You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -40,7 +41,7 @@ Check by clicking on the fired alert in the portal, and look at the history tab
40
41
It is common that internal mailing lists or distribution lists block emails from external email addresses. You need to whitelist the above email addresses.
41
42
To test, add to the action group a regular work email address (not a mailing list) to the action group and see if alerts arrive to that email.
42
43
43
-
1.**Was the email processed by inbox rules or a spam filter?**
44
+
1.**Was the email processed by inbox rules or a spam filter?**
44
45
45
46
Verify that there are no inbox rules that delete those emails or move them to a side folder. For example, inbox rules could catch specific senders or specific words in the subject.
46
47
@@ -49,7 +50,7 @@ Check by clicking on the fired alert in the portal, and look at the history tab
49
50
- the sender limits / spam settings / quarantine settings of your email server (like Exchange, Office 365, G-suite)
50
51
- the settings of your email security appliance, if any (like Barracuda, Cisco).
51
52
52
-
1.**Have you accidentally unsubscribed from the action group?**
53
+
1.**Have you accidentally unsubscribed from the action group?**
53
54
54
55
The alert emails provide a link to unsubscribe from the action group. To check if you have accidentally unsubscribed from this action group, either:
55
56
@@ -63,9 +64,9 @@ Check by clicking on the fired alert in the portal, and look at the history tab
63
64
64
65
To subscribe again – either use the link in the unsubscribe confirmation email you have received, or remove the email address from the action group, and then add it back again.
65
66
66
-
1.**Has this email address been receiving numerous of other emails from Azure?**
67
+
1.**Has this email address been receiving numerous of other emails from Azure?**
67
68
68
-
Email is [rate limited](alerts-rate-limiting.md) to no more than 100 emails every hour to each email address. If you pass this threshold, additional email notifications are dropped. Check if you have received a message indicating that your email address has been temporarily rate limited:
69
+
Email is [rate limited](alerts-rate-limiting.md) to no more than 100 emails every hour to each email address. If you pass this threshold, additional email notifications are dropped. Check if you have received a message indicating that your email address has been temporarily rate limited:
@@ -118,27 +119,35 @@ If you can see a fired alert in the portal, but its configured action did not tr
118
119
119
120
1.**Did a webhook not trigger?**
120
121
121
-
1.**Have the source IP addresses been blocked?** Whitelist the [IP addresses](action-groups.md#action-specific-information) that the webhook is called from.
122
+
1.**Have the source IP addresses been blocked?**
123
+
124
+
Whitelist the [IP addresses](action-groups.md#action-specific-information) that the webhook is called from.
122
125
123
-
1.**Does your webhook endpoint work correctly?** Verify the webhook endpoint you have configured is correct and the endpoint is working correctly. Check your webhook logs or instrument its code so you could investigate (for example, log the incoming payload).
126
+
1.**Does your webhook endpoint work correctly?**
127
+
128
+
Verify the webhook endpoint you have configured is correct and the endpoint is working correctly. Check your webhook logs or instrument its code so you could investigate (for example, log the incoming payload).
124
129
125
-
1.**Are you calling Slack or Microsoft Teams?** Each of these endpoints expects a specific JSON format. Follow [these instructions](action-groups-logic-app.md) to configure a logic app action instead.
130
+
1.**Are you calling Slack or Microsoft Teams?**
131
+
132
+
Each of these endpoints expects a specific JSON format. Follow [these instructions](action-groups-logic-app.md) to configure a logic app action instead.
126
133
127
-
1.**Did your webhook became unresponsive or returned errors?** Our timeout period for a webhook response is 10 seconds. The webhook call will be retried up to two additional times when the following HTTP status codes are returned: 408, 429, 503, 504, or when the HTTP endpoint does not respond. The first retry happens after 10 seconds. The second and final retry happens after 100 seconds. If the second retry fails, the endpoint will not be called again for 30 minutes for any action group.
134
+
1.**Did your webhook became unresponsive or returned errors?**
135
+
136
+
Our timeout period for a webhook response is 10 seconds. The webhook call will be retried up to two additional times when the following HTTP status codes are returned: 408, 429, 503, 504, or when the HTTP endpoint does not respond. The first retry happens after 10 seconds. The second and final retry happens after 100 seconds. If the second retry fails, the endpoint will not be called again for 30 minutes for any action group.
128
137
129
138
## Action or notification happened more than once
130
139
131
140
If you have received a notification for an alert (such as an email or an SMS) more than once, or the alert’s action (such as webhook or Azure function) was triggered multiple times, follow these steps:
132
141
133
142
1.**Is it really the same alert?**
134
143
135
-
In some cases, multiple similar alerts are fired at around the same time. So, it might just seem like the same alert triggered its actions multiple times. For example, an activity log alert rule might be configured to fire both when an event has started, and when it has finished (succeeded or failed), by not filtering on the event status field.
144
+
In some cases, multiple similar alerts are fired at around the same time. So, it might just seem like the same alert triggered its actions multiple times. For example, an activity log alert rule might be configured to fire both when an event has started, and when it has finished (succeeded or failed), by not filtering on the event status field.
