πŸ”’ Guided

Pre-launch preview. Authorised access only.

Incorrect code

Guided by A Guide to Cloud
Explore AB-900 AI-901
Guided AZ-400 Domain 5
Domain 5 β€” Module 1 of 2 50%
24 of 25 overall

AZ-400 Study Guide

Domain 1: Design and Implement Processes and Communications

  • Work Item Tracking: Boards, GitHub & Flow
  • DevOps Metrics: Dashboards That Drive Decisions
  • Collaboration: Wikis, Teams & Release Notes

Domain 2: Design and Implement a Source Control Strategy

  • Branching Strategies: Trunk-Based, Feature & Release
  • Pull Requests: Policies, Protections & Merge Rules
  • Repository Management: LFS, Permissions & Recovery

Domain 3: Design and Implement Build and Release Pipelines

  • Package Management: Feeds, Versioning & Upstream
  • Testing Strategy: Quality Gates & Release Gates
  • Test Implementation: Code Coverage & Pipeline Tests
  • Azure Pipelines: YAML from Scratch Free
  • GitHub Actions: Workflows from Scratch Free
  • Pipeline Agents: Self-Hosted, Hybrid & VM Templates
  • Multi-Stage Pipelines: Templates, Variables & Approvals
  • Deployment Strategies: Blue-Green, Canary & Ring Free
  • Safe Rollouts: Slots, Dependencies & Hotfix Paths
  • Deployment Implementations: Containers, Scripts & Databases
  • Infrastructure as Code: ARM vs Bicep vs Terraform
  • IaC in Practice: Desired State & Deployment Environments
  • Pipeline Maintenance: Health, Migration & Retention

Domain 4: Develop a Security and Compliance Plan

  • Pipeline Identity: Service Principals, Managed IDs & OIDC Free
  • Authorization & Access: GitHub Roles & Azure DevOps Security
  • Secrets & Secure Pipelines: Key Vault & Workload Federation
  • Security Scanning: GHAS, Defender & Dependabot

Domain 5: Implement an Instrumentation Strategy

  • Monitoring for DevOps: Azure Monitor & App Insights
  • Metrics & KQL: Analysing Telemetry & Traces

AZ-400 Study Guide

Domain 1: Design and Implement Processes and Communications

  • Work Item Tracking: Boards, GitHub & Flow
  • DevOps Metrics: Dashboards That Drive Decisions
  • Collaboration: Wikis, Teams & Release Notes

Domain 2: Design and Implement a Source Control Strategy

  • Branching Strategies: Trunk-Based, Feature & Release
  • Pull Requests: Policies, Protections & Merge Rules
  • Repository Management: LFS, Permissions & Recovery

Domain 3: Design and Implement Build and Release Pipelines

  • Package Management: Feeds, Versioning & Upstream
  • Testing Strategy: Quality Gates & Release Gates
  • Test Implementation: Code Coverage & Pipeline Tests
  • Azure Pipelines: YAML from Scratch Free
  • GitHub Actions: Workflows from Scratch Free
  • Pipeline Agents: Self-Hosted, Hybrid & VM Templates
  • Multi-Stage Pipelines: Templates, Variables & Approvals
  • Deployment Strategies: Blue-Green, Canary & Ring Free
  • Safe Rollouts: Slots, Dependencies & Hotfix Paths
  • Deployment Implementations: Containers, Scripts & Databases
  • Infrastructure as Code: ARM vs Bicep vs Terraform
  • IaC in Practice: Desired State & Deployment Environments
  • Pipeline Maintenance: Health, Migration & Retention

Domain 4: Develop a Security and Compliance Plan

  • Pipeline Identity: Service Principals, Managed IDs & OIDC Free
  • Authorization & Access: GitHub Roles & Azure DevOps Security
  • Secrets & Secure Pipelines: Key Vault & Workload Federation
  • Security Scanning: GHAS, Defender & Dependabot

Domain 5: Implement an Instrumentation Strategy

  • Monitoring for DevOps: Azure Monitor & App Insights
  • Metrics & KQL: Analysing Telemetry & Traces
Domain 5: Implement an Instrumentation Strategy Premium ⏱ ~12 min read

Monitoring for DevOps: Azure Monitor & App Insights

Configure monitoring for DevOps environments with Azure Monitor, Application Insights, and GitHub Insights. Set up telemetry collection, alerts, and pipeline monitoring.

