Configure Alert Action Group
Complete guide to setting up Azure Monitor action groups for Alert Bridge.
What is an Action Group?
An Action Group is a collection of notification and action settings that can be reused across multiple alert rules. It defines what happens when an alert fires.
For Alert Bridge, the action group sends alert data to your SolarWinds integration via webhook.
Prerequisites
- Azure subscription
- Alert Bridge deployed and running
- Contributor access to create action groups
Step-by-Step Guide
Step 1: Get Webhook URL
- Go to Azure Portal → Resource Groups
- Find your Alert Bridge resource group (e.g.,
rg-alert-bridge) - Click the Logic App resource (name:
logicapp-*) - Click “Overview” tab
- Find “Workflow URL” or “Callback URL”
- Click “Copy URL” button
The URL looks like:
https://prod-123.eastus.logic.azure.com:443/workflows/abc123.../triggers/manual/paths/invoke?api-version=2016-10-01&sp=%2Ftriggers...
Keep this URL handy - you’ll need it in the next step.
Step 2: Create Action Group
Navigate to Action Groups
- In Azure Portal, search for “Monitor”
- Click “Alerts” in the left navigation
- Click “Action groups”
- Click "+ Create" button
Basics Tab
Subscription: Select your Azure subscription
Resource Group: Select same as Alert Bridge (recommended)
Region: Global (default)
Action group name: alert-bridge-solarwinds
Display name: SolarWinds
Note: Display name appears in email/SMS notifications, keep it short!
Click “Next: Notifications >” (skip for now)
Notifications Tab
Skip this tab - we’ll use Actions instead.
Click “Next: Actions >”
Actions Tab
Click “+ Add action”
Action type: Select “Webhook” from dropdown
Name: Send to SolarWinds
Details:
- URI: Paste the webhook URL from Step 1
- Enable common alert schema: ✅ CHECKED (Critical!)
Click “OK”
Important: The “Enable common alert schema” checkbox MUST be checked for alerts to work properly!
Tags Tab (Optional)
Add tags if desired:
Environment: ProductionPurpose: ITSM Integration
Click “Next: Review + create >”
Review and Create
- Review your settings
- Ensure “Enable common alert schema” shows Yes
- Click “Create”
Wait ~30 seconds for creation to complete.
Step 3: Test Action Group
Manual Test
- After creation, click your action group name
- Click “Test action group” button (top toolbar)
- Sample type: Select “Metric Alert - CPU Percentage”
- Action type: Webhook
- Click “Test” button
Verify Results
In Azure:
- You should see “Test completed successfully”
- Check timestamp to confirm it just ran
In SolarWinds:
- Go to Incidents list
- Look for a new incident titled: “Azure Alert: Test”
- Should appear within 1-2 minutes
If incident appears: ✅ Success! Your action group works!
If not: See Troubleshooting below
Step 4: Add to Alert Rules
Now add this action group to your existing alert rules:
For Each Alert Rule:
- Monitor → Alerts → Alert rules
- Click an alert rule you want to send to SolarWinds
- Click “Edit” or “Manage actions”
- Action groups section → Click "+ Add action group"
- Select
alert-bridge-solarwinds - Click “Save”
Repeat for all relevant alerts.
Advanced Configuration
Multiple Action Groups
You can create multiple action groups for different scenarios:
Example 1: By Environment
alert-bridge-prod- Production alerts onlyalert-bridge-dev- Development alerts
Example 2: By Severity
alert-bridge-critical- Sev0 and Sev1 onlyalert-bridge-info- Sev2 and Sev3
Example 3: By Team
alert-bridge-infrastructurealert-bridge-application
Adding Multiple Actions
You can add multiple actions to one action group:
Example: Email + SolarWinds
- Add webhook action (SolarWinds)
- Add email action (ops@company.com)
- Both happen when alert fires
Suppress Alerts
Configure action group suppression to prevent alert storms:
- Edit alert rule
- Advanced options → Alert suppression
- Suppress alerts for: 5 minutes
- Save
This prevents duplicate alerts within 5 minutes.
Troubleshooting
Test Failed: “Bad Request”
Cause: Common alert schema not enabled
Fix:
- Edit action group
- Edit webhook action
- ✅ Check “Enable common alert schema”
- Save and test again
Test Succeeded But No Incident
Possible causes:
1. Check Logic App Run History
- Go to Logic App resource
- Click “Overview” → “Runs history”
- Find the recent run
- Click to see details
If succeeded: Issue is with SolarWinds API
If failed: Check error message
2. Check SolarWinds API Token
- Verify token is valid
- Check token has create incident permission
- See SolarWinds Setup
3. Check Logic App Configuration
- Ensure API token stored in Key Vault
- Verify Key Vault access policy allows Logic App
- Check SolarWinds base URL is correct
Incidents Created But Missing Data
Cause: Legacy alert schema used
Fix:
- Edit action group webhook action
- ✅ Ensure “Enable common alert schema” is checked
- Save
Multiple Duplicate Incidents
Cause: Multiple action groups configured for same alert
Fix:
- Check alert rule → Actions
- Remove duplicate action groups
- Keep only one SolarWinds action group per alert
Common Alert Schema Example
When “Enable common alert schema” is checked, Azure sends:
{
"schemaId": "azureMonitorCommonAlertSchema",
"data": {
"essentials": {
"alertId": "/subscriptions/.../Microsoft.Insights/...",
"alertRule": "High CPU Usage",
"severity": "Sev1",
"signalType": "Metric",
"monitorCondition": "Fired",
"monitoringService": "Platform",
"alertTargetIDs": ["/subscriptions/.../Microsoft.Compute/virtualMachines/vm1"],
"configurationItems": ["vm1"],
"originAlertId": "abc123",
"firedDateTime": "2025-10-29T10:00:00Z",
"description": "CPU has been above threshold",
"essentialsVersion": "1.0",
"alertContextVersion": "1.0"
},
"alertContext": {
"properties": null,
"conditionType": "SingleResourceMultipleMetricCriteria",
"condition": {
"windowSize": "PT5M",
"allOf": [
{
"metricName": "Percentage CPU",
"metricNamespace": "Microsoft.Compute/virtualMachines",
"operator": "GreaterThan",
"threshold": "80",
"timeAggregation": "Average",
"dimensions": [],
"metricValue": 95.5
}
]
}
}
}
}
Alert Bridge uses this structured data to create rich SolarWinds incidents!
Best Practices
1. Use Descriptive Names
Good: alert-bridge-prod-infrastructure
Bad: ag1
2. One Action Group Per Environment
Separate prod and non-prod alerts:
- Better control
- Different SolarWinds priorities
- Easier troubleshooting
3. Document Your Action Groups
Add tags and descriptions:
Name: alert-bridge-prod
Description: Sends production alerts to SolarWinds Service Desk
Tags: Environment=Production, System=ITSM
4. Test Regularly
Test action groups:
- After creation
- After any configuration changes
- Monthly as part of DR testing
5. Monitor Action Group Usage
Use Azure Monitor to track:
- Action group invocations
- Failures
- Latency
Security Considerations
Webhook URL Security
The webhook URL contains:
- API version - Safe to expose
- Signature parameter - Validates request authenticity
- Access token - Securely embedded
Keep the URL private but it’s safe if leaked (signature validation prevents abuse).
Rotating URLs
If webhook URL is compromised:
- Go to Logic App
- Settings → Access control
- Regenerate access key
- Update all action groups with new URL
Next Steps
Additional Resources
Need help? Contact support@cynteocloud.com