How to get alerted when Logic Apps connection becomes Invalid - azure

I setup a Logic App workflow that runs each time I receive an email in my Exchange mailbox on Office 365.
From time to time my connection to Office 365 becomes invalid, e.g. expired token. This breaks my Logic App. Is there a way I can get alerted about invalid connections?

There is no direct way to trigger an alert if your connections become invalid (within logic apps)
However, you can config an alert for your logic apps (as a whole service).
Alerts
You can set up an Alert-Rules in Logic apps to achieve this
Diagnostic Logging/Alerts
You can also enable the diagnostic logging to send all the logs to Log analytics (previously called OMS)
Then configure alerts in Log Analytics based on the logs/telemetrics.

Related

Azure Logic Apps - When a new email arrives workflow does not trigger

I'm trying to create an Azure Logic App Workflow to extract attachments when email arrives.
I have a workflow on my account to generate Logic App design.
This workflow is directly paste in our azuredeploy.json file to be deploy with our pipeline on the Azure Logic App main account.
This workflow works perfectly on my app but not in the deployed app. In the deployed app, when I send an email to test the workflow, it does not trigger the event like it does in my account.
It seems that our issue came from the office365 email that we specially created (which is different from ours) the be used to get email with attachments.
And now I just tried with the trigger "When a new email arrives in a shared mailbox" and it work exactly as expected. But it's not a shared mailbox !
Has anyone encountered this issue before?
I believe you have created your connection to Office 365 (Outlook) using your own account, which would explain why it works for you, and the Shared Mailbox (which only requires one having access to it).
However, your scenario requires the "delegated permissions" model, for which Graph API is better suited.
May I kindly suggest you read https://learn.microsoft.com/en-us/azure/connectors/connectors-native-http

Send azure monitor alert to slack not working

I am sure this has been asked many times but am unable to find relevant answer. Is there any way to send Azure monitor alerts to slack via Logic apps or some other way. I have found this template - https://github.com/Azure/azure-quickstart-templates/tree/master/demos/alert-to-slack-with-logic-app and integrated it into my azure system but it is not working.
Have tried some work around mentioned at - https://github.com/Azure/azure-quickstart-templates/issues/3319 but all in vain
Direct Webhook from action group using slack incoming webhook is not supported , as azure sends alert using its own schema.
Any input is highly appreciated ...
Azure Logic Apps is definitely an option, but if you are not needing complicated workflows, just send the alert directly from Azure Monitor to a Slack channel. You can do this by generating a unique email for the Slack channel and using that email in your Azure Monitor alert action group settings. Another option would be to send the alert to your company alert email inbox and have it automatically forwarded to that Slack channel email address. With this approach you completely remove the dependency and complexity of Azure Logic Apps.
https://slack.com/help/articles/206819278-Send-emails-to-Slack#h_01F4WDZG8RTCTNAMR4KJ7D419V

connectors to applications 'azureeventgrid' is not compatible with the Gmail

As part of microsoft integration service. I'm using an azure logic app that should send message to my GMAIL address each time an event is happening in a VM under a specified resource group.
Scenario applied is :
create RG + VM
create blank logic app
add event grid trigger
add condition ......
send email notificiations
(as of the link : article )
But Logic app designer denied to save as I receive the following message :
Failed to save logic app XXXXla01. The operation on workflow 'XXXXla01' cannot be completed because it contains connectors to applications 'azureeventgrid' which are not compatible with the Gmail connector.
When workraround, I find this article that stated some google policies update.
I'm looking now for an alternative to this issue, where I can still use an azure resource that send notifications to my GMAIL address everytime an event is happening to my VM.
Issue with Gmail API was resolved with the procedure : article

How updates in Azure AD Graph API or Microsoft Graph API are released

I am using Azure AD Graph API and Microsoft Graph API to communicate the Azure Active Directory . My code parses response received from API and compares error message in some specific error scenarios . Recently I observed one my scenario was failing due to change in response message from the API. I am just curios how these changes are pushed by Microsoft . Are customers notified for these changes ? Are changes released region wise or customer wise ? My code is being used by mates in other geographic reason also , they have not reported any failure till now.
For Example. Previously Error message for expired password was "Forced Password Change" now message is "Password is expired"
Are customers notified for changes ?
Once the service update is applied by Microsoft you will receive a notification if the update was successful or if it was not able to be applied. When any maintenance plan to happen all the partners and user receives notification about that. You could find here
Are changes released region wise or customer wise ?
Usually changes made on regionally. But sometimes data center wise also. But its very rare pointing to specific customer. Some small enhancement take place (Like yours) that's impact less on application and partner as well. In that case you may not receive any notification for that. Other then you would definitely receive mail concerning the issue. For more details you could take look on service life cycle policy

How can I setup an Outlook notification webhook on Azure?

Currently we have subscription in Office 365. All users has access to Outlook emails. We are planning to build a batch job using Daemon or Server application (as described here https://azure.microsoft.com/en-us/documentation/articles/active-directory-authentication-scenarios/#daemon-or-server-application-to-web-api). The reason for the batch job to be as Daemon service is because we wanted to access all user emails, filter and forward to another mail server with one app identity.
Question 1 : How can we grant an app in Azure to access all users emails ?
As an alternative we could also build a webhook that is subscribed to inbound/outbound emails and once we get a notification in our system we can filter/forward to another mail server. https://dev.outlook.com/restapi/concepts/webhooks
Instead of building a job and calling a REST API, is there a way to
register a webhook in Azure for all users at once and redirect the
url to our system ?
That will save us from building a batch job that has to run everyday to grab all incoming emails and then filter. If we can integrate a webhook all we have to build is just the filter/forward part.
The Webhooks are only supported for user level credentials. i.e Each user has to give the app a permission to request data on behalf of users. However, in our case, we need to get notifications for all user emails to reach our application and this is impossible to do at the time of writing (Sep 2016).
The solution we went forward is to build a batch job to pull all data. An Admin has to give an access to the application (the application will have its own identity) and make subsequent requests. For the app to identify itself, we have used X.509 certificate
We followed this documentation and this
If you want to redirect the specific messages with Office 365, a easy way is config the mail flow on the Exchange Admin Center.
For example, we can config a rule to redirect to the messages to the mailbox you wanted as below:
Here is the document for the mail flow rules for your reference.

Resources