Service principals configured to allow CloudHealth to access your Azure tenancy make use of a secret that can expire, and will need to be renewed on occasion.
The secret expiring can lead to;
To update the secret used by the service principal please follow these steps -
Optional: To mitigate this issue in the future you can create a policy within CloudHealth to alert you to when the secret associated with the Service Principal has expired.
To do so follow these steps -
1. Navigate to Governance -> Policies, and select Create New Policy
2. Within the policy set the resource type as Azure Service Principal -
3. For the condition set the topic as configuration, and the measure as status, and set the "When any Azure Service Principals' status is" dropdown to critical as per the below -
4. Under the Actions set an action to email yourself or whomever manages the Azure side of the tenant to alert them that the Service Principal has moved to critical.