Skip to content

Commit 5ff66e5

Browse files
Update alert.md
fixing image file names
1 parent 9de7c47 commit 5ff66e5

File tree

1 file changed

+20
-20
lines changed

1 file changed

+20
-20
lines changed

articles/key-vault/general/alert.md

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -51,15 +51,15 @@ This document will cover the following topics:
5151
3. Select **Metrics** under **Monitoring**
5252

5353
> [!div class="mx-imgBorder"]
54-
> ![Screenshot of Azure portal](../media/alert1.png)
54+
> ![Screenshot of Azure portal](../media/alert-1.png)
5555
5656
4. Update the title of the chart to what you want to see on your dashboard.
5757
5. Select the scope. In this example we will select a single key vault.
5858
6. Select the Metric **Overall Vault Availability** and Aggregation **Avg**
5959
7. Update the time range to the Last 24 Hours and update the time granularity to 1 minute.
6060

6161
> [!div class="mx-imgBorder"]
62-
> ![Screenshot of Azure portal](../media/alert2.png)
62+
> ![Screenshot of Azure portal](../media/alert-2.png)
6363
6464
8. Repeat the steps above for the Vault Saturation and Service API Latency metrics. Select **Pin to Dashboard** to save your metrics into a dashboard.
6565

@@ -69,19 +69,19 @@ This document will cover the following topics:
6969
9. To monitor all of the types of operations on the key vault, use the **Total Service API Hits** Metric, and Select **Apply Splitting by Activity Type**
7070

7171
> [!div class="mx-imgBorder"]
72-
> ![Screenshot of Azure portal](../media/alert3.png)
72+
> ![Screenshot of Azure portal](../media/alert-3.png)
7373
7474
10. To monitor for error codes on the key vault, use the **Total Service API Results** Metric, and Select **Apply Splitting by Activity Type**
7575

7676
> [!div class="mx-imgBorder"]
77-
> ![Screenshot of Azure portal](../media/alert4.png)
77+
> ![Screenshot of Azure portal](../media/alert-4.png)
7878
7979
Now you will have a dashboard that looks like this. You can click the 3 dots on the top right of each tile and you can rearrange and resize the tiles as you need.
8080

8181
Once you save and publish the dashboard, it will create a new resource in your Azure subscription. You will be able to see it at anytime by searching for "shared dashboard".
8282

8383
> [!div class="mx-imgBorder"]
84-
> ![Screenshot of Azure portal](../media/alert5.png)
84+
> ![Screenshot of Azure portal](../media/alert-5.png)
8585
8686
## How to configure alerts on your Key Vault
8787

@@ -99,20 +99,20 @@ An action group is a configurable list of notifications and properties.
9999
3. Select **Manage Actions**
100100

101101
> [!div class="mx-imgBorder"]
102-
> ![Screenshot of Azure portal](../media/alert6.png)
102+
> ![Screenshot of Azure portal](../media/alert-6.png)
103103
104104
4. Select **+ Add Action Group**
105105

106106
> [!div class="mx-imgBorder"]
107-
> ![Screenshot of Azure portal](../media/alert7.png)
107+
> ![Screenshot of Azure portal](../media/alert-7.png)
108108
109109
5. Choose the **Action Type** for your Action Group. In this example, we will create an email alert.
110110

111111
> [!div class="mx-imgBorder"]
112-
> ![Screenshot of Azure portal](../media/alert8.png)
112+
> ![Screenshot of Azure portal](../media/alert-8.png)
113113
114114
> [!div class="mx-imgBorder"]
115-
> ![Screenshot of Azure portal](../media/alert9.png)
115+
> ![Screenshot of Azure portal](../media/alert-9.png)
116116
117117
6. Click **OK** at the bottom of the page. You have successfully created an action group.
118118

@@ -123,20 +123,20 @@ Now that you have configured an action group, we will configure the the key vaul
123123
1. Select your key vault resource in the Azure portal and select **Alerts** under **Monitoring**
124124

