Set up monitoring notifications with Azure Alerts
After setting up Azure Monitor integration, you can start setting up monitoring notifications with Azure Alerts.
Azure Alerts is a unified notification hub for all types of important conditions found in Azure monitoring data. The integration of Azure Alerts enables you to consume alerts, which are automatically transformed into events that are leveraged by Davis AI for deeper insights.
To set up monitoring notifications with Azure Alerts, complete the following steps.
Create an API token
To generate an API token
- In the Dynatrace menu, go to Access tokens.
- Select Generate new token.
- Enter a name for your token.
- Find and select the Ingest metrics scope.
- Select Generate token.
- Select Copy to copy the generated token to the clipboard. Store the token in a password manager for future use.
You can assign multiple permissions to a single token, or you can generate several tokens, each with different access levels, and use them accordingly. Check your organization's security policies for best practices.
Configure one or more designated ActiveGates
The ActiveGate designated to consume Azure Alerts doesn’t have to be the same ActiveGate that runs the Azure Monitor integration. It can be any other Azure monitoring-enabled ActiveGate.
To configure a designated ActiveGate to consume Azure Alerts
Configure a valid TLS certificate (not a self-signed certificate) for the ActiveGate to communicate via HTTPS. Ensure that root certificate is accepted by Azure. For details, see how to configure custom SSL certificate for an ActiveGate.
Add the following lines to your ActiveGate
custom.propertiesfile and restart the ActiveGate after applying the configuration.plaintext
[azure_monitoring] event_servlet = true
Give access to ActiveGate for Azure Alerts source IP addresses.
For more details, see source IP address ranges in Azure documentation.
Configure Azure Alerts via webhook
Azure Alerts consumed via webhooks are configured in your Azure Alert Rules. The alerts are mapped to the closest known matching entity. This means that they either map to their related Azure resource entity or, as a fallback, to the Azure subscription of the resource.
To configure Azure Alerts via webhook, you need to create an alert rule and an action group that will trigger a webhook.
In Azure Portal, go to Home > Monitor > Alerts, and then select Create > Alert rule.
Select Scope, and then Select scope.
Filter for and select the resource you want to monitor, and then select Done.
Select Condition, and then select Add condition.
Filter for, select, and customize the signal type that will trigger your alert.
Select Next: Actions, and then select Create action group.
Enter the subscription that will manage the deployed resources and costs, the resource group to which the subscription belongs, and the name (and display name) for the action group.
Select Actions and enter the following values:
- For Action type, select Webhook and enter a name.
- For URI, enter
https://<YOUR_ACTIVEGATE_ADDRESS>:9999/modules/azure_monitoring/alerts_webhook?token=<YOUR_API_TOKEN>, making sure to replace
<YOUR_API_TOKEN>with your own values.
Leave the common alert schema disabled, and then select OK.
The common alert schema is not supported.
- Select Review and create, and then select Create.
After the action group is created, you can view and edit it in Alerts > Action groups.
For more information, see Webhook rules in Azure documentation.
Azure Alert types
The following alert types are supported.
Metric alerts are complementary to Dynatrace integration of Azure Monitor metrics.
Metric alerts enable you to retrieve metric-based events without the need to push the metrics to Dynatrace. This is helpful in reducing API and network pressure, especially in cases where you might not need the metric (for example, for charting purposes).
The event type is defined based on alert Severity:
- Sev-0 (Critical):
- Sev-1 (Error):
- Sev-2 (Warning):
- Default (Informational):
Dynatrace supports three types of activity notifications.
Activity Log Resource Health
The event type is defined based on severity Level:
See Configure resource health alerts using Azure portal in Azure documentation for more information.
Activity Log Service Health
The event type is defined based on IncidentType:
- Incident or Security + Error:
See Create activity log alerts on service notifications using the Azure portal in Azure documentation for more information.
Activity Log Administrative
- Default: CUSTOM_ANNOTATION