πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-104 Domain 5
Domain 5 β€” Module 1 of 4 25%
24 of 27 overall

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery

AZ-104 Study Guide

Domain 1: Manage Azure Identities and Governance

  • Microsoft Entra ID: Your Identity Foundation Free
  • Users, Groups & Licenses Free
  • RBAC: Who Can Do What in Azure Free
  • Subscriptions, Resource Groups & Management Groups Free
  • Azure Policy & Resource Locks Free
  • Tags, Cost Management & Azure Advisor Free

Domain 2: Implement and Manage Storage

  • Storage Accounts & Redundancy
  • Securing Storage: Keys, SAS & Firewalls
  • Blob Containers & Storage Tiers
  • Blob Lifecycle, Versioning & Soft Delete
  • Azure Files: Shares, Snapshots & Recovery

Domain 3: Deploy and Manage Azure Compute Resources

  • ARM Templates & Bicep: Infrastructure as Code
  • Virtual Machines: Create & Configure Free
  • VM Disks, Encryption & Migration
  • Availability Sets, Zones & Scale Sets
  • Containers: ACR, ACI & Container Apps
  • App Service Plans & Scaling
  • App Service: Slots, Certificates & Networking

Domain 4: Implement and Manage Virtual Networking

  • Virtual Networks & Subnets
  • VNet Peering & User-Defined Routes
  • NSGs & Application Security Groups
  • Azure Bastion, Service & Private Endpoints
  • Azure DNS & Load Balancers

Domain 5: Monitor and Maintain Azure Resources

  • Azure Monitor: Metrics & Logs
  • Alerts, Insights & Network Watcher
  • Azure Backup & Vaults
  • Azure Site Recovery & Disaster Recovery
Domain 5: Monitor and Maintain Azure Resources Premium ⏱ ~13 min read

Azure Monitor: Metrics & Logs

You can't manage what you can't measure. Azure Monitor collects two types of data β€” metrics (numbers) and logs (events). Learn how to configure diagnostic settings, query logs with KQL, and build the monitoring foundation for your Azure environment.

What is Azure Monitor?

β˜• Simple explanation

Azure Monitor is like the dashboard in your car β€” it shows you speed, fuel level, engine temperature, and warning lights all in one place.

Every Azure resource generates data about what it’s doing. Azure Monitor collects all that data and gives you two views: metrics (the gauges β€” CPU percentage, memory usage, request count) and logs (the trip diary β€” who did what, when, and what happened). Metrics are numbers on a timeline; logs are detailed event records you can search and query.

Azure Monitor is the unified monitoring platform for Azure. It collects, analyses, and acts on telemetry from Azure resources, applications, and infrastructure. The two primary data stores are the metrics store (time-series numeric data, near real-time) and Log Analytics workspaces (structured log data queried with Kusto Query Language β€” KQL).

Azure Monitor supports diagnostic settings to route data, alert rules to trigger notifications, workbooks for visualisation, and integrations with tools like Grafana, Power BI, and third-party SIEM solutions.

Metrics vs Logs

Metrics = lightweight numbers; Logs = rich searchable data
FeatureMetricsLogs
Data typeNumeric time-series (e.g., 75% CPU)Structured event records (e.g., user signed in)
CollectionAutomatic for most resourcesRequires diagnostic settings to be configured
Query languageMetrics Explorer (visual charts)KQL in Log Analytics
LatencyNear real-time (1-minute intervals)Minutes (ingestion delay)
Retention93 days by default30 days to 2 years (configurable per workspace)
CostFree for platform metricsPay per GB ingested
Best forDashboards, alerts on thresholdsDeep investigation, correlation, compliance

Platform metrics

Most Azure resources emit platform metrics automatically β€” no configuration needed. Examples:

ResourceCommon Metrics
VMCPU percentage, available memory, disk IOPS, network in/out
Storage AccountTransactions, ingress/egress, availability, latency
App ServiceHTTP requests, response time, HTTP 5xx errors
SQL DatabaseDTU percentage, storage percentage, deadlocks
Load BalancerHealth probe status, byte count, packet count

You view metrics in Metrics Explorer β€” select a resource, choose a metric, set a time range, and see a chart. You can pin charts to dashboards and set up alerts.

πŸ’‘ Exam tip: Metrics are automatic; logs are not

Platform metrics are collected automatically for most Azure resources at no additional cost. Logs, however, require you to configure diagnostic settings to send data to a destination (Log Analytics workspace, Storage account, or Event Hubs). If you haven’t set up diagnostic settings, you have metrics but no logs.

