Governance Policies Azure Monitoring Action Groups - Azure/az-prototype GitHub Wiki

Action Groups

Governance policies for Action Groups

Domain: azure-monitoring

Patterns

Name Description
Action group with multi-channel notifications and metric alerts Action group with email, webhook, and role-based receivers linked to metric alerts

Anti-Patterns

Description Instead
Do not deploy monitoring without action groups Create action groups first, then link them to all alert rules
Do not use personal email addresses in action groups Use distribution lists or team mailboxes for reliable notification delivery

References


Checks (4)

Check Severity Description
AZ-AG-001 Required Create action groups with email and webhook notification channels for critical alerts
AZ-AG-002 Required Use Common Alert Schema for all receivers
AZ-AG-003 Required Create metric alerts for critical resource health indicators
AZ-AG-004 Recommended Create activity log alerts for subscription-level administrative events

AZ-AG-001

Create action groups with email and webhook notification channels for critical alerts

Severity: Required
Rationale: Without action groups, alerts fire but nobody is notified — incidents go undetected
Agents: terraform-agent, bicep-agent, cloud-architect, monitoring-agent

Targets

  • Microsoft.Insights/actionGroups

Companion Resources

Resource Name Purpose
Microsoft.Insights/metricAlerts alert-critical-metrics Metric alert rules that reference this action group for notification delivery
Microsoft.Insights/scheduledQueryRules alert-log-query Log alert rules based on KQL queries that reference this action group
Microsoft.Insights/activityLogAlerts alert-activity-log Activity log alerts for subscription-level administrative events

AZ-AG-002

Use Common Alert Schema for all receivers

Severity: Required
Rationale: Common Alert Schema provides a standardized payload format across all alert types for consistent processing
Agents: terraform-agent, bicep-agent, cloud-architect, monitoring-agent

Targets

  • Microsoft.Insights/actionGroups

AZ-AG-003

Create metric alerts for critical resource health indicators

Severity: Required
Rationale: Proactive alerting on CPU, memory, response time, and error rate prevents outages from going undetected
Agents: terraform-agent, bicep-agent, cloud-architect, monitoring-agent

Targets

  • Microsoft.Insights/actionGroups

Companion Resources

Resource Name Purpose
Microsoft.Insights/actionGroups ag-ops Action group defining notification receivers for metric alert delivery

AZ-AG-004

Create activity log alerts for subscription-level administrative events

Severity: Recommended
Rationale: Track resource deletions, role assignments, and policy changes at the subscription level
Agents: terraform-agent, bicep-agent, cloud-architect, monitoring-agent

Targets

  • Microsoft.Insights/actionGroups

Companion Resources

Resource Name Purpose
Microsoft.Insights/actionGroups ag-ops Action group defining notification receivers for activity log alert delivery

⚠️ **GitHub.com Fallback** ⚠️