Why monitoring completes the DevOps loop

β˜• Simple explanation

Think of a car dashboard.

You have a speedometer, fuel gauge, temperature gauge, and warning lights. Without them, you are driving blind β€” you would not know you are speeding, running out of fuel, or overheating until something breaks. The dashboard gives you real-time information so you can react before disaster strikes.

Monitoring in DevOps is your application’s dashboard. Azure Monitor shows you how your infrastructure is performing. Application Insights shows you how your application is behaving from the user’s perspective. Pipeline monitoring tells you when builds break or deployments fail. Without monitoring, you are deploying code into a black hole.

The AZ-400 exam’s Domain 5 focuses on instrumentation β€” the practice of collecting, analysing, and acting on telemetry from your applications and infrastructure. This module covers the Azure Monitor ecosystem, Application Insights configuration, GitHub monitoring capabilities, and pipeline alerting. The next module covers metrics analysis, distributed tracing, and KQL queries.

  • Azure Monitor ecosystem β€” the umbrella service and its components
  • Application Insights β€” application performance monitoring (APM)
  • Insights services β€” VM Insights, Container Insights, Storage Insights, Network Insights
  • GitHub monitoring β€” Actions insights, audit logs, and charts
  • Pipeline alerts β€” notifications for CI/CD events in both platforms

The Azure Monitor ecosystem

Azure Monitor is the umbrella platform for all monitoring, logging, and alerting in Azure. It collects data from multiple sources and provides tools to analyse and act on that data.

Architecture overview

Data Sources              Collection           Analysis & Action
─────────────            ──────────           ──────────────────
Applications       ──→   App Insights    ──→  Log Analytics workspace
VMs                ──→   VM Insights     ──→  Metrics Explorer
Containers (AKS)   ──→   Container       ──→  Workbooks
                          Insights
Storage accounts   ──→   Storage         ──→  Alerts
                          Insights
Network resources  ──→   Network         ──→  Dashboards
                          Insights
Azure resources    ──→   Diagnostic      ──→  Autoscale
                          Settings
Custom sources     ──→   Data Collection ──→  Azure Monitor
                          Rules (DCR)          SCOM MI

Two data types

Data TypeWhat It IsStorageQuery Language
MetricsNumeric time-series data β€” CPU percentage, request count, response timeAzure Monitor Metrics store (fast, 93-day retention)Metrics Explorer (visual)
LogsStructured event records β€” requests, exceptions, traces, custom eventsLog Analytics workspace (configurable retention, up to 12 years)KQL (Kusto Query Language)

Metrics are lightweight and near-real-time (1-minute granularity). Use them for dashboards and alerts on current state. Logs are rich and queryable. Use them for deep investigation, correlation, and historical analysis.

Question

What is the key difference between Azure Monitor Metrics and Azure Monitor Logs?

Click or press Enter to reveal answer

Answer

Metrics are lightweight numeric time-series (CPU%, request count) stored in a fast metrics store with up to 93-day retention, queried via Metrics Explorer. Logs are rich structured event records (requests, exceptions, traces) stored in a Log Analytics workspace with configurable retention up to 12 years, queried via KQL. Metrics are for real-time dashboards and alerts. Logs are for deep analysis and correlation.

Click to flip back

Application Insights

Application Insights is the application performance monitoring (APM) component of Azure Monitor. It monitors your live applications and detects performance anomalies.

Telemetry types

Telemetry TypeWhat It CapturesExample
RequestsIncoming HTTP requests to your appGET /api/users took 234ms, returned 200
DependenciesOutgoing calls to external servicesSQL query took 89ms, HTTP call to payment API took 1.2s
ExceptionsUnhandled and tracked exceptionsNullReferenceException in OrderService.Process()
TracesCustom diagnostic messages (your ILogger output)β€œProcessing order 12345 for customer ABC”
Page viewsClient-side page load telemetryHomepage loaded in 1.8s on Chrome
Custom eventsBusiness-relevant events you define”User completed checkout”, β€œReport generated”
Custom metricsBusiness-relevant numeric values”Cart value: $147”, β€œQueue depth: 23”

