This feature isn’t available to all Chronosphere Observability Platform users and
might not be visible in your app. For information about enabling this feature in your
environment, contact Chronosphere Support.
Create the Azure principal
Configure Azure to allow Observability Platform to access metrics in Azure. To do so:-
Ensure the Azure Managed Identity principal is assigned the built-in
Readerrole for every subscription within scope. TheReaderrole is more restrictive than theMonitoringReaderrole. It’s important to create a dedicated Managed Identity to isolate the Azure API quota used by Chronosphere. -
Contact Chronosphere Support to obtain the
specific
credential_issuerandcredential_subjectfor your tenant. -
Copy both the
credential_issuerandcredential_subjectvariables exactly as specified to allow authentication between your Chronosphere tenant and Azure. -
When creating the Azure principal, grant it access to subscriptions using one of
the following options:
- Management group-based: Access can be granted at the Azure Management Group level. This is the preferred approach, as it means that the subscriptions that Chronosphere has access to are kept in sync with the management group. As subscriptions are added and removed from the management group, these changes will be automatically reflected in Chronosphere. The same principal can also be granted access to multiple management groups.
- Subscription-based: Access can be granted at the subscription level. In this case, the principal is granted access to individual subscriptions. This approach provides the most control, but has the downside that the list of subscriptions granted to the principal must be kept up to date by the customer. Chronosphere won’t be able to ingest Azure metric data for subscriptions that haven’t been assigned to the principal.
-
After provisioning the Azure Managed Identity, provide Chronosphere with the two
Terraform outputs defined in the following examples:
azure_tenant_idandidentity_client_id. These outputs specify the ID of your Azure tenant and the client ID of the Azure Managed Identity, respectively. Chronosphere requires both values to complete the integration.
Terraform examples
The following examples show how you can integrate Azure using one of the previously mentioned methods:- Management group
- Individual subscription
The following Terraform code provides an example of how to create an Azure principal
and grant it access to the subscriptions within a management group.
Set up Observability Platform to receive Azure data
After configuring Azure to enable access to metrics, you must configure Observability Platform to receive and process those metrics. To access the API directly, see the Chronosphere API for Azure metrics.View Azure metrics integrations
To list or view Azure metrics integrations, use one of the following options:- Chronoctl
- API
To list your Azure metrics integrations using Chronoctl, use
this command:To view a Azure metrics integration, use this command:Replace
SLUG with the unique identifier of the Azure metrics integration.Create or update an Azure metrics integration
You can create or update your Azure metrics integration with Observability Platform by applying a configuration file with Chronoctl or Terraform. You must add your account principal to an Observability Platform team with SysAdmin permissions.- Chronoctl
- Terraform
- API
To create a Azure metrics integration using Chronoctl, use
this command:Replace Replace
FILENAME with the name of your Chronoctl configuration file.To update a Azure metrics integration, use this command:FILENAME with the name of your Chronoctl configuration file.The input file uses the following structure:NAME: (string) The name of the Azure integration.SLUG: (string) The unique identifier of the Azure integration.TENANT_ID: (UUID) The ID of the Azure tenant that hosts the managed identity principal.CLIENT_ID: (UUID) The OAuth 2.0 client ID of the managed identity principal.RESOURCE_TYPE_NAME: (string) Name of the resource type.METRIC_NAME: (list(string)) List of metric names to be targeted. These apply to this resource type. Leave unset to retrieve all metrics.LOCATION: (list(string)) Locations to be ingested for this integration. Applies to all subscriptions. Leave unset to retrieve all locations.SUBSCRIPTION_ID: (list(string)) Subscriptions to be targeted for this integration. Leave unset to retrieve all subscriptions.USAGE_METRICS_ENABLED: (Boolean) Enables collection of azure usage metrics under this principal (Microsoft.Compute,Microsoft.Network,Microsoft.Storage).COUNT_METRICS_ENABLED: (Boolean) Enables Azure count metrics for the configured resources.PROPAGATE_TAGS: (Boolean) Specifies whether Azure resource, group, and subscription tags should be propagated as metric labels.
Delete an Azure integration
Delete an Azure integration using one of the following methods:- Chronoctl
- API
Metric information
Observability Platform ingests a wide range of Azure metrics. See the list of available Azure metrics.Metric labels
You can request custom labels for your Azure metrics asdefaultLabels. To add
custom labels, contact Chronosphere Support.
When importing metrics, some defaultLabels might conflict with prefixes which
already exist in Observability Platform (for example, job). When this occurs,
Observability Platform adds the prefix exported_ to the source labels to prevent
conflicts.
Find Azure metrics in Metrics Explorer
Use Metrics Explorer to find and review the status of your ingested metrics.-
All Azure metrics start with the prefix
azure_. Search for this prefix to display all Azure metrics in the platform. -
Search supports substrings. For example, if the original Azure metric name
contains a substring like
storageAccounts, searching for the substring returns the Azure metric, along with other metrics containing the substring.