Skip to content

Commit 03d9fb7

Browse files
Merge pull request #247327 from yegu-ms/mpe-pl
Added PLS to MPE article
2 parents 1f0c351 + b9c38c7 commit 03d9fb7

File tree

1 file changed

+27
-4
lines changed

1 file changed

+27
-4
lines changed

articles/managed-grafana/how-to-connect-to-data-source-privately.md

Lines changed: 27 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -14,9 +14,9 @@ In this guide, you learn how to connect your Azure Managed Grafana instance to a
1414

1515
When you use managed private endpoints, traffic between your Azure Managed Grafana and its data sources traverses exclusively over the Microsoft backbone network without going through the internet. Managed private endpoints protect against data exfiltration. A managed private endpoint uses a private IP address from your Managed Virtual Network to effectively bring your Azure Managed Grafana workspace into that network. Each managed private endpoint is mapped to a specific resource in Azure and not the entire service. Customers can limit connectivity to only resources approved by their organizations.
1616

17-
A private endpoint connection is created in a "Pending" state when you create a managed private endpoint in Azure Managed Grafana. An approval workflow is started. The private link resource owner is responsible for approving or rejecting the new connection. If the owner approves the connection, the private link is established. But, if the owner doesn't approve the connection, then the private link won't be set up. In either case, the managed private endpoint will be updated with the status of the connection. Only a managed private endpoint in an approved state can be used to send traffic to the private link resource that is connected to the managed private endpoint.
17+
A private endpoint connection is created in a "Pending" state when you create a managed private endpoint in your Managed Grafana workspace. An approval workflow is started. The private link resource owner is responsible for approving or rejecting the new connection. If the owner approves the connection, the private link is established. Otherwise, the private link won't be set up. Managed Grafana shows the current connection status. Only a managed private endpoint in an approved state can be used to send traffic to the private link resource that is connected to the managed private endpoint.
1818

19-
While managed private endpoints are free, there may be charges associated with private link usage on a data source. Refer to your data source’s pricing details for more information.
19+
While managed private endpoints are free, there may be charges associated with private link usage on a data source. For more information, see your data source’s pricing details.
2020

2121
> [!IMPORTANT]
2222
> Managed Private Endpoint is currently in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
@@ -40,7 +40,7 @@ To follow the steps in this guide, you must have:
4040

4141
## Create a managed private endpoint for Azure Monitor workspace
4242

43-
You can create a managed private endpoint for your Managed Grafana workspace to connect to a [supported Azure data source](#supported-azure-data-sources) using a private link.
43+
You can create a managed private endpoint in your Managed Grafana workspace to connect to a [supported Azure data source](#supported-azure-data-sources) using a private link.
4444

4545
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking (Preview)**.
4646
1. Select **Managed private endpoint**, and then select **Create**.
@@ -51,13 +51,36 @@ You can create a managed private endpoint for your Managed Grafana workspace to
5151

5252
:::image type="content" source="media/managed-private-endpoint/new-mpe-details.png" alt-text="Screenshot of the Azure portal new managed private endpoint details." lightbox="media/managed-private-endpoint/new-mpe-details.png":::
5353

54-
1. Select an Azure *Resource type* (for example, **Microsoft.Monitor/accounts** for Azure Monitor Managed Service for Prometheus).
54+
1. Select an Azure *Resource type* (for example, **Microsoft.Monitor/accounts** for Azure Monitor Managed Service for Prometheus).
5555
1. Click **Create** to add the managed private endpoint resource.
5656
1. Contact the owner of target Azure Monitor workspace to approve the connection request.
5757

5858
> [!NOTE]
5959
> After the new private endpoint connection is approved, all network traffic between your Managed Grafana workspace and the selected data source will flow only through the Azure backbone network.
6060

61+
## Create a managed private endpoint to Azure Private Link service
62+
63+
If you have a data source internal to your virtual network, such as an InfluxDB server hosted on an Azure virtual machine, you can connect your Managed Grafana workspace to it. You first need to add a private link access to that resource using the Azure Private Link service. The exact steps required to set up a private link is dependent on the type of Azure resource. Refer to the documentation of the hosting service you have. For example, [this article](../aks/private-clusters.md#use-a-private-endpoint-connection) describes to configure a private link to an Azure Kubernetes Service cluster.
64+
65+
Once you've set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
66+
67+
1. In the Azure portal, navigate to your Grafana resource and then select **Networking (Preview)**.
68+
1. Select **Managed private endpoint**, and then select **Create**.
69+
70+
:::image type="content" source="media/managed-private-endpoint/create-mpe.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create-mpe.png":::
71+
72+
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
73+
74+
> [!TIP]
75+
> The *Private link service url* field is optional unless you need TLS. If you specify a URL, Managed Grafana will ensure that the host IP address for that URL matches the private endpoint's IP address. Due to security reasons, AMG have an allowed list of the URL.
76+
77+
1. Click **Create** to add the managed private endpoint resource.
78+
1. Contact the owner of target Azure Monitor workspace to approve the connection request.
79+
1. After the connection request is approved, click **Refresh** to see the connection status and private IP address.
80+
81+
> [!NOTE]
82+
> After the new private endpoint connection is approved, all network traffic between your Managed Grafana workspace and the selected data source will flow only through the Azure backbone network.
83+
6184
## Next steps
6285

6386
In this how-to guide, you learned how to configure private access between a Managed Grafana workspace and a data source. To learn how to set up private access from your users to a Managed Grafana workspace, see [Set up private access](how-to-set-up-private-access.md).

0 commit comments

Comments
 (0)