Skip to content

Commit bf3f602

Browse files
Learn Build Service GitHub AppLearn Build Service GitHub App
authored andcommitted
Merging changes synced from https://github.com/MicrosoftDocs/azure-docs-pr (branch live)
2 parents 001f90d + 702e04b commit bf3f602

File tree

10 files changed

+72
-27
lines changed

10 files changed

+72
-27
lines changed

articles/automation/python-packages.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ On a Windows 64-bit machine with [Python2.7](https://www.python.org/downloads/re
4242
C:\Python27\Scripts\pip2.7.exe download -d <output dir> <package name>
4343
```
4444

45-
Once the packages are downloaded, you can import them into your automation account.
45+
Once the packages are downloaded, you can import them into your Automation account.
4646

4747
### Runbook
4848

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
title: Create alert rules for an Azure resource
3+
description: Describes the different options for creating alert rules in Azure Monitor and where you can find more information about each option.
4+
ms.topic: conceptual
5+
author: bwren
6+
ms.author: bwren
7+
ms.date: 02/16/2024
8+
ms.reviewer: robb
9+
10+
---
11+
12+
# Create alert rules for Azure resources
13+
Alerts in Azure Monitor proactively notify you of critical conditions based on collected telemetry and potentially attempt to take corrective action. Alerts are generated from alert rules which define the criteria for the alert and what action to take when the alert triggers. There are no alert rules created by default in Azure Monitor. In addition to creating your own, there are multiple options for getting started quickly with alert rules based on pre-defined conditions, and different options are available for different Azure services. This article describes the different options for creating alert rules in Azure Monitor and where you can find more information about each option.
14+
15+
16+
## Recommended alerts
17+
Recommended alerts is a feature in Azure Monitor for some services that allows you to quickly create a set of alert rules for a particular resource. Simply select **Set up recommendations** from the **Alerts** tab for the resource in the Azure portal, and select the rules you want to enable. This feature isn't available for all services, and you need to select the option for each resource you want to monitor. One strategy is to use the recommended alerts as guidance for the alert rules that should be created for a particular type of resource. You can use [Azure Policy](#azure-policy) to automatically create these same alert rules for all resources of a particular type.
18+
19+
20+
## Azure Monitor Baseline Alerts (AMBA)
21+
AMBA is a central repository that combines product group and field experience driven alert definitions that allow customers and partners to improve their observability experience through the adoption of Azure Monitor. It's organized by resource type so you can quickly identify alert definitions that fit your requirements. AMBA leverages Azure Monitor alerts and helps you detect and address issues consistently and at scale indicating problems with monitored resource in your infrastructure. AMBA includes definitions for both metric and log alerts for resources including:
22+
23+
- Service Health
24+
- Compute resources
25+
- Networking resources
26+
- Many more
27+
28+
AMBA also includes example snippets of alert definitions to be directly used in an ARM or BICEP deployments in addition to policy definitions. Read more about on Azure Landing Zone monitoring at [Monitor Azure platform landing zone components](/azure/cloud-adoption-framework/ready/landing-zone/design-area/management-monitor#azure-landing-zone-monitoring-guidance) .
29+
30+
AMBA has patterns that group alerts from different resource types to address specific scenarios. Azure landing zone (ALZ), which is also suitable for non-ALZ aligned customers, is a pattern of AMBA that collates platform alerts into a deployable at-scale solution. Other patterns are under development including SAP and Azure Virtual Desktop, which are intended to minimize friction in adopting observability into your environment.
31+
32+
See [Azure Monitor Baseline Alerts](https://aka.ms/amba) for details.
33+
34+
## Manual alert rules
35+
You can manually create alert rules for any of your Azure resources using the appropriate metric values or log queries as a signal. You must create and maintain each alert rule for each resource individually, so you will probably want to use one of the other options when they're applicable and only manually create alert rules for special cases. Multiple services in Azure have documentation articles that describe recommended telemetry to collect and alert rules that are recommended for that service. These articles are typically found in the **Monitor** section of the service's documentation. For example, [Monitor Azure virtual machines](../../virtual-machines/monitor-vm.md) and [Monitor Azure Kubernetes Service (AKS)](../../aks/monitor-aks.md).
36+
37+
See [Choosing the right type of alert rule](./alerts-types.md) for more information about the different types of alert rules and articles such as [Create or edit a metric alert rule](./alerts-create-metric-alert-rule.md) and [Create or edit a log alert rule](./alerts-create-log-alert-rule.md) for detailed guidance on manually creating alert rules.