136
145
137
146
To check if these actions or notifications came from different alerts, examine the alert details, such as its timestamp and either the alert id or its correlation id. Alternatively, check the list of fired alerts in the portal. If that is the case, you would need to adapt the alert rule logic or otherwise configure the alert source.
138
147
139
148
1.**Does the action repeat in multiple action groups?**
140
149
141
-
When an alert is fired, each of its action groups is processed independently. So, if an action (such as an email address) appears in multiple triggered action groups, it would be called once per action group.
150
+
When an alert is fired, each of its action groups is processed independently. So, if an action (such as an email address) appears in multiple triggered action groups, it would be called once per action group.
142
151
143
152
To check which action groups were triggered, check the alert history tab. You would see there both action groups defined in the alert rule, and action groups added to the alert by action rules:
144
153
@@ -148,8 +157,9 @@ If you have received a notification for an alert (such as an email or an SMS) mo
148
157
149
158
If you have received the alert, but believe some of its fields are missing or incorrect, follow these steps:
150
159
151
-
1.**Did you pick the correct format for the action?**
152
-
Each action type (email, webhook, etc.) has two formats – the default, legacy format, and the [newer common schema format](alerts-common-schema.md). When you create an action group, you specify the format you want per action – different actions in the action groups may have different formats.
160
+
1.**Did you pick the correct format for the action?**
161
+
162
+
Each action type (email, webhook, etc.) has two formats – the default, legacy format, and the [newer common schema format](alerts-common-schema.md). When you create an action group, you specify the format you want per action – different actions in the action groups may have different formats.
153
163
154
164
For example, for webhook action:
155
165
@@ -161,15 +171,14 @@ If you have received the alert, but believe some of its fields are missing or in
161
171
162
172
163
173
1.**Activity log alerts. Is the information available in the activity log?**
174
+
164
175
[Activity log alerts](activity-log-alerts.md) are alerts that are based on events written to the Azure Activity Log, such as events about creating, updating or deleting Azure resources, service health and resource health events, or findings from Azure Advisor and Azure Policy. If you have received an alert based on the activity log but some fields that you need are missing or incorrect, first check the events in the activity log itself. If the Azure resource did not write the fields you are looking for in its activity log event, those fields will not be included in the corresponding alert.
165
176
166
177
## Action rule not working as expected
167
178
168
179
If you can see a fired alert in the portal, but a related action rule did not work as expected, follow these steps:
169
180
170
-
1.**Is the action rule enabled?**
171
-
6
172
-
Check the action rule status column to verify that the related action role is enabled.
181
+
1.**Is the action rule enabled?** Check the action rule status column to verify that the related action role is enabled.
@@ -179,7 +188,7 @@ If you can see a fired alert in the portal, but a related action rule did not wo
179
188
180
189
Service health alerts (monitor service = “Service Health”) are not affected by action rules.
181
190
182
-
1.**Did the action rule act on your alert?**
191
+
1.**Did the action rule act on your alert?**
183
192
184
193
Check if the action rule has suppressed your alert by clicking on the fired alert in the portal, and look at the history tab.
185
194
@@ -192,14 +201,15 @@ If you can see a fired alert in the portal, but a related action rule did not wo
192
201

193
202
194
203
195
-
1.**Does the action rule scope and filter match the fired alert?**
204
+
1.**Does the action rule scope and filter match the fired alert?**
196
205
197
206
If you think the action rule should have fired but didn’t, or that it shouldn’t have fired but it did, carefully examine the action rule scope and filter conditions versus the properties of the fired alert.
198
207
199
208
200
209
## How to find the alert id of a fired alert
201
210
202
211
When opening a case about a specific fired alert (such as – if you did not receive its email notification), you will need to provide the alert id.
212
+
203
213
To locate it, follow these steps:
204
214
205
215
1. In the Azure portal, navigate to the list of fired alerts, and find that specific alert. You can use the filters to help you locate it.
@@ -214,13 +224,15 @@ To locate it, follow these steps:
214
224
215
225
If you received an error while trying to create, update or delete an [action rule](alerts-action-rules.md), follow these steps:
216
226
217
-
1.**Did you receive a permission error?**
227
+
1.**Did you receive a permission error?**
218
228
219
229
You should either have the [Monitoring Contributor built-in role](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#monitoring-contributor), or the specific permissions related to action rules and alerts.
220
230
221
-
1.**Did you verify the action rule parameters?**
231
+
1.**Did you verify the action rule parameters?**
222
232
223
233
Check the [action rule documentation](alerts-action-rules.md), or the [action rule PowerShell Set-AzActionRule](https://docs.microsoft.com/powershell/module/az.alertsmanagement/Set-AzActionRule?view=azps-3.5.0) command.
224
234
225
235
226
236
## Next steps
237
+
238
+
Go back to the Azure portal[http://portal.azure.com to check if you've solved your issue with any of the advice above
0 commit comments