Skip to content

Commit 0450017

Browse files
committed
Adding ARM disclaimer and moving solution packs section up
1 parent 748ab72 commit 0450017

File tree

2 files changed

+16
-14
lines changed

2 files changed

+16
-14
lines changed
22.3 KB
Loading

articles/azure-monitor/platform/private-link-security.md

Lines changed: 16 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -71,13 +71,13 @@ There are a number of limits you should consider when planning your Private Link
7171

7272
* A VNet can only connect to 1 AMPLS object. That means the AMPLS object must provide access to all the Azure Monitor resources the VNet should have access to.
7373
* An Azure Monitor resource (Workspace or Application Insights component) can connect to 5 AMPLSs at most.
74-
* An AMPLS object can connect to 20 Azure Monitor resources at most.
74+
* An AMPLS object can connect to 50 Azure Monitor resources at most.
7575
* An AMPLS object can connect to 10 Private Endpoints at most.
7676

7777
In the below topology:
7878
* Each VNet connects to 1 AMPLS object, so it can't connect to other AMPLSs.
7979
* AMPLS B connects to 2 VNets: using 2/10 of its possible Private Endpoint connections.
80-
* AMPLS A connects to 2 workspaces and 1 Application Insight component: using 3/20 of its possible Azure Monitor resources.
80+
* AMPLS A connects to 2 workspaces and 1 Application Insight component: using 3/50 of its possible Azure Monitor resources.
8181
* Workspace 2 connects to AMPLS A and AMPLS B: using 2/5 of its possible AMPLS connections.
8282

8383
![Diagram of AMPLS limits](./media/private-link-security/ampls-limits.png)
@@ -158,11 +158,24 @@ First, you can connect this Log Analytics resource to any Azure Monitor Private
158158
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
159159
If you set **Allow public network access for ingestion** to **No**, then machines outside of the connected scopes cannot upload data to this workspace. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Experiences running outside the Azure portal, and that query Log Analytics data also have to be running within the private-linked VNET.
160160

161-
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. Restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
161+
Restricting access in this manner does not apply to the Azure Resource Manager (ARM) and therefore has the following limitations:
162+
* Access to data - while blocking queries from public networks applies to most Log Analytics experiences, some experiences query data through ARM and won't be able to query data unless Private Link settings are applied to ARM as well (feature coming up soon). This includes, for example, Azure Monitor solutions, workbooks and Insights, and the LogicApp connector.
163+
* Workspace management - Workspace setting and configuration changes (including turning these access settings on or off) are managed by ARM. Restrict access to workspace management using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
162164

163165
> [!NOTE]
164166
> Logs and metrics uploaded to a workspace via [Diagnostic Settings](diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
165167
168+
### Log Analytics solution packs download
169+
170+
To allow the Log Analytics Agent to download solution packs, add the appropriate fully qualified domain names to your firewall allow list.
171+
172+
173+
| Cloud environment | Agent Resource | Ports | Direction |
174+
|:--|:--|:--|:--|
175+
|Azure Public | scadvisorcontent.blob.core.windows.net | 443 | Outbound
176+
|Azure Government | usbn1oicore.blob.core.usgovcloudapi.net | 443 | Outbound
177+
|Azure China 21Vianet | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
178+
166179
## Configure Application Insights
167180

168181
Go to the Azure portal. In your Azure Monitor Application Insights component resource is a menu item **Network Isolation** on the left-hand side. You can control two different states from this menu.
@@ -231,17 +244,6 @@ Adding these tags allows you to perform actions such as querying log data, creat
231244

232245
Bundle the JavaScript code in your script so that the browser does not attempt to download code from a CDN. An example is provided on [GitHub](https://github.com/microsoft/ApplicationInsights-JS#npm-setup-ignore-if-using-snippet-setup)
233246

234-
### Log Analytics solution download
235-
236-
To allow the Log Analytics Agent to download solution packs, add the appropriate fully qualified domain names to your firewall allow list.
237-
238-
239-
| Cloud environment | Agent Resource | Ports | Direction |
240-
|:--|:--|:--|:--|
241-
|Azure Public | scadvisorcontent.blob.core.windows.net | 443 | Outbound
242-
|Azure Government | usbn1oicore.blob.core.usgovcloudapi.net | 443 | Outbound
243-
|Azure China 21Vianet | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
244-
245247
### Browser DNS settings
246248

247249
If you're connecting to your Azure Monitor resources over a Private Link, traffic to these resource must go through the private endpoint that is configured on your network. To enable the private endpoint, update your DNS settings as explained in [Connect to a private endpoint](#connect-to-a-private-endpoint). Some browsers use their own DNS settings instead of the ones you set. The browser might attempt to connect to Azure Monitor public endpoints and bypass the Private Link entirely. Verify that your browsers settings don't override or cache old DNS settings.

0 commit comments

Comments
 (0)