38+
39+
## Azure Policy
40+
Using [Azure Policy](../../governance/policy/overview.md), you can automatically create alert rules for all resources of a particular type instead of manually creating rules for each individual resource. You still must define the alerting condition, but the alert rules for each resource will automatically be created for you, for both existing resources and any new ones that you create.
41+
42+
See [Resource Manager template samples for metric alert rules in Azure Monitor](./resource-manager-alerts-metric.md) and [Resource Manager template samples for log alert rules in Azure Monitor](./resource-manager-alerts-log.md) for ARM templates that can be used in policy definitions.
43+
44+
## Next steps
45+
46+
- [Read more about alerts in Azure Monitor](./alerts-overview.md)

articles/azure-monitor/essentials/tutorial-resource-logs.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Browse through the available queries. Identify one to run and select **Run**. Th
6767
:::image type="content" source="media/tutorial-resource-logs/query-results.png" lightbox="media/tutorial-resource-logs/query-results.png"alt-text="Screenshot that shows the results of a sample log query.":::
6868

6969
## Next steps
70-
Now that you're collecting resource logs, create a log search alert to be proactively notified when interesting data is identified in your log data.
70+
Once you're collecting monitoring data for your Azure resources, see your different options for creating alert rules to be proactively notified when Azure Monitor identifies interesting information.
7171

7272
> [!div class="nextstepaction"]
73-
> [Create a log search alert for an Azure resource](../alerts/tutorial-log-alert.md)
73+
> [Create alert rules for an Azure resource](../alerts/alert-options.md)

articles/azure-monitor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,8 @@ items:
3535
href: essentials/tutorial-metrics.md
3636
- name: Collect and view resource logs
3737
href: essentials/tutorial-resource-logs.md
38+
- name: Create alerts
39+
href: alerts/alert-options.md
3840
- name: Monitor applications with Application Insights
3941
items:
4042
- name: Application Insights overview

articles/backup/backup-azure-vms-enhanced-policy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Back up Azure VMs with Enhanced policy
33
description: Learn how to configure Enhanced policy to back up VMs.
44
ms.topic: how-to
5-
ms.date: 02/07/2024
5+
ms.date: 02/19/2024
66
ms.reviewer: sharrai
77
ms.service: backup
88
ms.custom: devx-track-azurecli, devx-track-azurepowershell

articles/backup/backup-support-matrix-iaas.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Support matrix for Azure VM backups
33
description: Get a summary of support settings and limitations for backing up Azure VMs by using the Azure Backup service.
44
ms.topic: conceptual
5-
ms.date: 02/07/2024
5+
ms.date: 02/19/2024
66
ms.custom: references_regions
77
ms.reviewer: sharrai
88
ms.service: backup

articles/defender-for-cloud/release-notes.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,9 +24,17 @@ If you're looking for items older than six months, you can find them in the [Arc
2424

2525
|Date | Update |
2626
|----------|----------|
27+
| February 18| [Open Container Initiative (OCI) image format specification support](#open-container-initiative-oci-image-format-specification-support) |
2728
| February 13 | [AWS container vulnerability assessment powered by Trivy retired](#aws-container-vulnerability-assessment-powered-by-trivy-retired) |
2829
| February 8 | [Recommendations released for preview: four recommendations for Azure Stack HCI resource type](#recommendations-released-for-preview-four-recommendations-for-azure-stack-hci-resource-type) |
2930

31+
### Open Container Initiative (OCI) image format specification support
32+
33+
February 18, 2024
34+
35+
The [Open Container Initiative (OCI)](https://github.com/opencontainers/image-spec/blob/main/spec.md) image format specification is now supported by vulnerability assessment, powered by Microsoft Defender Vulnerability Management for AWS, Azure & GCP clouds.
36+
37+
3038
### AWS container vulnerability assessment powered by Trivy retired
3139

3240
February 13, 2024

articles/defender-for-iot/organizations/TOC.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -399,7 +399,7 @@
399399
href: appliance-catalog/hpe-edgeline-el300.md
400400
- name: HPE ProLiant DL20 Gen10 (L500 Rugged)
401401
href: appliance-catalog/hpe-proliant-dl20-smb-legacy.md
402-
- name: Neousys Nuvo-500LP (L100 Rugged)
402+
- name: Neousys Nuvo-5006LP (L100 Rugged)
403403
href: appliance-catalog/neousys-nuvo-5006lp.md
404404
- name: System maintenance references
405405
items:

articles/hdinsight-aks/secure-traffic-by-firewall.md

Lines changed: 8 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to secure traffic using firewall on HDInsight on AKS usin
44
ms.service: hdinsight-aks
55
ms.custom: devx-track-azurecli
66
ms.topic: how-to
7-
ms.date: 08/3/2023
7+
ms.date: 02/19/2024
88
---
99

1010
# Use firewall to restrict outbound traffic using Azure CLI
@@ -73,7 +73,7 @@ FWROUTE_NAME_INTERNET="${PREFIX}-fwinternet"
