Skip to content

Commit d8a50e9

Browse files
committed
switched order of one answer
1 parent 38f4e40 commit d8a50e9

File tree

1 file changed

+22
-23
lines changed

1 file changed

+22
-23
lines changed

articles/azure-monitor/alerts/alerts-troubleshoot-log.md

Lines changed: 22 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,28 @@ If your log search alert didn't fire when it should have, check the following it
4848

4949
:::image type="content" source="media/alerts-troubleshoot-log/LogAlertSuppress.png" lightbox="media/alerts-troubleshoot-log/LogAlertSuppress.png" alt-text="Suppress alerts":::
5050

51+
1. **Was the alert rule resource moved or deleted?**
52+
53+
If an alert rule resource moves, gets renamed, or is deleted, all log alert rules referring to that resource will break. To fix this issue, alert rules need to be recreated using a valid target resource for the scope.
54+
55+
1. **Does the alert rule use a system-assigned managed identity?**
56+
57+
When you create a log alert rule with system-assigned managed identity, the identity is created without any permissions. After you create the rule, you need to assign the appropriate roles to the rule’s identity so that it can access the data you want to query. For example, you might need to give it a Reader role for the relevant Log Analytics workspaces, or a Reader role and a Database Viewer role for the relevant ADX cluster. See [managed identities](/azure/azure-monitor/alerts/alerts-create-log-alert-rule#configure-the-alert-rule-details) for more information about using managed identities in log alerts.
58+
59+
1. **Is the query used in the log search alert rule valid?**
60+
61+
When a log alert rule is created, the query is validated for correct syntax. But sometimes the query provided in the log alert rule can start to fail. Some common reasons are:
62+
63+
- Rules were created via the API, and the user skipped validation.
64+
- The query [runs on multiple resources](../logs/cross-workspace-query.md), and one or more of the resources was deleted or moved.
65+
- The [query fails](../logs/api/errors.md) because:
66+
- The logging solution wasn't [deployed to the workspace](../insights/solutions.md#install-a-monitoring-solution), so tables aren't created.
67+
- Data stopped flowing to a table in the query for more than 30 days.
68+
- [Custom logs tables](../agents/data-sources-custom-logs.md) haven't been created because the data flow hasn't started.
69+
- Changes in the [query language](/azure/kusto/query/) include a revised format for commands and functions, so the query provided earlier is no longer valid.
70+
71+
[Azure Advisor](../../advisor/advisor-overview.md) warns you about this behavior. It adds a recommendation about the affected log search alert rule. The category used is 'High Availability' with medium impact and a description of 'Repair your log alert rule to ensure monitoring'.
72+
5173
1. **Was the the log search alert rule disabled?**
5274

5375
If a log search alert rule query fails to evaluate continuously for a week, Azure Monitor disables it automatically.
@@ -117,29 +139,6 @@ If your log search alert didn't fire when it should have, check the following it
117139
}
118140
```
119141

120-
1. **Was the alert rule resource moved or deleted?**
121-
122-
If an alert rule resource moves, gets renamed, or is deleted, all log alert rules referring to that resource will break. To fix this issue, alert rules need to be recreated using a valid target resource for the scope.
123-
124-
1. **Does the alert rule uses a system-assigned managed identity?**
125-
126-
When you create a log alert rule with system-assigned managed identity, the identity is created without any permissions. After you create the rule, you need to assign the appropriate roles to the rule’s identity so that it can access the data you want to query. For example, you might need to give it a Reader role for the relevant Log Analytics workspaces, or a Reader role and a Database Viewer role for the relevant ADX cluster. See [managed identities](/azure/azure-monitor/alerts/alerts-create-log-alert-rule#configure-the-alert-rule-details) for more information about using managed identities in log alerts.
127-
128-
1. **Is the query used in the log search alert rule valid?**
129-
130-
When a log alert rule is created, the query is validated for correct syntax. But sometimes the query provided in the log alert rule can start to fail. Some common reasons are:
131-
132-
- Rules were created via the API, and the user skipped validation.
133-
- The query [runs on multiple resources](../logs/cross-workspace-query.md), and one or more of the resources was deleted or moved.
134-
- The [query fails](../logs/api/errors.md) because:
135-
- The logging solution wasn't [deployed to the workspace](../insights/solutions.md#install-a-monitoring-solution), so tables aren't created.
136-
- Data stopped flowing to a table in the query for more than 30 days.
137-
- [Custom logs tables](../agents/data-sources-custom-logs.md) haven't been created because the data flow hasn't started.
138-
- Changes in the [query language](/azure/kusto/query/) include a revised format for commands and functions, so the query provided earlier is no longer valid.
139-
140-
[Azure Advisor](../../advisor/advisor-overview.md) warns you about this behavior. It adds a recommendation about the affected log search alert rule. The category used is 'High Availability' with medium impact and a description of 'Repair your log alert rule to ensure monitoring'.
141-
142-
143142
## A log search alert fired when it shouldn't have
144143

145144
A configured [log alert rule in Azure Monitor](./alerts-log.md) might be triggered unexpectedly. The following sections describe some common reasons.

0 commit comments

Comments
 (0)