Skip to content

Commit f062649

Browse files
authored
Fix spacing
1 parent 5cd6cf4 commit f062649

File tree

1 file changed

+33
-21
lines changed

1 file changed

+33
-21
lines changed

articles/azure-monitor/platform/alerts-troubleshoot.md

Lines changed: 33 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
---
22
title: Troubleshooting Azure Monitor alerts and notifications
33
description: Common issues with Azure Monitor alerts and possible solutions.
4-
author: rboucher
4+
author: ofirmanor
55
ms.author: ofmanor
66
ms.topic: reference
7-
ms.date: 03/02/2020
7+
ms.date: 03/16/2020
88
ms.subservice: alerts
99
---
1010
# Troubleshooting problems in Azure Monitor alerts
@@ -22,6 +22,7 @@ If you can see a fired alert in the Azure portal, but have an issue with some of
2222
If you can see a fired alert in the Azure portal, but did not receive the email that you have configured about it, follow these steps:
2323

2424
1. **Was the email suppressed by an [action rule](alerts-action-rules.md)**?
25+
2526
Check by clicking on the fired alert in the portal, and look at the history tab for suppressed [action groups](action-groups.md):
2627

2728
![Alert action rule suppression history](media/alerts-troubleshoot/history-action-rule.png)
@@ -40,7 +41,7 @@ Check by clicking on the fired alert in the portal, and look at the history tab
4041
It is common that internal mailing lists or distribution lists block emails from external email addresses. You need to whitelist the above email addresses.
4142
To test, add to the action group a regular work email address (not a mailing list) to the action group and see if alerts arrive to that email.
4243

43-
1. **Was the email processed by inbox rules or a spam filter?**
44+
1. **Was the email processed by inbox rules or a spam filter?**
4445

4546
Verify that there are no inbox rules that delete those emails or move them to a side folder. For example, inbox rules could catch specific senders or specific words in the subject.
4647

@@ -49,7 +50,7 @@ Check by clicking on the fired alert in the portal, and look at the history tab
4950
- the sender limits / spam settings / quarantine settings of your email server (like Exchange, Office 365, G-suite)
5051
- the settings of your email security appliance, if any (like Barracuda, Cisco).
5152

52-
1. **Have you accidentally unsubscribed from the action group?**
53+
1. **Have you accidentally unsubscribed from the action group?**
5354

5455
The alert emails provide a link to unsubscribe from the action group. To check if you have accidentally unsubscribed from this action group, either:
5556

@@ -63,9 +64,9 @@ Check by clicking on the fired alert in the portal, and look at the history tab
6364

6465
To subscribe again – either use the link in the unsubscribe confirmation email you have received, or remove the email address from the action group, and then add it back again.
6566

66-
1. **Has this email address been receiving numerous of other emails from Azure?**
67+
1. **Has this email address been receiving numerous of other emails from Azure?**
6768

68-
Email is [rate limited](alerts-rate-limiting.md) to no more than 100 emails every hour to each email address. If you pass this threshold, additional email notifications are dropped. Check if you have received a message indicating that your email address has been temporarily rate limited:
69+
Email is [rate limited](alerts-rate-limiting.md) to no more than 100 emails every hour to each email address. If you pass this threshold, additional email notifications are dropped. Check if you have received a message indicating that your email address has been temporarily rate limited:
6970

7071
![Email rate limited](media/alerts-troubleshoot/email-paused.png)
7172

@@ -118,27 +119,35 @@ If you can see a fired alert in the portal, but its configured action did not tr
118119

119120
1. **Did a webhook not trigger?**
120121

121-
1. **Have the source IP addresses been blocked?** Whitelist the [IP addresses](action-groups.md#action-specific-information) that the webhook is called from.
122+
1. **Have the source IP addresses been blocked?**
123+
124+
Whitelist the [IP addresses](action-groups.md#action-specific-information) that the webhook is called from.
122125

123-
1. **Does your webhook endpoint work correctly?** Verify the webhook endpoint you have configured is correct and the endpoint is working correctly. Check your webhook logs or instrument its code so you could investigate (for example, log the incoming payload).
126+
1. **Does your webhook endpoint work correctly?**
127+
128+
Verify the webhook endpoint you have configured is correct and the endpoint is working correctly. Check your webhook logs or instrument its code so you could investigate (for example, log the incoming payload).
124129

125-
1. **Are you calling Slack or Microsoft Teams?** Each of these endpoints expects a specific JSON format. Follow [these instructions](action-groups-logic-app.md) to configure a logic app action instead.
130+
1. **Are you calling Slack or Microsoft Teams?**
131+
132+
Each of these endpoints expects a specific JSON format. Follow [these instructions](action-groups-logic-app.md) to configure a logic app action instead.
126133

127-
1. **Did your webhook became unresponsive or returned errors?** Our timeout period for a webhook response is 10 seconds. The webhook call will be retried up to two additional times when the following HTTP status codes are returned: 408, 429, 503, 504, or when the HTTP endpoint does not respond. The first retry happens after 10 seconds. The second and final retry happens after 100 seconds. If the second retry fails, the endpoint will not be called again for 30 minutes for any action group.
134+
1. **Did your webhook became unresponsive or returned errors?**
135+
136+
Our timeout period for a webhook response is 10 seconds. The webhook call will be retried up to two additional times when the following HTTP status codes are returned: 408, 429, 503, 504, or when the HTTP endpoint does not respond. The first retry happens after 10 seconds. The second and final retry happens after 100 seconds. If the second retry fails, the endpoint will not be called again for 30 minutes for any action group.
128137

