Skip to main content

Integration through the Azure Portal

Overview

Integrate your Microsoft Azure account with Motadata AIOps from the Azure portal in the following two steps:

  1. Create an app registration in your Active Directory and pass the credentials to Motadata AIOps.
  2. Provide the application read-access to the subscriptions you would like to monitor.

Let us look into each of these steps in detail.

Create the App Registration

  1. Select Azure Active Directory. After that, select App Registrations and then click on New Registration.

  2. Enter MotadataAuth as the Name and select Accounts in this organizational directory only in the Supported account types field.

  3. After that click on the Register button.

Now, let us move to the next step.

Providing Read Permissions to the Application

  1. Navigate to Subscriptions to assign access at the individual subscription level.

    note

    You can also assign the access at Management Group level. Navigate to Management Groups and select the Management Group that contains the subscriptions you would like to monitor. Similarly, to configure the monitoring for the entire tenant, you can assign access to the Tenant Root Group

  2. Select the subscription you would like to monitor.

  3. Select Access control (IAM) from the subscription menu and navigate to Add. After that, click on Add role assignment.

  4. Under Role Assignment, select Monitoring Reader from the Role tab. Under Members tab, select the name of the application you created above i.e. MotadataAuth in our case.

  5. Repeat these steps for any other subscriptions that you wish to monitor in the future.

Retreiving the Client ID, Tenant ID, and Secret Key to complete the integration.

  1. Navigate to App Registrations. Select the App you created. Note down the Application ID,Tenant ID to use later when discovering the Azure resources as Client ID and Tenant ID respectively while creating a credential profile for Microsoft Azure account.

  2. From the same App, navigate to Manage and then select Certificates and Secrets

  3. Add a new Client Secret called MotadataClientSecret. Select a timeframe for Expires as per your preference and click Add.

  4. When the key value is shown, note down the key value to use later when discovering the Azure resources.

Now, Client ID, Tenant ID, and Key value are available to discover Azure resources for monitoring.