You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/private-link-security.md
+16-14Lines changed: 16 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,13 +71,13 @@ There are a number of limits you should consider when planning your Private Link
71
71
72
72
* A VNet can only connect to 1 AMPLS object. That means the AMPLS object must provide access to all the Azure Monitor resources the VNet should have access to.
73
73
* An Azure Monitor resource (Workspace or Application Insights component) can connect to 5 AMPLSs at most.
74
-
* An AMPLS object can connect to 20 Azure Monitor resources at most.
74
+
* An AMPLS object can connect to 50 Azure Monitor resources at most.
75
75
* An AMPLS object can connect to 10 Private Endpoints at most.
76
76
77
77
In the below topology:
78
78
* Each VNet connects to 1 AMPLS object, so it can't connect to other AMPLSs.
79
79
* AMPLS B connects to 2 VNets: using 2/10 of its possible Private Endpoint connections.
80
-
* AMPLS A connects to 2 workspaces and 1 Application Insight component: using 3/20 of its possible Azure Monitor resources.
80
+
* AMPLS A connects to 2 workspaces and 1 Application Insight component: using 3/50 of its possible Azure Monitor resources.
81
81
* Workspace 2 connects to AMPLS A and AMPLS B: using 2/5 of its possible AMPLS connections.
82
82
83
83

@@ -158,11 +158,24 @@ First, you can connect this Log Analytics resource to any Azure Monitor Private
158
158
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
159
159
If you set **Allow public network access for ingestion** to **No**, then machines outside of the connected scopes cannot upload data to this workspace. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Experiences running outside the Azure portal, and that query Log Analytics data also have to be running within the private-linked VNET.
160
160
161
-
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. Restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
161
+
Restricting access in this manner does not apply to the Azure Resource Manager (ARM) and therefore has the following limitations:
162
+
* Access to data - while blocking queries from public networks applies to most Log Analytics experiences, some experiences query data through ARM and won't be able to query data unless Private Link settings are applied to ARM as well (feature coming up soon). This includes, for example, Azure Monitor solutions, workbooks and Insights, and the LogicApp connector.
163
+
* Workspace management - Workspace setting and configuration changes (including turning these access settings on or off) are managed by ARM. Restrict access to workspace management using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
162
164
163
165
> [!NOTE]
164
166
> Logs and metrics uploaded to a workspace via [Diagnostic Settings](diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
165
167
168
+
### Log Analytics solution packs download
169
+
170
+
To allow the Log Analytics Agent to download solution packs, add the appropriate fully qualified domain names to your firewall allow list.
|Azure Public | scadvisorcontent.blob.core.windows.net | 443 | Outbound
176
+
|Azure Government | usbn1oicore.blob.core.usgovcloudapi.net | 443 | Outbound
177
+
|Azure China 21Vianet | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
178
+
166
179
## Configure Application Insights
167
180
168
181
Go to the Azure portal. In your Azure Monitor Application Insights component resource is a menu item **Network Isolation** on the left-hand side. You can control two different states from this menu.
@@ -231,17 +244,6 @@ Adding these tags allows you to perform actions such as querying log data, creat
231
244
232
245
Bundle the JavaScript code in your script so that the browser does not attempt to download code from a CDN. An example is provided on [GitHub](https://github.com/microsoft/ApplicationInsights-JS#npm-setup-ignore-if-using-snippet-setup)
233
246
234
-
### Log Analytics solution download
235
-
236
-
To allow the Log Analytics Agent to download solution packs, add the appropriate fully qualified domain names to your firewall allow list.
|Azure Public | scadvisorcontent.blob.core.windows.net | 443 | Outbound
242
-
|Azure Government | usbn1oicore.blob.core.usgovcloudapi.net | 443 | Outbound
243
-
|Azure China 21Vianet | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
244
-
245
247
### Browser DNS settings
246
248
247
249
If you're connecting to your Azure Monitor resources over a Private Link, traffic to these resource must go through the private endpoint that is configured on your network. To enable the private endpoint, update your DNS settings as explained in [Connect to a private endpoint](#connect-to-a-private-endpoint). Some browsers use their own DNS settings instead of the ones you set. The browser might attempt to connect to Azure Monitor public endpoints and bypass the Private Link entirely. Verify that your browsers settings don't override or cache old DNS settings.
0 commit comments