125125
> [!div class="mx-imgBorder"]
126-
> ![Screenshot of Azure portal](../media/alert10.png)
126+
> ![Screenshot of Azure portal](../media/alert-10.png)
127127
128128
2. Select **New Alert Rule**
129129

130130
> [!div class="mx-imgBorder"]
131-
> ![Screenshot of Azure portal](../media/alert11.png)
131+
> ![Screenshot of Azure portal](../media/alert-11.png)
132132
133133
3. Select the scope of your alert rule. You can select a single vault or multiple.
134134

135135
> [!IMPORTANT]
136136
> Please note that when you are selecting multiple vaults for the scope of your alerts, all selected vaults must be in the same region. You will have to configure separate alert rules for vaults in different regions.
137137
138138
> [!div class="mx-imgBorder"]
139-
> ![Screenshot of Azure portal](../media/alert12.png)
139+
> ![Screenshot of Azure portal](../media/alert-12.png)
140140
141141
4. Select the conditions for your alerts. You can choose any of the following signals and define your logic for alerting. The Key Vault team recommends configuring the following alerting thresholds.
142142

@@ -147,13 +147,13 @@ Now that you have configured an action group, we will configure the the key vaul
147147
+ Total Error Codes higher than average (Dynamic Threshold)
148148

149149
> [!div class="mx-imgBorder"]
150-
> ![Screenshot of Azure portal](../media/alert13.png)
150+
> ![Screenshot of Azure portal](../media/alert-13.png)
151151
152152
### Example 1: Configuring a static alert threshold for latency
153153

154154
Select **Overall Service API Latency** as the signal name
155155
> [!div class="mx-imgBorder"]
156-
> ![Screenshot of Azure portal](../media/alert14.png)
156+
> ![Screenshot of Azure portal](../media/alert-14.png)
157157
158158
Please see the following configuration parameters.
159159

@@ -166,14 +166,14 @@ Please see the following configuration parameters.
166166
+ Select **Done**
167167

168168
> [!div class="mx-imgBorder"]
169-
> ![Screenshot of Azure portal](../media/alert15.png)
169+
> ![Screenshot of Azure portal](../media/alert-15.png)
170170
171171
### Example 2: Configuring a dynamic alert threshold for vault saturation
172172

173173
When you use a dynamic alert, you will be able to see historical data of the key vault you have selected. The blue area represents the average usage of your key vault. The red area shows spikes that would have triggered an alert provided other criteria in the alert configuration are met. The red dots show instances of violations where the criteria for the alert was met during the aggregated time window. You can set an alert to fire after a certain number of violations within a set time. If you don't want to include past data, there is an option to exclude old data below in advanced settings.
174174

175175
> [!div class="mx-imgBorder"]
176-
> ![Screenshot of Azure portal](../media/alert16.png)
176+
> ![Screenshot of Azure portal](../media/alert-16.png)
177177
178178
Please see the following configuration parameters.
179179

@@ -187,17 +187,17 @@ Please see the following configuration parameters.
187187
+ Select **Done**
188188

189189
> [!div class="mx-imgBorder"]
190-
> ![Screenshot of Azure portal](../media/alert17.png)
190+
> ![Screenshot of Azure portal](../media/alert-17.png)
191191
192192
5. Add the action group that you have configured
193193

194194
> [!div class="mx-imgBorder"]
195-
> ![Screenshot of Azure portal](../media/alert18.png)
195+
> ![Screenshot of Azure portal](../media/alert-18.png)
196196
197197
6. Enable the alert and assign a severity
198198

199199
> [!div class="mx-imgBorder"]
200-
> ![Screenshot of Azure portal](../media/alert19.png)
200+
> ![Screenshot of Azure portal](../media/alert-19.png)
201201
202202
7. Create the alert
203203

@@ -207,4 +207,4 @@ Once you have followed all of the steps above, you should receive email alerts w
207207
### Example email alert
208208

209209
> [!div class="mx-imgBorder"]
210-
> ![Screenshot of Azure portal](../media/alert20.png)
210+
> ![Screenshot of Azure portal](../media/alert-20.png)

0 commit comments

Comments
 (0)