-
Notifications
You must be signed in to change notification settings - Fork 255
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #143 from Brunoga-MS/main
AMBA - Allow for alert notification suppression during resources maintenance
- Loading branch information
Showing
18 changed files
with
440 additions
and
132 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
52 changes: 52 additions & 0 deletions
52
docs/content/patterns/alz/Temporarily-disabling-notifications.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
--- | ||
title: Temporarily disabling notifications | ||
geekdocCollapseSection: true | ||
weight: 65 | ||
--- | ||
|
||
Azure Monitor alerts targeted to a large scope allow for at scale coverage, but reduce the flexibility to disable them for specific resources. There might be several reason to stop the notification of alerts. For instance, customers could have resources that are stopped or disabled due to maintenance or just want to stop the notification during the night shift. To allow this kind of flexibility, as part of the Notification Assets policy initiative, AMBA provides you with an asset to stop the notification for specific resources. | ||
|
||
This asset is made of an alert processing rule (also known as APR) with the following characteristics: | ||
|
||
- deployed as disabled | ||
- scoped at the subscription level | ||
- suppression rule type | ||
- scheduled to run always | ||
|
||
This APR needs to be configured with the resource ID of the resource(s) for which you want to stop notifications and then enabled every time you need it. | ||
|
||
Once the resource is out of the maintenance period or when you don't need the suppression rule anymore, ***remember*** to remove the resources and disable the rule. | ||
|
||
To know more about how to suppress notifications, see [Suppress notifications during planned maintenance](https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/alerts-processing-rules?tabs=portal#suppress-notifications-during-planned-maintenance) | ||
|
||
To configure the APR, do the following: | ||
|
||
1. In **Monitor --> Alerts**, click on **Alert processing rules** | ||
|
||
![Monitor/Alerts/Alert processing rule](../media/AlertProcessingRules.png) | ||
|
||
2. Click on the ARP named ***apr-AMBA-<mark>subscription display name</mark>-002*** with rule type **Suppression** | ||
|
||
![Suppression aler processing rule](../media/SuppressionAlertProcessingRule.png) | ||
|
||
3. Click on ***Edit*** | ||
|
||
![Edit alert processing rule](../media/Edit-AlertProcessingRule.png) | ||
|
||
4. In the **Scope** tab, under the filter section, configure the following: | ||
|
||
- Filters: ***Resource*** | ||
- Operator: ***Equals*** | ||
- Value: **Enter the <mark>resource Id</mark> of resources separated by comma <mark>with no spaces before, after or between the strings.</mark>** | ||
|
||
![Configure filter](../media/Filter-AlertProcessingRule.png) | ||
|
||
{{< hint type=Important >}} | ||
Each filter can include up to **five** values. Should you need more than **5** resources, add more lines of filter. | ||
{{< /hint >}} | ||
|
||
5. Click on ***Review + save*** and then ***Save*** | ||
|
||
{{< hint type=Note >}} | ||
It is possible to apply other types of filter. For a complete list of allowed scopes and filters, refer to the official [Scope and filters for alert processing rules](https://learn.microsoft.com/en-us/azure/azure-monitor/alerts/alerts-processing-rules?tabs=portal#scope-and-filters-for-alert-processing-rules) documentation. | ||
{{< /hint >}} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
19 changes: 19 additions & 0 deletions
19
docs/content/patterns/alz/deploy/PowerShell-ExecutionPolicy.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
--- | ||
--- | ||
|
||
{{< hint type=Important >}} | ||
Since PowerShell scripts released as part of the ALZ pattern are not digitally signed they might require you to _**temporarily**_ change the execution policy if not already set to _**Unrestricted**_. Before running the script, check the execution policy settings using this command: | ||
|
||
```PowerShell | ||
Get-ExecutionPolicy | ||
``` | ||
|
||
If the result is everything but _**Unrestricted**_, run the following command to change it to **Unrestricted** | ||
|
||
```PowerShell | ||
Set-ExecutionPolicy -ExecutionPolicy Unrestricted | ||
``` | ||
|
||
At this point, you should be able to run your scripts with no issues. After you finished, you can set the execution policy back to what it was if you like to do so. | ||
|
||
{{< /hint >}} |
Oops, something went wrong.