7373
```
7474
> [!Important]
7575
> 1. If you add NSG in subnet `HDIAKS_SUBNET_NAME`, you need to add certain outbound and inbound rules manually. Follow [use NSG to restrict the traffic](./secure-traffic-by-nsg.md).
76-
> 1. Don't associate subnet `HDIAKS_SUBNET_NAME` with a route table because HDInsight on AKS creates cluster pool with default outbound type and can't create the cluster pool in a subnet already associated with a route table.
76+
> 1. By default, route table will not be associated with subnet. If required, user has to create a route table and associate it with the cluster pool.
7777
7878
## Create HDInsight on AKS cluster pool using Azure portal
7979
@@ -83,9 +83,9 @@ FWROUTE_NAME_INTERNET="${PREFIX}-fwinternet"
8383
8484
:::image type="content" source="./media/secure-traffic-by-firewall/security-tab.png" alt-text="Diagram showing the security tab." border="true" lightbox="./media/secure-traffic-by-firewall/security-tab.png":::
8585
86-
1. When HDInsight on AKS cluster pool is created, you can find a route table in subnet `HDIAKS_SUBNET_NAME`.
86+
1. Create a route table.
8787
88-
:::image type="content" source="./media/secure-traffic-by-firewall/route-table.png" alt-text="Diagram showing the route table." border="true" lightbox="./media/secure-traffic-by-firewall/route-table.png":::
88+
Create a route table and associate it with the cluster pool. For more information, see [create a route table](../virtual-network/manage-route-table.md#create-a-route-table).
8989
9090
### Get AKS cluster details created behind the cluster pool
9191
@@ -168,22 +168,11 @@ FWROUTE_NAME_INTERNET="${PREFIX}-fwinternet"
168168
169169
### Create route in the route table to redirect the traffic to firewall
170170
171-
1. Get the route table associated with HDInsight on AKS cluster pool.
172-
173-
```azurecli
174-
ROUTE_TABLE_ID=$(az network vnet subnet show --name $HDIAKS_SUBNET_NAME --vnet-name $VNET_NAME --resource-group $RG --query routeTable.id -o tsv)
175-
176-
ROUTE_TABLE_NAME=$(az network route-table show --ids $ROUTE_TABLE_ID --query 'name' -o tsv)
177-
```
178-
1. Create the route.
179-
```azurecli
180-
az network route-table route create -g $AKS_MANAGED_RG --name $FWROUTE_NAME --route-table-name $ROUTE_TABLE_NAME --address-prefix 0.0.0.0/0 --next-hop-type VirtualAppliance --next-hop-ip-address $FWPRIVATE_IP
181-
182-
az network route-table route create -g $AKS_MANAGED_RG --name $FWROUTE_NAME_INTERNET --route-table-name $ROUTE_TABLE_NAME --address-prefix $FWPUBLIC_IP/32 --next-hop-type Internet
183-
```
171+
Create a route table to be associated to HDInsight on AKS cluster pool. For more information, see [create route table commands](../virtual-network/manage-route-table.md#create-route-table---commands).
172+
184173
## Create cluster
185174
186-
In the previous steps, we have routed the traffic to firewall.
175+
In the previous steps, we routed network traffic to firewall.
187176
188177
The following steps provide details about the specific network and application rules needed by each cluster type. You can refer to the cluster creation pages for creating [Apache Flink](./flink/flink-create-cluster-portal.md), [Trino](./trino/trino-create-cluster.md), and [Apache Spark](./spark/hdinsight-on-aks-spark-overview.md) clusters based on your need.
189178
@@ -245,7 +234,7 @@ The following steps provide details about the specific network and application r
245234
az network route-table route create -g $AKS_MANAGED_RG --name clientip --route-table-name $ROUTE_TABLE_NAME --address-prefix {Client_IPs} --next-hop-type Internet
246235
```
247236

248-
If you can't reach the cluster and have configured NSG, follow [use NSG to restrict the traffic](./secure-traffic-by-nsg.md) to allow the traffic.
237+
If you can't reach the cluster after having configured NSG, follow [use NSG to restrict the traffic](./secure-traffic-by-nsg.md) to allow the traffic.
249238

250239
> [!TIP]
251240
> If you want to allow more traffic, you can configure it over the firewall.

articles/service-health/resource-health-alert-monitor-guide.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,9 +37,9 @@ For information on how to configure resource health notification alerts by using
3737
1. In the Azure [portal](https://portal.azure.com/), select **Service Health**.
3838

3939
![Service Health Selection](./media/resource-health-alert-monitor-guide/service-health-selection.png)
40-
1. In the **Resource Health** section, select **Service Health**.
40+
1. In the **Resource Health** section, select **Resource Health**.
4141
1. Select **Add resource health alert**.
42-
1. The ** an alert rule wizard** opens to the **Conditions** tab, with the **Scope** tab already populated. Follow the steps for Resource Health alerts, starting from the **Conditions** tab, in the [new alert rule wizard](../azure-monitor/alerts/alerts-create-activity-log-alert-rule.md).
42+
1. The **Create an alert rule** wizard opens to the **Conditions** tab, with the **Scope** tab already populated. Follow the steps for Resource Health alerts, starting from the **Conditions** tab, in the [new alert rule wizard](../azure-monitor/alerts/alerts-create-activity-log-alert-rule.md).
4343

4444
## Next steps
4545

0 commit comments

Comments
 (0)