129138
## Action or notification happened more than once
130139

131140
If you have received a notification for an alert (such as an email or an SMS) more than once, or the alert’s action (such as webhook or Azure function) was triggered multiple times, follow these steps:
132141

133142
1. **Is it really the same alert?**
134143

135-
In some cases, multiple similar alerts are fired at around the same time. So, it might just seem like the same alert triggered its actions multiple times. For example, an activity log alert rule might be configured to fire both when an event has started, and when it has finished (succeeded or failed), by not filtering on the event status field.
144+
In some cases, multiple similar alerts are fired at around the same time. So, it might just seem like the same alert triggered its actions multiple times. For example, an activity log alert rule might be configured to fire both when an event has started, and when it has finished (succeeded or failed), by not filtering on the event status field.
136145

137146
To check if these actions or notifications came from different alerts, examine the alert details, such as its timestamp and either the alert id or its correlation id. Alternatively, check the list of fired alerts in the portal. If that is the case, you would need to adapt the alert rule logic or otherwise configure the alert source.
138147

139148
1. **Does the action repeat in multiple action groups?**
140149

141-
When an alert is fired, each of its action groups is processed independently. So, if an action (such as an email address) appears in multiple triggered action groups, it would be called once per action group.
150+
When an alert is fired, each of its action groups is processed independently. So, if an action (such as an email address) appears in multiple triggered action groups, it would be called once per action group.
142151

143152
To check which action groups were triggered, check the alert history tab. You would see there both action groups defined in the alert rule, and action groups added to the alert by action rules:
144153

@@ -148,8 +157,9 @@ If you have received a notification for an alert (such as an email or an SMS) mo
148157

149158
If you have received the alert, but believe some of its fields are missing or incorrect, follow these steps:
150159

151-
1. **Did you pick the correct format for the action?**
152-
Each action type (email, webhook, etc.) has two formats – the default, legacy format, and the [newer common schema format](alerts-common-schema.md). When you create an action group, you specify the format you want per action – different actions in the action groups may have different formats.
160+
1. **Did you pick the correct format for the action?**
161+
162+
Each action type (email, webhook, etc.) has two formats – the default, legacy format, and the [newer common schema format](alerts-common-schema.md). When you create an action group, you specify the format you want per action – different actions in the action groups may have different formats.
153163

154164
For example, for webhook action:
155165

@@ -161,15 +171,14 @@ If you have received the alert, but believe some of its fields are missing or in
161171

162172

163173
1. **Activity log alerts. Is the information available in the activity log?**
174+
164175
[Activity log alerts](activity-log-alerts.md) are alerts that are based on events written to the Azure Activity Log, such as events about creating, updating or deleting Azure resources, service health and resource health events, or findings from Azure Advisor and Azure Policy. If you have received an alert based on the activity log but some fields that you need are missing or incorrect, first check the events in the activity log itself. If the Azure resource did not write the fields you are looking for in its activity log event, those fields will not be included in the corresponding alert.
165176

166177
## Action rule not working as expected
167178

168179
If you can see a fired alert in the portal, but a related action rule did not work as expected, follow these steps:
169180

170-
1. **Is the action rule enabled?**
171-
6
172-
Check the action rule status column to verify that the related action role is enabled.
181+
1. **Is the action rule enabled?** Check the action rule status column to verify that the related action role is enabled.
173182

174183
![graphic](media/alerts-troubleshoot/action-rule-status.png)
175184

@@ -179,7 +188,7 @@ If you can see a fired alert in the portal, but a related action rule did not wo
179188

180189
Service health alerts (monitor service = “Service Health”) are not affected by action rules.
181190

182-
1. **Did the action rule act on your alert?**
191+
1. **Did the action rule act on your alert?**
183192

184193
Check if the action rule has suppressed your alert by clicking on the fired alert in the portal, and look at the history tab.
185194

@@ -192,14 +201,15 @@ If you can see a fired alert in the portal, but a related action rule did not wo
192201
![Action repeated in multiple action groups](media/alerts-troubleshoot/action-repeated-multi-action-groups.png)
193202

194203

195-
1. **Does the action rule scope and filter match the fired alert?**
204+
1. **Does the action rule scope and filter match the fired alert?**
196205

197206
If you think the action rule should have fired but didn’t, or that it shouldn’t have fired but it did, carefully examine the action rule scope and filter conditions versus the properties of the fired alert.
198207

199208

200209
## How to find the alert id of a fired alert
201210

202211
When opening a case about a specific fired alert (such as – if you did not receive its email notification), you will need to provide the alert id.
212+
203213
To locate it, follow these steps:
204214

205215
1. In the Azure portal, navigate to the list of fired alerts, and find that specific alert. You can use the filters to help you locate it.
@@ -214,13 +224,15 @@ To locate it, follow these steps:
214224

215225
If you received an error while trying to create, update or delete an [action rule](alerts-action-rules.md), follow these steps:
216226

217-
1. **Did you receive a permission error?**
227+
1. **Did you receive a permission error?**
218228

219229
You should either have the [Monitoring Contributor built-in role](https://docs.microsoft.com/azure/role-based-access-control/built-in-roles#monitoring-contributor), or the specific permissions related to action rules and alerts.
220230

221-
1. **Did you verify the action rule parameters?**
231+
1. **Did you verify the action rule parameters?**
222232

223233
Check the [action rule documentation](alerts-action-rules.md), or the [action rule PowerShell Set-AzActionRule](https://docs.microsoft.com/powershell/module/az.alertsmanagement/Set-AzActionRule?view=azps-3.5.0) command.
224234

225235

226236
## Next steps
237+
238+
Go back to the Azure portal[http://portal.azure.com to check if you've solved your issue with any of the advice above

0 commit comments

Comments
 (0)