🔒 Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-305 Domain 1
Domain 1 — Module 1 of 7 14%
1 of 30 overall

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing

AZ-305 Study Guide

Domain 1: Design Identity, Governance, and Monitoring Solutions

  • Monitoring & Logging Design
  • Choosing Authentication Methods
  • Designing Identity Management
  • Authorizing Access to Resources
  • Secrets, Keys & Certificates
  • Governance at Scale
  • Compliance & Identity Governance

Domain 2: Design Data Storage Solutions

  • Relational Data: Choosing Your SQL Platform
  • Database Performance & Scalability
  • Database Security & Compliance
  • Cosmos DB & Semi-Structured Data
  • Blob, Data Lake & Azure Files
  • Data Integration & Analytics

Domain 3: Design Business Continuity Solutions

  • Recovery Objectives: RPO, RTO & SLA Free
  • Backup & Recovery for Compute Free
  • Backup for Databases & Unstructured Data Free
  • High Availability for Compute Free
  • High Availability for Data Free

Domain 4: Design Infrastructure Solutions

  • Compute Design: VMs & When to Use Them
  • Container Solutions: AKS, ACI & Container Apps
  • Serverless & Batch Processing
  • Messaging Architecture
  • Event-Driven Architecture
  • API Integration & Caching
  • App Configuration & Automated Deployment
  • Migration Strategy & Assessment
  • Executing Migrations
  • Network Connectivity: Internet & Hybrid
  • Network Security & Performance
  • Load Balancing & Routing
Domain 1: Design Identity, Governance, and Monitoring Solutions Premium ⏱ ~18 min read

Monitoring & Logging Design

A well-architected Azure solution needs eyes everywhere. Learn how to design a monitoring and logging strategy that gives you the right signals — without drowning in noise.

Why monitoring design matters

☕ Simple explanation

Monitoring is like the instrument panel in a cockpit. Every pilot needs altitude, speed, and fuel gauges — but too many gauges with no hierarchy means you’ll miss the one alarm that matters.

As an Azure architect, you need to design WHERE logs go, HOW they’re routed, and WHAT gets alerted on. Bad monitoring design means you either drown in data or miss critical failures.

The three design decisions: What to collect (platform logs, application telemetry, security events), where to send it (Log Analytics, Storage, Event Hubs), and who gets alerted (Azure Monitor, action groups, ITSM integration).

Azure Monitor is the unified monitoring platform that collects, analyses, and acts on telemetry from Azure resources, applications, and infrastructure. As an architect, your job isn’t configuring dashboards — it’s designing the monitoring topology: which data sources feed which sinks, how logs are routed across subscriptions, and how alerts trigger the right response.

Key architectural considerations:

  • Log Analytics workspace design: centralised vs distributed vs hybrid workspace topology
  • Diagnostic settings: platform logs (activity, resource, Entra) routed to the right destinations
  • Application Insights: workspace-based vs classic, sampling strategies, distributed tracing
  • Cost: Log Analytics pricing tiers (Pay-As-You-Go vs Commitment), data retention, archive policies
  • Well-Architected Framework: monitoring directly supports the Operational Excellence and Reliability pillars

The Azure Monitor ecosystem

Azure Monitor is the umbrella — everything else feeds into or out of it.

ComponentWhat It DoesDesign Decision
Azure MonitorUnified platform for metrics, logs, alertsCentral orchestrator — always the starting point
Log AnalyticsStore and query logs using KQLWorkspace topology: how many, where, who owns them
Application InsightsApplication performance monitoring (APM)Workspace-based (recommended) vs classic deployment
Azure Monitor AgentCollects data from VMs, VMSSReplaces legacy agents (Log Analytics agent, Diagnostics extension)
Diagnostic SettingsRoutes platform logs to destinationsEvery resource needs explicit diagnostic config
Action GroupsDefines notification and automation actionsEmail, SMS, webhook, ITSM, Logic App, Azure Function

Exam pattern: Questions often present a scenario and ask “which monitoring component should the architect recommend?” The answer depends on what’s being monitored (platform vs app vs infrastructure) and what action is needed (alert vs analyse vs archive).