Diagnostic settings

Diagnostic settings control WHERE monitoring data goes. Each resource can have multiple diagnostic settings sending data to different destinations.

DestinationUse Case
Log Analytics workspaceQuerying and analysis with KQL, alerting
Storage accountLong-term archival, compliance
Event HubsStreaming to third-party SIEM (Splunk, Sentinel)
Partner solutionDatadog, Elastic, and other integrated partners

What you can send:

  • Resource logs (audit events, operations)
  • Metrics (for longer retention or cross-resource analysis)
  • Activity log (subscription-level events: resource created, role assigned, policy changed)
Real-world: Meridian Financial's monitoring setup

Meridian Financial configures diagnostic settings on every resource:

  • All resources send logs and metrics to a central Log Analytics workspace for querying and alerts
  • Critical resources (SQL, Key Vault) also send to a storage account for 7-year compliance retention
  • Activity log streams to Event Hubs, feeding their SIEM (Microsoft Sentinel) for security analysis

Alex creates an Azure Policy that automatically deploys diagnostic settings on any new resource β€” ensuring nothing is ever unmonitored.

Querying logs with KQL

Kusto Query Language (KQL) is how you query data in Log Analytics. If you know PowerShell piping, KQL feels familiar β€” it uses a pipe syntax where each operation feeds into the next.

Basic KQL patterns

Filter rows:

AzureActivity
| where OperationNameValue == "MICROSOFT.COMPUTE/VIRTUALMACHINES/WRITE"
| where TimeGenerated > ago(24h)

Count and summarise:

AzureMetrics
| where ResourceProvider == "MICROSOFT.COMPUTE"
| summarize AvgCPU = avg(Average) by bin(TimeGenerated, 1h)

Find errors:

AppExceptions
| where TimeGenerated > ago(1h)
| project TimeGenerated, ExceptionType, OuterMessage
| order by TimeGenerated desc

Render a chart:

Perf
| where CounterName == "% Processor Time"
| summarize AvgCPU = avg(CounterValue) by bin(TimeGenerated, 5m), Computer
| render timechart

Key KQL operators

OperatorWhat It Does
whereFilters rows (like SQL WHERE)
summarizeAggregates data (count, avg, sum, max, min)
projectSelects specific columns
order bySorts results
ago()Relative time filter (ago(1h), ago(7d))
bin()Groups time into intervals
renderCreates charts (timechart, barchart, piechart)
joinCombines data from two tables
πŸ’‘ Exam tip: KQL pipe syntax

KQL uses a pipe (|) syntax similar to PowerShell. Data flows left to right, each operator transforms the result. The table name comes first, then filters, then transformations, then output. The exam tests basic KQL reading comprehension β€” you need to understand what a query does, not write complex queries from scratch.

Question

What is the default retention period for Azure Monitor metrics?

Click or press Enter to reveal answer

Answer

93 days. Platform metrics are retained for 93 days automatically. For longer retention, configure diagnostic settings to send metrics to a Log Analytics workspace (up to 2 years) or a storage account (indefinite).

Click to flip back

Question

What are the three destinations for diagnostic settings?

Click or press Enter to reveal answer

Answer

Log Analytics workspace (for KQL queries and alerts), Storage account (for long-term archival), and Event Hubs (for streaming to external tools like SIEM solutions). Partner solutions (Datadog, Elastic) are also supported as a fourth option.

Click to flip back

Question

What KQL operator is used to filter rows based on a condition?

Click or press Enter to reveal answer

Answer

The 'where' operator. For example: AzureActivity | where TimeGenerated > ago(24h) filters to events in the last 24 hours. It works like SQL WHERE or PowerShell Where-Object.

Click to flip back

Question

Do Azure platform metrics require diagnostic settings to be configured?

Click or press Enter to reveal answer

Answer

No. Platform metrics are collected automatically for most Azure resources at no extra cost. Diagnostic settings are needed for resource logs and for sending metrics to destinations like Log Analytics for longer retention or cross-resource analysis.

Click to flip back

Knowledge check

Knowledge Check

Alex notices that CPU metrics for his VMs show up in Metrics Explorer, but there are no log entries in Log Analytics. What is the most likely reason?

Knowledge Check

Meridian Financial's compliance team needs to retain all Azure activity logs for 7 years. Which diagnostic setting destination should Alex configure?

Knowledge Check

Which KQL query correctly counts the number of VM write operations in the last 7 days?

🎬 Video coming soon

← Previous

Azure DNS & Load Balancers

Next β†’

Alerts, Insights & Network Watcher

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.