/WTH-007-AzureMonitoring

What the Hack - Azure Monitoring

Primary LanguageBicepMIT LicenseMIT

What The Hack - Azure Monitoring

Introduction

The Azure Monitoring v2.0 What the Hack provides hands on experience on how to monitor Azure workloads using Azure Monitor, Log Analytics, Application Insights, and Azure Monitor Workbooks. This hack was designed specifically for infrastructure engineers, DevOps engineers, administrators and IT architects who want to build their knowledge on Azure Monitor. However, anyone with a passion for Monitoring is welcome!

Hack Intro

Learning Objectives

In this hack, you will be getting hands on experience with monitoring resources (VMs, applications and containers) using Azure Monitor capabilities such as log analytics, dashboards and Kusto Query Language (KQL).

Challenges

Prerequisites

  • Access to an Azure subscription with "contributor" access
    • If you don't have one, Sign Up for Azure HERE
    • Students will deploy an ARM Bicep template that a set of Azure resources to monitor
      • This includes a VNet, subnets, NSG(s), LB(s), NAT rules, VM scale set, AKS cluster, and a fully functional .NET Core Application (eShopOnWeb) to monitor.
  • Attendees should have a level 200-300 understanding of the Azure platform.
    • Including concepts like PowerShell, Azure CLI, ARM, resource groups, RBAC, network, storage, compute, scale sets, virtual machines and security.
    • Previous experience working with ARM templates is recommended.
  • Access to a machine with Visual Studio Code, and the Azure CLI or Azure PowerShell Modules installed.
  • Alternatively, students can use the Azure Cloud Shell

For more details on the prerequisites for this hack, see Challenge 00.

Contributors