Share via

Azure Monitor alerts

Prabhu Rathnam 0 Reputation points
2026-04-21T16:19:55.0466667+00:00

I have setup couple of alerts in Azure monitor and they are logged into service: Log Alert V2. I want to see the statistics of these alerts based on days, no of alerts per days etc. how and where can I see them in stats in dashboard. Atleast I need the stats.

i need in Monitor alerts alerts history and log analytics. No luck.

Can anyone please assist me to see those stats.

Azure Monitor
Azure Monitor

An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.

0 comments No comments

2 answers

Sort by: Most helpful
  1. Siva shunmugam Nadessin 9,625 Reputation points Microsoft External Staff Moderator
    2026-04-21T16:41:27.6766667+00:00

    Hello Prabhu Rathnam,

    Thank you for reaching out to the Microsoft Q&A forum. 

    When investigated we see a day-by-day breakdown of how many Log Alert V2 rules have fired and be able to pin that chart to a dashboard. You have a few options:

    1. Use the Metrics blade on your Log Alert rule • Go to Azure Portal → Monitor → Alerts → Alert rules • Click your Log Alert V2 rule, then click “Metrics” • In the Metrics view: – Select the “Triggered alert count” (or “Fired alerts”) metric – Set the aggregation period to 1 day and grouping to “TimeGenerated” – You’ll see a bar/line chart of alerts per day—pin that to your dashboard
    2. Build or use the built-in Alerts workbook • In Azure Portal → Monitor → Workbooks • Search for “Alerts” or “Alert overview” workbook • The workbook has charts for fired alerts over time (by rule, severity, etc.) • Customize the time range, drill down by day, then pin visuals to your dashboard
    3. Send alert events to Log Analytics and Kusto-query them a. Enable a diagnostic setting on your subscription (or resource group) to send Alert events to a Log Analytics workspace b. In Logs, run a query like:
         AzureDiagnostics | where Category == "ScheduledQueryRule" and OperationName == "AlertTriggered" | summarize count() by bin(TimeGenerated, 1d) 
      
      c. Visualize the query results as a time chart and pin to your dashboard
      1. View Alert History (for quick list view) • Monitor → Alerts → “View alert history” shows all fired alerts—filter by date and rule—but it’s more of a table than a chart

    Follow-up questions (if any of the above steps don’t match what you’re seeing):

    1. Have you enabled a diagnostic setting on your subscription/resource group to route alert events into a Log Analytics workspace?
    2. Do you already have a Log Analytics workspace where you can query AzureDiagnostics or AlertsManagement tables?
    3. Are you looking at rule-level metrics (how many times a specific alert rule fired) or workspace-wide counts across all rules?

    Hope this helps you get those per-day stats up on a dashboard!

    Reference list: –

    How to create, view, and manage log alerts: 

    https://docs.microsoft.com/azure/azure-monitor/alerts/alerts-log#managing-log-alerts-from-the-azure-portal

    – Troubleshooting log alerts (not firing/delays): 

    https://docs.microsoft.com/azure/azure-monitor/alerts/alerts-troubleshoot-log

    – Azure Monitor Alerts overview: 

    https://docs.microsoft.com/azure/azure-monitor/alerts/alerts-overview

    – Using Azure Monitor Workbooks: 

    https://docs.microsoft.com/azure/azure-monitor/platform/workbooks-overview


  2. Q&A Assist
    2026-04-21T16:20:08.65+00:00
    AI generated content. This question contains an answer created with AI from Q&A Assist. Learn more

    Azure Monitor alert rules and fired alert instances are stored as logs that can be queried and visualized with log alerts and workbooks. To get daily statistics such as “number of alerts per day,” use Log Analytics queries over the alert logs and then pin the results to a dashboard.

    High‑level approach:

    1. Ensure alert logs are sent to a Log Analytics workspace
      • Configure Azure Monitor to send alert rule and alert instance data to a Log Analytics workspace (via diagnostic settings or the built‑in integration, depending on how alerts are configured).
    2. Use a Log Analytics query to summarize alerts per day
      • In the Log Analytics workspace, run a query over the alert log table (for example, the table that stores Log Alert v2 records) and summarize by day, such as:
         <AlertTableName>
         | summarize AlertsPerDay = count() by bin(TimeGenerated, 1d)
         | order by TimeGenerated asc
      
      • Adjust filters (by alert rule name, severity, resource, etc.) as needed.
    3. Visualize and pin to a dashboard
      • In the Logs blade, change the visualization to Time chart or Bar chart.
      • Use “Pin to dashboard” to add the chart to an Azure dashboard for ongoing monitoring.
    4. Use workbooks for richer statistics
      • Create an Azure Monitor workbook and add a Logs query step using the same KQL.
      • Configure parameters, charts, and grids to show:
        • Total alerts per day
        • Alerts per rule per day
        • Alerts per severity per day
      • Save the workbook and pin key visuals to dashboards if required.

    If alerts are configured as log alerts, the same Log Analytics queries can also be used to drive additional log alerts or automation.


    References:

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.