|

Azure Monitor: Cloud Observability and Alerting for Berlin Business Azure Environments

Azure Monitor: Cloud Observability and Alerting for Berlin Business Azure Environments

Running workloads in Azure without visibility into their performance, availability, and security posture is operationally blind. Azure Monitor is Microsoft’s native observability platform — it collects metrics, logs, and traces from Azure resources, on-premises infrastructure, and applications, providing the data foundation for alerting, dashboards, and automated responses. For small Berlin businesses, Azure Monitor is the central tool for understanding what is happening across their cloud environment without investing in third-party monitoring solutions.

Azure Monitor Architecture

Azure Monitor operates on three primary data types:

Metrics — Numerical values collected at regular intervals (default: 1-minute granularity) for Azure resources: CPU utilisation, memory, disk I/O, network throughput, request counts, latency. Metrics are available immediately with no configuration and are retained for 93 days.
Logs — Structured and unstructured text events from Azure resources, the Azure Activity Log, Azure AD sign-in logs, and custom application sources. Logs are stored in a Log Analytics workspace and are queryable via KQL (Kusto Query Language). Retention is configurable up to 730 days.
Traces — Distributed application telemetry collected via Application Insights, tracking request flows, dependencies, and exceptions across microservices. Primarily relevant for custom application development.

Log Analytics Workspace

The Log Analytics workspace is the central data store for Azure Monitor log data. Most observability and security use cases require creating and configuring a workspace:

  1. In the Azure portal, navigate to Monitor → Log Analytics workspaces → Create
  2. Choose a resource group and region — co-locate with the primary Azure workloads for cost and latency efficiency
  3. Configure retention period (default: 30 days, chargeable above 31 days for most table types)
  4. Connect Azure resources by enabling Diagnostic Settings to route platform logs to the workspace

Microsoft Sentinel, Defender for Cloud, and Azure Update Manager all use the Log Analytics workspace as their underlying data store — a single workspace can serve all these services simultaneously.

Enabling Diagnostic Settings

By default, most Azure resources do not send logs to a Log Analytics workspace. Diagnostic Settings must be enabled per resource (or at scale via Azure Policy):

  1. Navigate to any Azure resource (e.g., a VM, Key Vault, or storage account)
  2. Under Monitoring → Diagnostic settings, click Add diagnostic setting
  3. Select the log categories to capture (e.g., audit logs, access logs, metrics)
  4. Send to Log Analytics workspace

For a small business environment, the highest-priority resources for diagnostic settings are Key Vault (audit all access), storage accounts (read/write/delete operations), and Azure VMs (security events and performance counters).

Azure Monitor Alerts

Alerts in Azure Monitor trigger notifications or automated actions when defined conditions are met. Three alert types cover the majority of operational needs:

Metric Alerts

Trigger on threshold breaches in real-time metric data. Examples: CPU utilisation above 90% for 5 minutes; available disk space below 10 GB; VM heartbeat signal lost. Metric alerts evaluate quickly (minimum 1-minute evaluation window) and are the right choice for immediate operational alerts.

Log Search Alerts

Execute a KQL query against the Log Analytics workspace on a schedule and trigger when the result meets a condition. Examples: any Azure AD sign-in from a country not in an approved list; Key Vault secret access outside business hours; failed authentication attempts exceeding threshold.

Activity Log Alerts

Trigger on Azure control-plane events: resource deletion, policy changes, role assignments. Essential for security monitoring — alerts when someone assigns a new Owner role or deletes a production resource.

Action Groups and Notification Routing

Action Groups define what happens when an alert fires. They are reusable across multiple alert rules and support:

  • Email / SMS / Push notification: Direct notification to on-call personnel
  • Azure Function / Logic App: Automated remediation workflows (e.g., restart a VM, open a ticket)
  • Webhook: Integration with external systems (PagerDuty, OpsGenie, ServiceNow)
  • ITSM connector: Direct incident creation in connected IT service management tools

Azure Monitor Workbooks

Workbooks are interactive reports built from Azure Monitor data — combining metrics, log queries, and text into shareable visualisations. Microsoft provides gallery templates for common use cases including VM performance, Key Vault access patterns, network traffic analysis, and security audit reports. Custom workbooks can be built and pinned to Azure dashboards for ongoing operational visibility.

VM Insights

VM Insights is a pre-configured Azure Monitor capability for virtual machine monitoring. It enables:

  • Performance metrics collection without manual configuration (CPU, memory, disk, network per VM)
  • Process and dependency mapping — shows which processes are running and their network connections
  • At-a-glance health status across all monitored VMs

VM Insights requires the Azure Monitor Agent (AMA) to be installed on each VM. For Arc-enabled on-premises servers, the same agent extends monitoring to non-Azure infrastructure.

Integration with Azure Security Services

Azure Monitor is the data backbone for most Azure security services:

  • Microsoft Sentinel: Ingests Log Analytics workspace data as its primary intelligence source — enabling correlation across Azure Monitor logs, Entra sign-in events, and custom log sources
  • Defender for Cloud: Uses Azure Monitor Agent for guest-OS vulnerability assessment and security configuration evaluation
  • Azure Update Manager: Reports patch compliance data to Azure Monitor for query and dashboarding via Resource Graph and workbooks

Cost Management

Azure Monitor costs are driven primarily by Log Analytics ingestion and retention:

  • First 5 GB per workspace per month: Free
  • Additional ingestion: ~€2.76 per GB (varies by region)
  • Data retention beyond 31 days: €0.10–0.13 per GB per month
  • Metrics: First 10 metric time series free; custom metrics charged separately
  • Alerts: First 1,000 metric alert evaluations/month free; log search alerts charged per evaluation

For a typical small business Azure environment (10–50 VMs plus PaaS services), monthly Azure Monitor costs are usually in the range of €20–100, depending on diagnostic verbosity and log retention requirements. Selective diagnostic settings configuration and appropriate retention policies are the main cost levers.

Conclusion: Essential Visibility for Azure Environments

Azure Monitor provides the observability foundation that every Azure deployment requires — without it, operational issues go undetected until they become outages and security incidents go unnoticed until they become breaches. For small Berlin businesses, the combination of Metric Alerts for operational availability, Log Search Alerts for security monitoring, and integration with Sentinel and Defender for Cloud makes Azure Monitor the non-negotiable first layer of cloud operations maturity.

IT Experts Berlin configures Azure Monitor, Log Analytics, and alerting for Azure environments in Berlin and Brandenburg. Contact us for an observability assessment of your Azure infrastructure.

Related Articles

Similar Posts