Designing your logging solution

What gets logged?

Azure generates three categories of log data:

Log TypeSourceExamplesDefault Destination
Activity logsAzure control planeResource creation, RBAC changes, deploymentsAzure Monitor (auto, 90-day retention)
Resource logsIndividual Azure resourcesSQL query stats, Storage access, Key Vault operationsNowhere — you MUST configure diagnostic settings
Entra ID logsIdentity platformSign-ins, audit events, provisioningEntra portal (30-day default)
💡 Exam tip: Resource logs aren't collected by default

This is a critical design point. Activity logs are automatically available, but resource logs require you to create diagnostic settings on each resource. If a scenario asks “logs aren’t appearing for a storage account” — the answer is almost always missing diagnostic settings. As an architect, you need to design a policy (Azure Policy) to automatically deploy diagnostic settings at scale.

Log Analytics workspace topology

This is one of the biggest monitoring design decisions. There’s no single right answer — it depends on your organisation’s structure, compliance needs, and cost tolerance.

Log Analytics Workspace Topologies
FactorCentralised (1 workspace)Distributed (per-team/app)Hybrid (regional + central)
Management overheadLow — one workspace to manageHigh — many workspaces, many configsMedium — clear ownership model
Cross-resource queriesEasy — everything in one placeHard — requires cross-workspace queriesMedium — regional queries easy, global needs cross-workspace
Access controlHarder — need resource-context or table-level RBACEasy — workspace-level RBAC per teamGood — regional teams own their workspace
Data sovereigntyRisk — all data in one regionGood — data stays where team isGood — regional workspaces respect boundaries
Cost optimisationGood — easier to hit commitment tiersPoor — each workspace has own cost baselineGood — regional volumes help hit tiers
Best forSmall-medium orgs, single regionLarge orgs with strict data boundariesGlobal enterprises, regulated industries

🏛️ David’s design: CloudPath Advisory recommends the hybrid model for government clients. “Each agency keeps data in their region’s workspace for sovereignty. A central workspace gets a copy of security events for the SOC team. Azure Lighthouse lets the central team query across without moving data.”

Designing log routing

Once you know what to collect and where to store it, you need to route logs efficiently.

Diagnostic settings destinations

Every Azure resource’s diagnostic settings can send logs to up to three destinations simultaneously:

DestinationUse CaseRetention
Log Analytics workspaceQuery, alert, analyse with KQLConfigurable (30 days to 2 years, archive to 12 years)
Storage accountLong-term archive, compliance, auditUnlimited (lifecycle management)
Event HubsStream to external SIEM (Splunk, Datadog) or custom consumersReal-time (consumer controls retention)

🏦 Elena’s scenario: FinSecure Bank must retain all Key Vault access logs for 7 years (PCI DSS). Elena routes logs to Log Analytics (90-day interactive query) AND Storage (7-year archive with immutable blobs). Security events go to Log Analytics with Microsoft Sentinel for SIEM correlation and threat detection.

Azure Monitor Agent vs legacy agents

Azure Monitor Agent vs Legacy Agents
FeatureAzure Monitor Agent (AMA)Log Analytics Agent (MMA)Diagnostics Extension
StatusCurrent — recommendedDeprecated Aug 2024Legacy — limited use
Multi-homingYes — data collection rules (DCRs)Yes — manual configNo
ConfigurationCentralised DCRs in AzurePer-agent workspace configPer-VM extension config
Filtering at sourceYes — DCR transformationsNo — all or nothingLimited
Best forAll new deploymentsLegacy only — migrate awayGuest OS metrics only
ℹ️ Design decision: Data Collection Rules (DCRs)

DCRs are the architect’s tool for log routing at scale. A single DCR can:

  • Filter which events are collected (reducing cost)
  • Transform data before ingestion (KQL transformations)
  • Route different log types to different workspaces
  • Apply to thousands of VMs via Azure Policy

Well-Architected connection (Cost Optimisation): DCR transformations can filter out noisy, low-value logs before they hit Log Analytics — directly reducing your monitoring bill. A common pattern: collect verbose logs in dev, filter to errors-only in production.

