Azure Monitor Configuration
Configure Azure Monitor alerts to work with Alert Bridge.
Overview
Cynteo Alert Bridge integrates with Azure Monitor using Action Groups and Common Alert Schema. This guide shows you how to configure your alerts properly.
Prerequisites
- Azure subscription with Monitor alerts configured
- Contributor access to create/modify alert rules
- Alert Bridge deployed (Quick Start)
Understanding Alert Flow
Azure Resource → Azure Monitor → Alert Rule → Action Group → Alert Bridge → SolarWinds
Step 1: Create Action Group
1.1 Navigate to Action Groups
- Open Azure Portal
- Search for “Monitor”
- Click “Alerts” in left menu
- Click “Action groups”
- Click "+ Create"
1.2 Configure Basics
Subscription: Your Azure subscription
Resource Group: Same as Alert Bridge (recommended)
Region: Global (default)
Action group name: alert-bridge-solarwinds
Display name: SolarWinds (shows in alert emails)
1.3 Add Webhook Action
Click “Next: Actions”
Action type: Webhook
Name: Send to SolarWinds
URI: Paste your Alert Bridge webhook URL
To get webhook URL:
- Go to your Alert Bridge resource group
- Click the Logic App (name:
logicapp-*) - Click “Overview”
- Copy “Callback URL”
✅ CRITICAL: Check “Enable the common alert schema”
This ensures alerts are sent in the correct format!
1.4 Review and Create
Click “Review + create” → “Create”
Step 2: Configure Existing Alerts
Add Action Group to Alert Rule
For each alert you want sent to SolarWinds:
- Monitor → Alerts → Alert rules
- Select an alert rule
- Click “Edit” (or “Manage actions”)
- Under “Action groups”, click "+ Add action group"
- Select
alert-bridge-solarwinds - Click “Save”
Repeat for all relevant alert rules.
Step 3: Create New Alert Rule (Example)
Example: CPU Alert for VM
3.1 Create Alert Rule
- Navigate to a Virtual Machine
- Click “Alerts” in left menu
- Click "+ Create" → “Alert rule”
3.2 Configure Condition
Signal: Percentage CPU
Threshold: Static
Operator: Greater than
Threshold value: 80
Aggregation type: Average
Evaluation period:
- Aggregation granularity: 5 minutes
- Frequency: 5 minutes
3.3 Configure Actions
Action group: Select alert-bridge-solarwinds
3.4 Configure Details
Severity: Select appropriate severity (Sev0-Sev3)
Alert rule name: High CPU Usage
Description: Alert when CPU exceeds 80%
Resource group: Your resource group
Enable rule: ✅ Yes
Click “Review + create” → “Create”
Alert Severity Mapping
Azure Monitor severity maps to SolarWinds priority:
| Azure Severity | SolarWinds Priority | Use Case |
|---|---|---|
| Sev0 | High | Critical outages |
| Sev1 | High | Major issues |
| Sev2 | Medium | Performance degradation |
| Sev3 | Low | Informational |
Configure this mapping during Alert Bridge deployment.
Common Alert Schema
Why Common Alert Schema is Required
Alert Bridge requires Common Alert Schema to properly parse alerts.
✅ Correct (Common Alert Schema):
{
"schemaId": "azureMonitorCommonAlertSchema",
"data": {
"essentials": {
"alertId": "...",
"severity": "Sev1",
"monitorCondition": "Fired"
}
}
}
❌ Incorrect (Legacy Schema):
{
"status": "Activated",
"context": {
"severity": "High"
}
}
How to Enable
When creating action group:
- ✅ Check “Enable the common alert schema”
For existing action groups:
- Edit action group
- Edit webhook action
- ✅ Check “Enable the common alert schema”
- Save
Alert Types Supported
Alert Bridge supports all Azure Monitor alert types:
Metric Alerts
- Virtual machine metrics (CPU, memory, disk)
- App Service metrics (response time, errors)
- Storage metrics (capacity, transactions)
- ANY Azure resource metric
Log Alerts
- Log Analytics queries
- Application Insights queries
- Custom log searches
Activity Log Alerts
- Resource health events
- Service health notifications
- Administrative operations
Resource Health Alerts
- Resource availability changes
- Platform-initiated events
Best Practices
1. Use Descriptive Alert Names
Good:
"Production Web App - High Response Time"
"Database Server - Low Memory"
"Storage Account - High Transactions"
Bad:
"Alert 1"
"Test"
"CPU"
Alert name becomes the SolarWinds incident title!
2. Set Appropriate Severity
- Sev0: Service down, data loss, security breach
- Sev1: Major functionality impaired
- Sev2: Degraded performance, non-critical issues
- Sev3: Informational, capacity planning
3. Add Helpful Descriptions
Descriptions appear in SolarWinds incident details:
"Alert triggers when average CPU exceeds 80% for 5 minutes.
Indicates potential capacity issues. Check recent deployments
and scale up if needed."
4. Use Dynamic Thresholds (when applicable)
For variable workloads, use dynamic thresholds instead of static:
- Automatically adapts to patterns
- Reduces false positives
- Better for seasonal/cyclical workloads
5. Configure Alert Suppression
Prevent alert storms:
- Edit alert rule
- Advanced options → Alert suppression
- Enable for appropriate duration (e.g., 5 minutes)
This prevents multiple incidents for rapid-fire alerts.
Testing Your Alerts
Method 1: Lower Threshold Temporarily
- Edit alert rule
- Lower threshold to trigger immediately (e.g., CPU > 1%)
- Save
- Wait 1-2 minutes
- Verify incident in SolarWinds
- Restore original threshold
Method 2: Use Test Action Group
- Action group → “Test” button
- Select sample alert type
- Click “Test”
- Check SolarWinds for test incident
Troubleshooting
Alert Fires But No Incident
Check:
- Action group uses common alert schema ✅
- Webhook URL is correct
- Logic App run history shows success
- Troubleshooting Guide
Incident Missing Information
Cause: Legacy alert schema used
Fix: Enable common alert schema in action group
Duplicate Incidents
Cause: Multiple action groups sending same alert
Fix: Remove duplicate action groups from alert rule
Advanced Configuration
Multi-Subscription Setup
Option A: Deploy Alert Bridge in each subscription
- Isolated per subscription
- Separate billing per deployment
Option B: Use one Alert Bridge for all subscriptions
- Deploy Alert Bridge in “hub” subscription
- Get webhook URL
- Create action groups in each subscription pointing to same URL
- All alerts go to same SolarWinds instance
Filtering by Resource Group
Alert Bridge processes ALL alerts sent to it. To filter:
- Create separate action groups for different resource groups
- Or use severity filtering
- Or configure SolarWinds rules to auto-close certain incidents
Custom Fields
Alert Bridge includes:
- Alert ID (for deduplication)
- Resource information
- Metric values
- Azure portal links
For additional custom fields, see Advanced Configuration.
Next Steps
Need help? Contact support@cynteocloud.com