You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/advisor/advisor-high-availability-recommendations.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,7 +12,7 @@ Azure Advisor helps you ensure and improve the continuity of your business-criti
12
12
13
13
## Check the version of your Check Point network virtual appliance image
14
14
15
-
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation will help you upgrade to a newer version of the image that addresses this problem. This check will ensure business continuity through better network connectivity.
15
+
Advisor can identify whether your virtual machine is running a version of the Check Point image that has been known to lose network connectivity during platform servicing operations. The Advisor recommendation helps you upgrade to a newer version of the image that addresses this problem. This check ensures business continuity through better network connectivity.
16
16
17
17
## Ensure application gateway fault tolerance
18
18
@@ -56,7 +56,7 @@ Azure Advisor checks for any VPN gateways that use a Basic SKU and recommends th
56
56
- Higher stability and availability.
57
57
58
58
## Ensure reliable outbound connectivity with VNet NAT
59
-
Using default outbound connecitivty provided by a Standard Load Balancer or other Azure resources is not recommended for production workloads as this causes connection failures (also called SNAT port exhaustion). The recommended approach is using a VNet NAT which will prevent any failures of connectivity in this regard. NAT can scale seamlessly to ensure your application is never out ports. [Learn more about VNet NAT](../virtual-network/nat-gateway/nat-overview.md).
59
+
Using default outbound connectivity provided by a Standard Load Balancer or other Azure resources is not recommended for production workloads as this causes connection failures (also called SNAT port exhaustion). The recommended approach is using a VNet NAT which will prevent any failures of connectivity in this regard. NAT can scale seamlessly to ensure your application is never out ports. [Learn more about VNet NAT](../virtual-network/nat-gateway/nat-overview.md).
@@ -76,7 +76,7 @@ Virtual machines in an availability set with disks that share either storage acc
76
76
## Repair invalid log alert rules
77
77
78
78
Azure Advisor detects log alert rules that have invalid queries specified in their condition section.
79
-
Azure Monitor log alert rules run queries at specified frequency and fire alerts based on the results. Queries can become invalid over time because of changes in the referenced resources, tables, or commands. Advisor recommends corrections for alert queries to prevent the rules from being automatically disabled and to ensure monitoring coverage. For more information, see [Troubleshooting alert rules](../azure-monitor/alerts/alerts-troubleshoot-log.md#query-used-in-a-log-alert-isnt-valid)
79
+
Azure Monitor log alert rules run queries at specified frequency and fire alerts based on the results. Queries can become invalid over time because of changes in the referenced resources, tables, or commands. Advisor recommends corrections for alert queries to prevent the rules from being automatically disabled and to ensure monitoring coverage. For more information, see [Troubleshooting alert rules](../azure-monitor/alerts/alerts-troubleshoot-log.md)
80
80
81
81
## Configure Consistent indexing mode on your Azure Cosmos DB collection
82
82
@@ -110,10 +110,10 @@ Starting July 1, 2020, you won't be able to create new Spark clusters by using S
110
110
Virtual machines that don't have replication enabled to another region aren't resilient to regional outages. Replicating virtual machines reduces any adverse business impact during Azure region outages. Advisor detects VMs on which replication isn't enabled and recommends enabling it. When you enable replication, if there's an outage, you can quickly bring up your virtual machines in a remote Azure region. [Learn more about virtual machine replication.](../site-recovery/azure-to-azure-quickstart.md)
111
111
112
112
## Upgrade to the latest version of the Azure Connected Machine agent
113
-
The [Azure Connected Machine agent](../azure-arc/servers/manage-agent.md) is updated regularly with bug fixes, stability enhancements, and new functionality. We have identified resources which are not working on the latest version of machine agent and this Advisor recommendation will suggest you to upgrade your agent to the latest version for the best Azure Arc experience.
113
+
The [Azure Connected Machine agent](../azure-arc/servers/manage-agent.md) is updated regularly with bug fixes, stability enhancements, and new functionality. We have identified resources which are not working on the latest version of machine agent and this Advisor recommendation suggests that you to upgrade your agent to the latest version for the best Azure Arc experience.
114
114
115
115
## Do not override hostname to ensure website integrity
116
-
Advisor recommend to try avoid overriding the hostname when configuring Application Gateway. Having a different domain on the frontend of Application Gateway than the one which is used to access the backend can potentially lead to cookies or redirect URLs being broken. Note that this might not be the case in all situations and that certain categories of backends (like REST API's) in general are less sensitive to this. Please make sure the backend is able to deal with this or update the Application Gateway configuration so the hostname does not need to be overwritten towards the backend. When used with App Service, attach a custom domain name to the Web App and avoid use of the `*.azurewebsites.net` host name towards the backend. [Learn more about custom domain](../application-gateway/troubleshoot-app-service-redirection-app-service-url.md).