Instrumentation approaches

Application Insights Instrumentation
ApproachHow It WorksWhen to Use
Auto-instrumentation (codeless)Enable via Azure Portal, ARM, or agent. No code changes needed.Azure App Service, Azure Functions, VMs with the agent. Fastest path to monitoring.
SDK integrationAdd the Application Insights SDK NuGet/npm package and configure in code.When you need custom telemetry (custom events, metrics), or when auto-instrumentation is not available for your platform.
OpenTelemetryUse the Azure Monitor OpenTelemetry exporter. Vendor-neutral instrumentation.New applications, multi-cloud scenarios, or teams adopting OpenTelemetry standards.

Connection strings vs instrumentation keys

Application Insights connection strings replaced instrumentation keys as the recommended configuration method. Connection strings contain the ingestion endpoint and the instrumentation key, supporting regional ingestion endpoints and private link scenarios. Always store the connection string in application settings or Key Vault β€” never hardcode it.

Question

What are the three ways to instrument an application with Application Insights?

Click or press Enter to reveal answer

Answer

1. Auto-instrumentation (codeless) β€” enable in Azure Portal or via agent, no code changes. Works for App Service, Functions, VMs. 2. SDK integration β€” add the App Insights SDK package to your code for custom telemetry. 3. OpenTelemetry β€” use the Azure Monitor OpenTelemetry exporter for vendor-neutral, standards-based instrumentation. Auto-instrumentation is fastest; SDK gives most control; OpenTelemetry is the modern standard.

Click to flip back

Insights services: VM, Container, Storage, Network

VM Insights

Monitors virtual machine performance and health:

  • CPU, memory, disk, and network metrics per VM
  • Process-level detail (which processes consume resources)
  • Dependency mapping β€” visualises network connections between VMs and external services (requires the Dependency Agent)
  • Data sent to Log Analytics workspace for KQL analysis

Enable: Install the Azure Monitor Agent (AMA) and configure a Data Collection Rule (DCR).

Container Insights

Monitors AKS clusters and container workloads:

  • Node and pod resource utilisation (CPU, memory)
  • Container restart counts and failure rates
  • Kubernetes events (pod scheduling, image pull failures)
  • Prometheus metrics integration (custom app metrics)
  • Live logs β€” real-time container stdout/stderr in the portal

Enable: Enable during AKS cluster creation or add the monitoring add-on later. Uses Azure Monitor Agent with ContainerLogV2 schema.

Storage Insights and Network Insights

  • Storage Insights β€” unified view of storage account health, performance, capacity, and transactions across all accounts
  • Network Insights β€” topology visualisation, connectivity monitoring, traffic analysis, and NSG flow logs
Question

What does the Dependency Agent provide in VM Insights that the Azure Monitor Agent alone does not?

Click or press Enter to reveal answer

Answer

The Dependency Agent provides dependency mapping β€” it discovers and visualises network connections between VMs and external services (databases, APIs, third-party services). The Azure Monitor Agent collects performance metrics and logs but does not map inter-service dependencies. Together they give you both performance data and architecture visibility.

Click to flip back

GitHub monitoring

Actions insights

GitHub provides workflow monitoring through the Actions tab:

  • Workflow run history β€” success/failure rates, duration trends
  • Usage metrics β€” runner minutes consumed (billable minutes for private repos)
  • Workflow visualisation β€” job dependencies and timing breakdown

Configuring charts (repository insights)

Repository Insights (under the Insights tab) provide:

  • Pulse β€” summary of activity (PRs merged, issues closed, contributors active)
  • Contributors β€” commit frequency by contributor over time
  • Traffic β€” page views, unique visitors, referral sources, popular content
  • Dependency graph β€” all dependencies and their known vulnerabilities

For organisations with GitHub Enterprise, GitHub Insights provides custom charts and metrics across all repositories.

Audit log

The GitHub audit log records administrative and security events:

  • Organisation membership changes
  • Repository permission changes
  • Branch protection modifications
  • Secret scanning bypass events
  • Workflow permission changes

Audit logs can be streamed to external SIEM systems (Azure Sentinel, Splunk) for long-term retention and correlation.

