Learn the metrics, logs, alerting, and insights behaviors that matter most for AZ-104 operational scenarios.
Azure Monitor is where AZ-104 expects administrators to turn raw platform behavior into usable signal. The exam is not asking whether telemetry exists. It is asking whether you can choose the right telemetry path and wire it into an operational response.
The current outline covers interpreting metrics, configuring log settings, querying and analyzing logs, setting up alert rules, action groups, and alert processing rules, and using Azure Monitor Insights for VMs, storage accounts, and networks.
Metrics are lightweight numerical signals that work well for fast thresholds such as CPU or request counts. Logs are richer event and state records that support investigation and correlation. Insights packages useful views over common resource types. Alert rules decide when a condition matters. Action groups decide what happens next.
Many candidates mix up diagnostic settings, activity logs, and Log Analytics data flow. Another frequent miss is choosing a metric alert for a question that really needs log correlation or choosing a log query when a simple metric threshold would have been faster and more reliable.
| Need | Strongest first choice | Why |
|---|---|---|
| Fast threshold on a numeric signal | Metric alert | Lightweight and direct |
| Correlate events or investigate richer history | Logs in Log Analytics | Better for multi-step analysis |
| View curated resource health trends quickly | Azure Monitor Insights | Built for common resource-type visibility |
| Notify or automate when an alert fires | Action group | It handles the response path |
| Signal type | Best use |
|---|---|
| Metrics | Fast numeric trends such as CPU, latency, or request count |
| Activity Log | Subscription-level control-plane events such as creates, deletes, and policy actions |
| Resource logs | Resource-specific operational detail sent through diagnostic settings |
| Insights | Ready-made views over common resources such as VMs and networks |
| Alert processing rules | Post-alert control over how notifications are routed or suppressed |
When candidates mix up Monitor components, it is usually because they lose track of where the signal starts and where the response happens.
flowchart LR
R["Azure resource"] --> M["Metrics"]
R --> D["Diagnostic settings"]
D --> L["Log Analytics / resource logs"]
M --> A["Alert rule"]
L --> A
A --> AG["Action group"]
L --> I["KQL investigation / Insights"]
The diagram is showing two different routes:
Candidates often know that logs exist but lose track of how they get there.
| Component | What it does |
|---|---|
| Diagnostic settings | Routes resource logs and metrics to destinations such as Log Analytics |
| Log Analytics workspace | Stores and organizes queryable log data |
| KQL query | Reads and analyzes the stored log data |
| Alert processing rule | Changes how fired alerts are routed, suppressed, or handled afterward |
The practical sequence is: configure the data path first, then query or alert on the data that is actually being collected.
1az monitor action-group create \
2 --resource-group app-rg \
3 --name ops-ag \
4 --action email Ops ops@example.com
5
6az monitor metrics alert create \
7 --resource-group app-rg \
8 --name cpu-high \
9 --scopes /subscriptions/<sub>/resourceGroups/app-rg/providers/Microsoft.Compute/virtualMachines/web-01 \
10 --condition "avg Percentage CPU > 80" \
11 --window-size 5m \
12 --evaluation-frequency 1m \
13 --action-group ops-ag
This example is useful because it separates the two roles clearly:
This is the kind of query shape you should be able to read even if you do not write KQL every day:
AzureActivity
| where TimeGenerated > ago(24h)
| summarize Count=count() by OperationNameValue, ActivityStatusValue
| order by Count desc
The point is not memorizing every operator. The point is recognizing that logs can summarize and investigate control-plane history in a way a metric alert cannot.
Continue with Backup, Site Recovery, and Network Watcher so monitoring ties back to actual recovery operations.