GA: Azure Monitor log search alerts support managed identities
Published date: April 18, 2024
Azure Monitor alerts allow you to monitor your Azure and application data to quickly identify issues affecting your service. You can use log search alert rules to run queries periodically on your log data get notifications or trigger actions when an a potential issue is identified.
A common challenge for developers is the management of credentials for applications to use when connecting to resources. Managed identities provide an automatically managed identity in Microsoft Entra ID. Applications can use managed identities to obtain Microsoft Entra tokens without having to manage any credentials.
Log search alert rules support managed identities for Azure resources, allowing you to see and control the exact permissions of your log search alert rule.
You can use managed identities in log search alert rules using either of these two options:
- System assigned managed identity: Azure creates a new, dedicated identity for this alert rule. After you create the rule, you must assign permissions to this identity to access the workspace and data sources needed for the query.
- User assigned managed identity: Before you create the alert rule, you create an identity and assign it appropriate permissions for the log query. You can use the same identity in multiple alert rules.
In order to create alerts with query on Azure Data Explorer or Azure Resource Graph you must configure managed identity.
Further information: