Skip to content

Configure your Service Principal to Monitor Subscriptions

For each Azure Subscription that you want to monitor, add the CloudMonitor Service Principal that you selected during installation as the READER role at the Subscription scope. Start by selecting the Azure Subscription in the Azure portal:

Step 1 screenshot

Click on “Access control (IAM)” inside of the Subscription.

Step 2 screenshot

Click ”+ Add” to add a new Role/Scope.

Step 3 screenshot

Choose “Add role assignment”

Step 4 screenshot

Select the “Reader” role. This only allows CloudMonitor to read service-plane metadata and costs, but not the contents inside of services such as database data and key vault keys.

Step 5 screenshot

Click “Next”

Step 6 screenshot

Choose “User, group, or service principal” and click “Select members”

Step 7 screenshot

Type in the name of your Service Principal and select it from the drop down list. You can also search by the App Id (Client Id) of your service principal to ensure you have the right one.

Step 8 screenshot

Click “Select”

Step 9 screenshot

Click “Next”.

Step 10 screenshot

Review the details and click “Review + assign”

Step 11 screenshot

The CloudMonitor Engine now has the access it needs to monitor this Subscription. Repeat this step for as many Subscriptions as you wish, or consider using a Management Group to allow all new Subscriptions to be monitored automatically.

Navigate toAzure Active Directory > App Registrations, and click your CloudMonitor Service Principal by name or ClientId under the “All applications” tab.

Step 13 screenshot

On the side menu, under Manage, click “API permissions” and then click “Add a permission”.

Step 14 screenshot

In the modal window that opens, click “Microsoft Graph”.

Step 15 screenshot

Click “Application permissions” and search for [[Application.Read.All]] in the select permissions input field. Then add the read permission by clicking “Add permissions” below.

Step 16 screenshot

Repeat the last step for the same Service Principal, adding these read permissions:
• [[AuditLog.Read.All]]
• [[Directory.Read.All]]

Step 17 screenshot

Click “Grant admin consent for …”. This action requires a user with Admin rights.

Step 18 screenshot