
56
-
57
-
Automated responses to alerts in Azure Monitor are defined in [action groups](action-groups.md). An action group is a collection of one or more notifications and actions that are fired when an alert is triggered. A single action group can be used with multiple alert rules and contain one or more of the following items:
31
+
Use [action groups](action-groups.md) to define automated responses to alerts. An action group is a collection of one or more notifications and actions triggered by the alert. A single action group can be used with multiple alert rules and contain one or more of the following items:
58
32
59
33
-**Notifications**: Messages that notify operators and administrators that an alert was created.
60
34
-**Actions**: Automated processes that attempt to correct the detected issue.
61
35
62
-
## Notifications
36
+
37
+
### Notifications
63
38
64
39
Notifications are messages sent to one or more users to notify them that an alert has been created. Because a single action group can be used with multiple alert rules, you should design a set of action groups for different sets of administrators and users who will receive the same sets of alerts. Use any of the following types of notifications depending on the preferences of your operators and your organizational standards:
65
40
@@ -69,13 +44,13 @@ Notifications are messages sent to one or more users to notify them that an aler
69
44
- Voice
70
45
- Email Azure Resource Manager role
71
46
72
-
## Actions
47
+
###Actions
73
48
74
49
Actions are automated responses to an alert. You can use the available actions for any scenario that they support, but the following sections describe how each action is typically used.
75
50
76
51
### Automated remediation
77
52
78
-
Use the following actions to attempt automated remediation of the issue identified by the alert:
53
+
Use the following actions for automated remediation of the issue identified by the alert:
79
54
80
55
-**Automation runbook**: Start a built-in runbook or a custom runbook in Azure Automation. For example, built-in runbooks are available to perform such functions as restarting or scaling up a virtual machine.
81
56
-**Azure Functions**: Start an Azure function.
@@ -86,27 +61,20 @@ Use the following actions to attempt automated remediation of the issue identifi
86
61
-**Webhooks**: Send the alert to an incident management system that supports webhooks such as PagerDuty and Splunk On-Call.
87
62
-**Secure webhook**: Integrate ITSM with Microsoft Entra authentication.
88
63
64
+
## Alerting at scale
65
+
66
+
As part of your alerting strategy, you'll want to alert on issues for all your critical Azure applications and resources. See [Alerting at-scale](alerts-overview.md#alerting-at-scale) for guidance.
67
+
89
68
## Minimize alert activity
90
69
91
70
You want to create alerts for any important information in your environment. But you don't want to create excessive alerts and notifications for issues that don't warrant them. To minimize your alert activity to ensure that critical issues are surfaced while you don't generate excess information and notifications for administrators, follow these guidelines:
92
71
93
72
- See [Successful alerting strategy](/azure/cloud-adoption-framework/manage/monitor/alerting#successful-alerting-strategy) to determine whether a symptom is an appropriate candidate for alerting.
94
-
- Use the **Automatically resolve alerts** option in metric alert rules to resolve alerts when the condition has been corrected.
95
-
- Use the **Suppress alerts** option in log search alert rules to avoid creating multiple alerts for the same issue.
96
-
- Ensure that you use appropriate severity levels for alert rules so that high-priority issues can be analyzed together.
73
+
- Use the **Automatically resolve alerts** option in [metric alert rules](alerts-create-metric-alert-rule.md) to resolve alerts when the condition has been corrected.
74
+
- Use the **Suppress alerts** option in [log search query alert rules](alerts-create-log-alert-rule.md) to avoid creating multiple alerts for the same issue.
75
+
- Ensure that you use appropriate severity levels for alert rules so that high-priority issues are analyzed.
97
76
- Limit notifications for alerts with a severity of Warning or less because they don't require immediate attention.
98
77
99
-
## Create alert rules at scale
100
-
101
-
Typically, you'll want to alert on issues for all your critical Azure applications and resources. Use the following methods for creating alert rules at scale:
102
-
103
-
- Azure Monitor supports monitoring multiple resources of the same type with one metric alert rule for resources that exist in the same Azure region. For a list of Azure services that are currently supported for this feature, see [Supported resources for metric alerts in Azure Monitor](alerts-metric-near-real-time.md).
104
-
- For metric alert rules for Azure services that don't support multiple resources, use automation tools such as the Azure CLI and PowerShell with Resource Manager templates to create the same alert rule for multiple resources. For samples, see [Resource Manager template samples for metric alert rules in Azure Monitor](resource-manager-alerts-metric.md).
105
-
- To return data for multiple resources, write queries in log search alert rules. Use the **Split by dimensions** setting in the rule to create separate alerts for each resource.
106
-
107
-
> [!NOTE]
108
-
> Resource-centric log search alert rules currently in public preview allow you to use all resources in a subscription or resource group as a target for a log search alert.
109
-
110
78
## Next steps
111
79
112
80
[Optimize cost in Azure Monitor](../best-practices-cost.md).
Copy file name to clipboardExpand all lines: articles/azure-monitor/best-practices-alerts.md
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,20 +11,18 @@ ms.reviewer: abbyweisberg
11
11
# Best practices for Azure Monitor alerts
12
12
This article provides architectural best practices for Azure Monitor alerts, alert processing rules, and action groups. The guidance is based on the five pillars of architecture excellence described in [Azure Well-Architected Framework](/azure/architecture/framework/).
13
13
14
-
14
+
For more information about alerts and notifications, see [Azure Monitor alerts overview](./alerts/alerts-overview.md).
15
15
16
16
## Reliability
17
17
In the cloud, we acknowledge that failures happen. Instead of trying to prevent failures altogether, the goal is to minimize the effects of a single failing component. Use the following information to minimize failure of your Azure Monitor alert rule components.
Security is one of the most important aspects of any architecture. Azure Monitor provides features to employ both the principle of least privilege and defense-in-depth. Use the following information to maximize the security of Azure Monitor alerts.
Cost optimization refers to ways to reduce unnecessary expenses and improve operational efficiencies. You can significantly reduce your cost for Azure Monitor by understanding your different configuration options and opportunities to reduce the amount of data that it collects. See [Azure Monitor cost and usage](cost-usage.md) to understand the different ways that Azure Monitor charges and how to view your monthly bill.
30
28
@@ -33,13 +31,11 @@ Cost optimization refers to ways to reduce unnecessary expenses and improve oper
Operational excellence refers to operations processes required keep a service running reliably in production. Use the following information to minimize the operational requirements for supporting Azure Monitor alerts.
0 commit comments