116
+
Advisor recommends that you try avoid overriding the hostname when configuring Application Gateway. Having a different domain on the frontend of Application Gateway than the one which is used to access the backend can potentially lead to cookies or redirect URLs being broken. Note that this might not be the case in all situations and that certain categories of backends (like REST APIs) in general are less sensitive to this. Please make sure the backend is able to deal with this or update the Application Gateway configuration so the hostname does not need to be overwritten towards the backend. When used with App Service, attach a custom domain name to the Web App and avoid use of the `*.azurewebsites.net` host name towards the backend. [Learn more about custom domain](../application-gateway/troubleshoot-app-service-redirection-app-service-url.md).
* [Combine Azure Resource Graph tables with a Log Analytics workspace](../logs/azure-monitor-data-explorer-proxy.md#combine-azure-resource-graph-tables-with-a-log-analytics-workspace)
62
+
* Not supported in government clouds
63
+
63
64
1. Select **Run** to run the alert.
64
65
1. The **Preview** section shows you the query results. When you're finished editing your query, select **Continue Editing Alert**.
65
66
1. The **Condition** tab opens populated with your log query. By default, the rule counts the number of results in the last five minutes. If the system detects summarized query results, the rule is automatically updated with that information.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-create-metric-alert-rule.md
+45-1Lines changed: 45 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: This article shows you how to create a new metric alert rule.
4
4
author: AbbyMSFT
5
5
ms.author: abbyweisberg
6
6
ms.topic: how-to
7
-
ms.date: 11/27/2023
7
+
ms.date: 03/07/2024
8
8
ms.reviewer: harelbr
9
9
---
10
10
@@ -16,6 +16,14 @@ You create an alert rule by combining the resources to be monitored, the monitor
16
16
17
17
Alerts triggered by these alert rules contain a payload that uses the [common alert schema](alerts-common-schema.md).
18
18
19
+
## Permissions to create metric alert rules
20
+
21
+
To create a metric alert rule, you must have the following permissions:
22
+
23
+
- Read permission on the target resource of the alert rule.
24
+
- Write permission on the resource group in which the alert rule is created. If you're creating the alert rule from the Azure portal, the alert rule is created by default in the same resource group in which the target resource resides.
25
+
- Read permission on any action group associated to the alert rule, if applicable.
- Metric alert rule names can't end with a space or a period.
145
+
- The combined resource group name and alert rule name can't exceed 252 characters.
146
+
147
+
> [!NOTE]
148
+
> If the alert rule name contains characters that aren't alphabetic or numeric, for example, spaces, punctuation marks, or symbols, these characters might be URL-encoded when retrieved by certain clients.
149
+
150
+
## Restrictions when you use dimensions in a metric alert rule with multiple conditions
151
+
152
+
Metric alerts support alerting on multi-dimensional metrics and support defining multiple conditions, up to five conditions per alert rule.
153
+
154
+
Consider the following constraints when you use dimensions in an alert rule that contains multiple conditions:
155
+
156
+
- You can only select one value per dimension within each condition.
157
+
- You can't use the option to **Select all current and future values**. Select the asterisk (\*).
158
+
- When metrics that are configured in different conditions support the same dimension, a configured dimension value must be explicitly set in the same way for all those metrics in the relevant conditions.
159
+
For example:
160
+
- Consider a metric alert rule that's defined on a storage account and monitors two conditions:
161
+
* Total **Transactions** > 5
162
+
* Average **SuccessE2ELatency** > 250 ms
163
+
- You want to update the first condition and only monitor transactions where the **ApiName** dimension equals `"GetBlob"`.
164
+
- Because both the **Transactions** and **SuccessE2ELatency** metrics support an **ApiName** dimension, you'll need to update both conditions, and have them specify the **ApiName** dimension with a `"GetBlob"` value.
165
+
166
+
167
+
## Considerations when creating an alert rule that contains multiple criteria
168
+
- You can only select one value per dimension within each criterion.
169
+
- You can't use an asterisk (\*) as a dimension value.
170
+
- When metrics that are configured in different criteria support the same dimension, a configured dimension value must be explicitly set in the same way for all those metrics. For a Resource Manager template example, see [Create a metric alert with a Resource Manager template](./alerts-metric-create-templates.md#template-for-a-static-threshold-metric-alert-that-monitors-multiple-criteria).
