Skip to content

Commit af57334

Browse files
committed
fix blocking issues
1 parent 15e2a3c commit af57334

File tree

2 files changed

+14
-6
lines changed

2 files changed

+14
-6
lines changed

articles/azure-monitor/alerts/alerts-create-new-alert-rule.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ And then defining these elements for the resulting alert actions using:
188188
1. (Optional) If you have configured action groups for this alert rule, you can add custom properties to the alert payload to add additional information to the payload. In the **Custom properties** section, add the property **Name** and **Value** for the custom property you want included in the payload.
189189

190190

191-
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-metric-rule-details-tab.png" alt-text="Screenshot of the details tab when creating a new alert rule..":::
191+
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-metric-rule-details-tab.png" alt-text="Screenshot of the details tab when creating a new alert rule.":::
192192

193193
### [Log alert](#tab/log)
194194

@@ -206,7 +206,7 @@ And then defining these elements for the resulting alert actions using:
206206

207207
1. (Optional) If you have configured action groups for this alert rule, you can add custom properties to the alert payload to add additional information to the payload. In the **Custom properties** section, add the property **Name** and **Value** for the custom property you want included in the payload.
208208

209-
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-log-rule-details-tab.png" alt-text="Screenshot of the details tab when creating a new log alert rule..":::
209+
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-log-rule-details-tab.png" alt-text="Screenshot of the details tab when creating a new log alert rule.":::
210210

211211
### [Activity log alert](#tab/activity-log)
212212

@@ -215,18 +215,18 @@ And then defining these elements for the resulting alert actions using:
215215
1. (Optional) In the **Advanced options** section, select **Enable upon creation** for the alert rule to start running as soon as you're done creating it.
216216
1. (Optional) If you have configured action groups for this alert rule, you can add custom properties to the alert payload to add additional information to the payload. In the **Custom properties** section, add the property **Name** and **Value** for the custom property you want included in the payload.
217217

218-
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-activity-log-rule-details-tab.png" alt-text="Screenshot of the actions tab when creating a new activity log alert rule..":::
218+
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-activity-log-rule-details-tab.png" alt-text="Screenshot of the actions tab when creating a new activity log alert rule.":::
219219

220220
---
221221

222222
1. In the **Tags** tab, set any required tags on the alert rule resource.
223223

224-
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-rule-tags-tab.png" alt-text="Screenshot of the Tags tab when creating a new alert rule..":::
224+
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-rule-tags-tab.png" alt-text="Screenshot of the Tags tab when creating a new alert rule.":::
225225

226226
1. In the **Review + create** tab, a validation will run and inform you of any issues.
227227
1. When validation passes and you've reviewed the settings, select the **Create** button.
228228

229-
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-rule-review-create.png" alt-text="Screenshot of the Review and create tab when creating a new alert rule..":::
229+
:::image type="content" source="media/alerts-create-new-alert-rule/alerts-rule-review-create.png" alt-text="Screenshot of the Review and create tab when creating a new alert rule.":::
230230

231231

232232
## Create a new alert rule using CLI

articles/azure-monitor/alerts/alerts-types.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -115,6 +115,7 @@ Dynamic thresholds help you:
115115
See [this article](alerts-dynamic-thresholds.md) for detailed instructions on using dynamic thresholds in metric alert rules.
116116

117117
## Log alerts
118+
118119
A log alert rule monitors a resource by using a Log Analytics query to evaluate resource logs at a set frequency. If the conditions are met, an alert is fired. Because you can use Log Analytics queries, you can perform advanced logic operations on your data and use the robust KQL features to manipulate log data.
119120

120121
The target of the log alert rule can be:
@@ -132,25 +133,31 @@ You can configure if log alerts are [stateful or stateless](alerts-overview.md#a
132133
> Log alerts work best when you are trying to detect specific data in the logs, as opposed to when you are trying to detect a **lack** of data in the logs. Since logs are semi-structured data, they are inherently more latent than metric data on information like a VM heartbeat. To avoid misfires when you are trying to detect a lack of data in the logs, consider using [metric alerts](#metric-alerts). You can send data to the metric store from logs using [metric alerts for logs](alerts-metric-logs.md).
133134
134135
### Dimensions in log alert rules
136+
135137
You can use dimensions when creating log alert rules to monitor the values of multiple instances of a resource with one rule. For example, you can monitor CPU usage on multiple instances running your website or app. Each instance is monitored individually notifications are sent for each instance.
136138

