本文介绍了如何使用Terraform通过日志工作区实现Azure监控警报VM心跳的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!
问题描述
需要使用KQL/Kusto查询在Azure监视中实现一系列警报。这是非常基本的,例如心跳、可用磁盘空间(基于代理输出到日志工作区)。
查看Terraform文档时,我不确定要使用哪些资源。我预计我需要首先在资源中构建查询,然后构建警报资源。但是,查看文档后,似乎应该将查询添加到此资源。
无论如何,如果有人能分享一个为虚拟机实现Azure监视器警报的示例(win/linux),那就太棒了。
推荐答案
谢谢UserP。将您的建议作为答复发布以帮助其他社区成员。
azurerm_monitor_scheduled_query_rules_alert
- 管理Azure监视器中的AlertingAction计划查询规则资源。
resource "azurerm_resource_group" "example" {
name = "monitoring-resources"
location = "West Europe"
}
resource "azurerm_application_insights" "example" {
name = "appinsights"
location = var.location
resource_group_name = azurerm_resource_group.example.name
application_type = "web"
}
resource "azurerm_application_insights" "example2" {
name = "appinsights2"
location = var.location
resource_group_name = azurerm_resource_group.example.name
application_type = "web"
}
# Example: Alerting Action with metric trigger
resource "azurerm_monitor_scheduled_query_rules_alert" "example" {
name = format("%s-queryrule", var.prefix)
location = azurerm_resource_group.example.location
resource_group_name = azurerm_resource_group.example.name
action {
action_group = []
email_subject = "Email Header"
custom_webhook_payload = "{}"
}
data_source_id = azurerm_application_insights.example.id
description = "Query results grouped into AggregatedValue; alert when results cross threshold"
enabled = true
# Count all requests with server error result code grouped into 5-minute bins by HTTP operation
query = <<-QUERY
requests
| where tolong(resultCode) >= 500
| summarize AggregatedValue = count() by operation_Name, bin(timestamp, 5m)
QUERY
severity = 1
frequency = 5
time_window = 30
trigger {
operator = "GreaterThan"
threshold = 3
metric_trigger {
operator = "GreaterThan"
threshold = 1
metric_trigger_type = "Total"
metric_column = "operation_Name"
}
}
}
您可以参考azurerm_monitor_scheduled_query_rules_alert和Support alerts based on Log analytics queries
这篇关于如何使用Terraform通过日志工作区实现Azure监控警报VM心跳的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持!