LogoLogo
LogoLogo
  • Welcome
  • Details
  • Editions
  • Use Cases
  • SCEPMAN Deployment
    • Getting Started
      • Standard Guide
      • Extended Guide
    • Permissions
      • Azure App Registration
      • Managed Identities
    • Deployment Options
      • Marketplace deployment
      • Enterprise deployment
      • Terraform deployment
    • Root CA
    • Intermediate CA
  • Certificate Management
    • Revocation
    • Microsoft Intune
      • Windows
        • Certificate Based Authentication for RDP
      • macOS
      • Android
      • iOS/iPadOS
      • Linux
    • Jamf Pro
      • General Configuration
      • Computers
      • Devices
      • Users
    • Other MDM Solutions
      • Google Workspace
        • ChromeOS
      • Kandji
      • Mosyle
      • SOTI MobiControl
    • Certificate Master
      • Manage Certificates
      • Certificate Signing Request (CSR)
      • TLS Server Certificate
      • Sub CA Certificate
      • Code Signing Certificate
      • Client Certificate
      • User Certificate
    • Domain Controller Certificates
    • Enrollment REST API
      • Self Service Enrollment
        • Intune Managed Linux Client
        • Unmanaged Linux Client
      • API Enrollment
        • Linux Server
        • Windows Server
      • SCEPmanClient
  • Azure Configuration
    • Application Insights
    • App Service Sizing
      • Autoscaling
    • Custom Domain
    • Geo-Redundancy
    • Health Check
      • Using 3rd Party Monitoring
    • Log Management
    • Moving Resources
    • Private Endpoints
    • Split-Tenancy
  • Update Strategy
  • SCEPman Configuration
    • SCEPman Settings
      • Basics
      • Certificates
      • Certificate Master
      • CRL
      • Dependencies (Azure Services)
        • Azure KeyVault
        • Logging
        • Microsoft Entra ID (Azure AD)
        • National Cloud Platforms
      • Enrollment REST API
      • OCSP
      • SCEP Endpoints
        • DC Validation
        • Intune Validation
        • Jamf Validation
        • Static Validation
        • Static-AAD Validation
    • Certificate Master Settings
      • Basics
      • Microsoft Entra ID (Azure AD)
      • Logging
      • National Cloud Platforms
    • Application Artifacts
    • Certificate Master RBAC
    • Device Directories
    • Intune Strong Mapping
  • Other
    • Security & Privacy
    • Support
    • Licensing
      • Azure Marketplace
    • FAQs
      • General
      • Certificate Connector
      • Network Access Controllers
      • Renewing SCEPman Root CA
    • Troubleshooting
      • Common Problems
      • Certifried Security Vulnerability
      • Cisco ISE Host Header Limitation
      • Intune service discovery API permissions
      • Re-enrollment trigger
  • Uninstallation
  • Change Log
  • Links
  • SCEPman Website
Powered by GitBook
On this page
  • Health Check in Azure App Services
  • Configure Health Check
  • Configure Alerting

Was this helpful?

  1. Azure Configuration

Health Check

Last updated 1 year ago

Was this helpful?

You can monitor the health of SCEPman using

  • the (recommend) or

  • a .

Health Check in Azure App Services

You may configure the health check feature and corresponding alerting for the App Service to get a direct notification in case your SCEPman instance is no longer responsive.

Configure Health Check

  1. Navigate to your App Service and on the left side scroll down to Health check

  2. Now you can Enable the Health check, as probing path enter the following: /probe

  3. Now you can click on Save, but keep in mind that this will restart your App Service

Configure Alerting

To get an alert from our health check we need to configure alert rules in our App Service.

  1. Navigate to your App Service and on the left side scroll down to Alerts

  2. Click on Create alert rule

  3. In your new alert rule, you will be automatically redirected to Add condition

  4. Select a signal logic. Search for Health check status

  1. Configure the alert as specified below:

Threshold

Static

Aggregation type

Average

Operator

Less than

Unit

Count

Threshold value

70

Check every

5 minutes

Loopback period

15 minutes

  1. Click on Next: Actions

  2. Select Create action group

If you have existing action groups, choose Select action groups, select an action group and move to step 14.

  1. Define an Action group name and Display name

  1. Next to Notifications and add Notification type

  2. In the window, tick the Email checkbox and enter the email address you wish to receive notifications on

  3. Then click on OK

  4. Enter a Name for the Notification type

  1. After that you can click on Review + create and then on Create. You will be redirected back to Actions in creating the alert rule

  2. Next to Details, configure the following

    • Resource group

    • Severity

    • Alert rule name

    • Enable: Enable upon creation

    • Enable: Automatically resolve alerts

  1. Click on Review + Create, then Create

  1. View your existing Alert rules as shown

3rd party monitoring tool
Health check feature of the Azure App Services
Enable Health check
Create alert rule
Alert rule condition
Create action group
Set notifications to action group
Alert details
View existing alert rules