137139
### Splitting by dimensions in log alert rules
140+
138141
To monitor for the same condition on multiple Azure resources, you can use splitting by dimensions. Splitting by dimensions allows you to create resource-centric alerts at scale for a subscription or resource group. Alerts are split into separate alerts by grouping combinations using numerical or string columns. Splitting on the Azure resource ID column makes the specified resource into the alert target.
139142
You may also decide not to split when you want a condition applied to multiple resources in the scope. For example, if you want to fire an alert if at least five machines in the resource group scope have CPU usage over 80%.
140143

141144
### Using the API
145+
142146
Manage new rules in your workspaces using the [ScheduledQueryRules](/rest/api/monitor/scheduledqueryrule-2021-08-01/scheduled-query-rules) API.
143147

144148
> [!NOTE]
145149
> Log alerts for Log Analytics used to be managed using the legacy [Log Analytics Alert API](api-alerts.md). Learn more about [switching to the current ScheduledQueryRules API](alerts-log-api-switch.md).
146150
## Log alerts on your Azure bill
151+
147152
Log Alerts are listed under resource provider microsoft.insights/scheduledqueryrules with:
148153
- Log Alerts on Application Insights shown with exact resource name along with resource group and alert properties.
149154
- Log Alerts on Log Analytics shown with exact resource name along with resource group and alert properties; when created using scheduledQueryRules API.
150155
- Log alerts created from [legacy Log Analytics API](./api-alerts.md) aren't tracked [Azure Resources](../../azure-resource-manager/management/overview.md) and don't have enforced unique resource names. These alerts are still created on `microsoft.insights/scheduledqueryrules` as hidden resources, which have this resource naming structure `<WorkspaceName>|<savedSearchId>|<scheduleId>|<ActionId>`. Log Alerts on legacy API are shown with above hidden resource name along with resource group and alert properties.
156+
151157
> [!Note]
152158
> Unsupported resource characters such as <, >, %, &, \, ?, / are replaced with _ in the hidden resource names and this will also reflect in the billing information.
153159
## Activity log alerts
160+
154161
An activity log alert monitors a resource by checking the activity logs for a new activity log event that matches the defined conditions.
155162

156163
You may want to use activity log alerts for these types of scenarios:
@@ -168,13 +175,14 @@ Activity log alert rules are Azure resources, so they can be created by using an
168175
An activity log alert only monitors events in the subscription in which the alert is created.
169176

170177
## Smart Detection alerts
178+
171179
After setting up Application Insights for your project, when your app generates a certain minimum amount of data, Smart Detection takes 24 hours to learn the normal behavior of your app. Your app's performance has a typical pattern of behavior. Some requests or dependency calls will be more prone to failure than others; and the overall failure rate may go up as load increases. Smart Detection uses machine learning to find these anomalies. Smart Detection monitors the data received from your app, and in particular the failure rates. Application Insights automatically alerts you in near real time if your web app experiences an abnormal rise in the rate of failed requests.
172180

173181
As data comes into Application Insights from your web app, Smart Detection compares the current behavior with the patterns seen over the past few days. If there's an abnormal rise in failure rate compared to previous performance, an analysis is triggered. To help you triage and diagnose the problem, an analysis of the characteristics of the failures and related application data is provided in the alert details. There are also links to the Application Insights portal for further diagnosis. The feature needs no set-up nor configuration, as it uses machine learning algorithms to predict the normal failure rate.
174182

175183
While metric alerts tell you there might be a problem, Smart Detection starts the diagnostic work for you, performing much of the analysis you would otherwise have to do yourself. You get the results neatly packaged, helping you to get quickly to the root of the problem.
176184

177-
Smart detection works for any web app, hosted in the cloud or on your own servers, that generate application request or dependency data.
185+
Smart detection works for web apps hosted in the cloud or on your own servers that generate application requests or dependency data.
178186

179187
## Next steps
180188
- Get an [overview of alerts](alerts-overview.md).

0 commit comments

Comments
 (0)