Designing your monitoring solution

Metrics vs logs: when to use which

FactorMetricsLogs
Data typeNumeric time-seriesStructured/semi-structured text
Query speedMillisecondsSeconds to minutes
Retention93 days (auto)Configurable (up to 12 years)
CostFree (platform metrics)Pay per GB ingested
Best forReal-time alerts, dashboards, autoscale triggersRoot cause analysis, audit, compliance, complex queries
Alert latency~1 minute~5-15 minutes

Design principle: Use metrics for real-time detection and logs for investigation. Alerting on metrics is faster and cheaper. Alerting on logs is more flexible but slower and costlier.

Alert design patterns

🏗️ Priya’s challenge: GlobalTech’s migration created 400+ Azure resources across 12 subscriptions. The operations team was getting 200+ alert emails per day — and ignoring all of them.

Priya’s redesign:

  1. Severity tiers: Sev 0 (critical — pages on-call), Sev 1 (important — Teams channel), Sev 2 (informational — dashboard only)
  2. Action group hierarchy: Different action groups per severity, per team
  3. Alert processing rules: Suppress alerts during maintenance windows, route by resource group tag
  4. Smart detection: Application Insights anomaly detection instead of static thresholds
ℹ️ Well-Architected Framework connection

Reliability: Monitoring is the first line of defence against outages. Design alerts for SLO breaches, not just resource failures.

Operational Excellence: Alert fatigue is a real risk. If your monitoring design creates noise, operators will ignore it — which is worse than no monitoring at all.

Cost Optimisation: Log Analytics costs scale with data volume. Architect your log collection to capture what you need, not everything possible.

Application Insights for application monitoring

For custom applications, Application Insights provides:

  • Distributed tracing across microservices
  • Live metrics for real-time debugging
  • Availability tests (URL ping, multi-step)
  • Application Map visualising dependencies
  • Smart detection for performance anomalies

Design decision: Always use workspace-based Application Insights (not classic). This sends telemetry to a Log Analytics workspace, enabling cross-resource queries and unified alerting.

🚀 Marcus’s approach: NovaSaaS runs 30+ microservices. Marcus uses a single workspace-based Application Insights instance with sampling at 20% in production (cost control) and 100% in staging (full visibility). Custom KQL alerts watch for error rate spikes across the distributed trace.

Knowledge check

Question

What are the three destinations for Azure diagnostic settings?

Click or press Enter to reveal answer

Answer

1. Log Analytics workspace (query and alert), 2. Storage account (long-term archive), 3. Event Hubs (stream to external SIEM). You can send to all three simultaneously.

Click to flip back

Question

What replaced the Log Analytics Agent (MMA)?

Click or press Enter to reveal answer

Answer

Azure Monitor Agent (AMA) with Data Collection Rules (DCRs). MMA was deprecated in August 2024. AMA provides centralised configuration, filtering at source, and multi-workspace routing.

Click to flip back

Question

Why are metrics preferred over logs for real-time alerting?

Click or press Enter to reveal answer

Answer

Metrics alert in ~1 minute vs ~5-15 minutes for logs. Metrics are numeric time-series with millisecond query speed and are free for platform metrics. Logs are better for root cause analysis and compliance.

Click to flip back

Knowledge Check

🏦 Elena needs to retain all Azure Key Vault access logs for 7 years to meet PCI DSS compliance, while also enabling her SOC team to run real-time queries on the last 90 days. Which combination should she recommend?

Knowledge Check

🏗️ Priya is designing monitoring for GlobalTech's 12-subscription Azure environment. Teams in Europe and Asia need to query their own logs independently, but the central security team needs visibility across all regions. Which Log Analytics topology should she recommend?

🎬 Video coming soon


Next up: Now that you can see your environment, let’s design who gets in — Choosing Authentication Methods.

Next →

Choosing Authentication Methods

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.