Pipeline alerts

Azure DevOps notifications

Azure DevOps supports built-in notifications for pipeline events:

EventNotification TypeConfiguration
Build completesEmail, Teams webhookPersonal or team subscription
Build failsEmail, Teams webhook, service hookTeam subscription (auto-notify assignees)
Release deployment pendingEmail to approversAutomatic when approval gates are configured
Release deployment failsEmail, Teams webhookTeam subscription
Work item linked to buildEmailPersonal subscription

Service hooks extend notifications to external systems β€” Slack, Teams, webhooks, Azure Functions, Grafana.

GitHub Actions alerts

GitHub Actions does not have a built-in alerting system like Azure DevOps. Instead, use:

  • Repository notification settings β€” watch workflow runs for failure notifications
  • Third-party GitHub Apps β€” Slack GitHub integration, Teams GitHub connector
  • Custom webhook steps β€” add a job step that posts to Slack/Teams on failure:
- name: Notify on failure
  if: failure()
  uses: slackapi/slack-github-action@v2
  with:
    webhook: ${{ secrets.SLACK_WEBHOOK }}
    payload: |
      "text": "Workflow failed: ${{ github.workflow }}"

Work item creation from alerts

Azure Monitor alerts can automatically create work items in Azure DevOps or GitHub Issues when triggered:

  1. Configure an Azure Monitor alert rule (e.g., response time > 2 seconds)
  2. Attach an action group with an β€œAzure DevOps Work Item” or β€œWebhook” action
  3. When the alert fires, a bug or task is created in your backlog automatically

This closes the loop: production issue β†’ alert β†’ work item β†’ fix β†’ deploy β†’ monitor.

Scenario: Kai sets up monitoring for Launchpad Labs

πŸš€ Kai Tanaka’s SaaS startup has just deployed their first production service to AKS. Sam (CTO) asks: β€œHow do we know it is working?”

Kai’s monitoring stack:

  1. Application Insights β€” auto-instrumented on the .NET API via the AKS monitoring add-on. Captures requests, dependencies, and exceptions.
  2. Container Insights β€” enabled on the AKS cluster. Monitors pod health, node resource usage, and restart counts.
  3. Azure Monitor alerts β€” configured for: response time P95 over 2s (warning), error rate over 5% (critical), pod restart count over 3 in 10 minutes (critical).
  4. Action groups β€” critical alerts create GitHub Issues automatically via webhook, plus Slack notification.
  5. GitHub Actions monitoring β€” Slack integration notifies the team channel on deployment failures.

Result: Within the first week, Container Insights detects a memory leak causing pod restarts. The alert fires, a GitHub Issue is created, Riku (frontend dev) picks it up, and the fix is deployed the same day.

πŸ’‘ Exam tip: Know which Insights service for which resource

The exam may describe a resource type and ask which monitoring solution to use:

  • Web app or API β†’ Application Insights
  • Virtual machines β†’ VM Insights (with Dependency Agent for mapping)
  • AKS / containers β†’ Container Insights
  • Storage accounts β†’ Azure Monitor for Storage (Storage Insights)
  • VNets, load balancers, NSGs β†’ Azure Monitor for Networks (Network Insights)
  • All of the above, unified β†’ Azure Monitor (umbrella) with Log Analytics workspace

Also remember: all Insights services send data to a Log Analytics workspace, where you can write KQL queries to correlate data across resource types.

Knowledge check

Knowledge Check

Jordan wants to monitor an AKS cluster to see pod resource utilisation, container restart counts, and real-time container logs. Which service should he enable?

Knowledge Check

Nadia's Azure Monitor alert fires when the claims API response time exceeds 3 seconds. She wants a bug to be automatically created in Azure DevOps Boards. What should she configure?

🎬 Video coming soon

Monitoring for DevOps: Azure Monitor & App Insights

Next up: Metrics and KQL: Analysing Telemetry and Traces

← Previous

Security Scanning: GHAS, Defender & Dependabot

Next β†’

Metrics & KQL: Analysing Telemetry & Traces

Guided

I learn, I simplify, I share.

A Guide to Cloud YouTube Feedback

© 2026 Sutheesh. All rights reserved.

Guided is an independent study resource and is not affiliated with, endorsed by, or officially connected to Microsoft. Microsoft, Azure, and related trademarks are property of Microsoft Corporation. Always verify information against Microsoft Learn.