171
+
172
+
129
173
## Next steps
130
174
[View and manage your alert instances](alerts-manage-alert-instances.md)
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-logic-apps.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ description: Learn how to create a logic app to process Azure Monitor alerts.
4
4
author: EdB-MSFT
5
5
ms.author: abbyweisberg
6
6
ms.topic: conceptual
7
-
ms.date: 02/09/2023
7
+
ms.date: 03/10/2024
8
8
ms.reviewer: edbaynash
9
9
10
10
# Customer intent: As an administrator, I want to create a logic app that's triggered by an alert so that I can send emails or Teams messages when an alert is fired.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-manage-alert-rules.md
+45-1Lines changed: 45 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,7 +3,7 @@ title: Manage your alert rules
3
3
description: Manage your alert rules in the Azure portal, or using the CLI or PowerShell.
4
4
author: AbbyMSFT
5
5
ms.author: abbyweisberg
6
-
ms.topic: conceptual
6
+
ms.topic: how-to
7
7
ms.custom: devx-track-azurecli
8
8
ms.date: 01/14/2024
9
9
ms.reviewer: harelbr
@@ -120,6 +120,33 @@ Metric alert rules have these dedicated PowerShell cmdlets:
120
120
-[Update](/rest/api/monitor/metricalerts/update): Update a metric alert rule.
121
121
-[Delete](/rest/api/monitor/metricalerts/delete): Delete a metric alert rule.
122
122
123
+
## Delete metric alert rules defined on a deleted resource
124
+
125
+
When you delete an Azure resource, associated metric alert rules aren't deleted automatically. To delete alert rules associated with a resource that's been deleted:
126
+
127
+
1. Open the resource group in which the deleted resource was defined.
128
+
1. In the list that displays the resources, select the **Show hidden types** checkbox.
129
+
1. Filter the list by Type == **microsoft.insights/metricalerts**.
130
+
1. Select the relevant alert rules and select **Delete**.
131
+
132
+
## Check the number of metric alert rules in use
133
+
134
+
To check the current number of metric alert rules in use, follow the next steps.
135
+
### From the Azure portal
136
+
137
+
1. Open the **Alerts** screen and select **Manage alert rules**.
138
+
1. Filter to the relevant subscription by using the **Subscription** dropdown box.
139
+
1. Make sure *not* to filter to a specific resource group, resource type, or resource.
140
+
1. In the **Signal type** dropdown box, select **Metrics**.
141
+
1. Verify that the **Status** dropdown box is set to **Enabled**.
142
+
1. The total number of metric alert rules are displayed above the alert rules list.
This section describes how to manage log search alerts using the cross-platform [Azure CLI](/cli/azure/get-started-with-azure-cli). The following examples use [Azure Cloud Shell](../../cloud-shell/overview.md).
@@ -157,6 +184,22 @@ A 201 response is returned on successful creation. 200 is returned on successful
157
184
Log search alert rules have this dedicated PowerShell cmdlet:
158
185
-[New-AzScheduledQueryRule](/powershell/module/az.monitor/new-azscheduledqueryrule): Creates a new log search alert rule or updates an existing log search alert rule.
159
186
187
+
## Check the number of log alert rules in use
188
+
189
+
### In the Azure portal
190
+
1. On the Alerts screen in Azure Monitor, select **Alert rules**.
191
+
1. In the **Subscription** dropdown control, filter to the subscription you want. (Make sure you don't filter to a specific resource group, resource type, or resource.)
192
+
1. In the **Signal type** dropdown control, select **Log Search**.
193
+
1. Verify that the **Status** dropdown control is set to **Enabled**.
194
+
195
+
The total number of log search alert rules is displayed above the rules list.
Copy file name to clipboardExpand all lines: articles/azure-monitor/alerts/alerts-metric-multiple-time-series-single-rule.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -108,7 +108,7 @@ For this alert rule, two metric time series are being monitored:
108
108
An AND operator is used between the conditions. The alert rule fires an alert when *all* conditions are met. The fired alert resolves if at least one of the conditions is no longer met.
109
109
110
110
> [!NOTE]
111
-
> There are restrictions when you use dimensions in an alert rule with multiple conditions. For more information, see [Restrictions when using dimensions in a metric alert rule with multiple conditions](alerts-troubleshoot-metric.md#restrictions-when-you-use-dimensions-in-a-metric-alert-rule-with-multiple-conditions).
111
+
> There are restrictions when you use dimensions in an alert rule with multiple conditions. For more information, see [Restrictions when using dimensions in a metric alert rule with multiple conditions](alerts-create-metric-alert-rule.md#restrictions-when-you-use-dimensions-in-a-metric-alert-rule-with-multiple-conditions).
0 commit comments