You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
1.**Was the alert rule resource moved or deleted?**
52
+
53
+
If an alert rule resource moves, gets renamed, or is deleted, all log alert rules referring to that resource will break. To fix this issue, alert rules need to be recreated using a valid target resource for the scope.
54
+
55
+
1.**Does the alert rule use a system-assigned managed identity?**
56
+
57
+
When you create a log alert rule with system-assigned managed identity, the identity is created without any permissions. After you create the rule, you need to assign the appropriate roles to the rule’s identity so that it can access the data you want to query. For example, you might need to give it a Reader role for the relevant Log Analytics workspaces, or a Reader role and a Database Viewer role for the relevant ADX cluster. See [managed identities](/azure/azure-monitor/alerts/alerts-create-log-alert-rule#configure-the-alert-rule-details) for more information about using managed identities in log alerts.
58
+
59
+
1.**Is the query used in the log search alert rule valid?**
60
+
61
+
When a log alert rule is created, the query is validated for correct syntax. But sometimes the query provided in the log alert rule can start to fail. Some common reasons are:
62
+
63
+
- Rules were created via the API, and the user skipped validation.
64
+
- The query [runs on multiple resources](../logs/cross-workspace-query.md), and one or more of the resources was deleted or moved.
65
+
- The [query fails](../logs/api/errors.md) because:
66
+
- The logging solution wasn't [deployed to the workspace](../insights/solutions.md#install-a-monitoring-solution), so tables aren't created.
67
+
- Data stopped flowing to a table in the query for more than 30 days.
68
+
-[Custom logs tables](../agents/data-sources-custom-logs.md) haven't been created because the data flow hasn't started.
69
+
- Changes in the [query language](/azure/kusto/query/) include a revised format for commands and functions, so the query provided earlier is no longer valid.
70
+
71
+
[Azure Advisor](../../advisor/advisor-overview.md) warns you about this behavior. It adds a recommendation about the affected log search alert rule. The category used is 'High Availability' with medium impact and a description of 'Repair your log alert rule to ensure monitoring'.
72
+
51
73
1.**Was the the log search alert rule disabled?**
52
74
53
75
If a log search alert rule query fails to evaluate continuously for a week, Azure Monitor disables it automatically.
@@ -117,29 +139,6 @@ If your log search alert didn't fire when it should have, check the following it
117
139
}
118
140
```
119
141
120
-
1.**Was the alert rule resource moved or deleted?**
121
-
122
-
If an alert rule resource moves, gets renamed, or is deleted, all log alert rules referring to that resource will break. To fix this issue, alert rules need to be recreated using a valid target resource for the scope.
123
-
124
-
1.**Does the alert rule uses a system-assigned managed identity?**
125
-
126
-
When you create a log alert rule with system-assigned managed identity, the identity is created without any permissions. After you create the rule, you need to assign the appropriate roles to the rule’s identity so that it can access the data you want to query. For example, you might need to give it a Reader role for the relevant Log Analytics workspaces, or a Reader role and a Database Viewer role for the relevant ADX cluster. See [managed identities](/azure/azure-monitor/alerts/alerts-create-log-alert-rule#configure-the-alert-rule-details) for more information about using managed identities in log alerts.
127
-
128
-
1.**Is the query used in the log search alert rule valid?**
129
-
130
-
When a log alert rule is created, the query is validated for correct syntax. But sometimes the query provided in the log alert rule can start to fail. Some common reasons are:
131
-
132
-
- Rules were created via the API, and the user skipped validation.
133
-
- The query [runs on multiple resources](../logs/cross-workspace-query.md), and one or more of the resources was deleted or moved.
134
-
- The [query fails](../logs/api/errors.md) because:
135
-
- The logging solution wasn't [deployed to the workspace](../insights/solutions.md#install-a-monitoring-solution), so tables aren't created.
136
-
- Data stopped flowing to a table in the query for more than 30 days.
137
-
-[Custom logs tables](../agents/data-sources-custom-logs.md) haven't been created because the data flow hasn't started.
138
-
- Changes in the [query language](/azure/kusto/query/) include a revised format for commands and functions, so the query provided earlier is no longer valid.
139
-
140
-
[Azure Advisor](../../advisor/advisor-overview.md) warns you about this behavior. It adds a recommendation about the affected log search alert rule. The category used is 'High Availability' with medium impact and a description of 'Repair your log alert rule to ensure monitoring'.
141
-
142
-
143
142
## A log search alert fired when it shouldn't have
144
143
145
144
A configured [log alert rule in Azure Monitor](./alerts-log.md) might be triggered unexpectedly. The following sections describe some common reasons.
0 commit comments