You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-authentication.md
+16-9Lines changed: 16 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -2,14 +2,17 @@
2
2
title: Configure agent authentication for the Container Insights agent | Microsoft Docs
3
3
description: This article describes how to configure authentication for the containerized agent used by Container insights.
4
4
ms.topic: conceptual
5
-
ms.date: 06/13/2023
6
-
ms.reviewer: damendo
5
+
ms.date: 07/31/2023
6
+
ms.reviewer: aul
7
7
---
8
8
9
9
# Authentication for Container Insights
10
10
11
11
Container Insights now defaults to managed identity authentication. This secure and simplified authentication model has a monitoring agent that uses the cluster's managed identity to send data to Azure Monitor. It replaces the existing legacy certificate-based local authentication and removes the requirement of adding a Monitoring Metrics Publisher role to the cluster.
12
12
13
+
> [!Note]
14
+
> [ContainerLogV2](container-insights-logging-v2.md) will be default schema for customers who will be onboarding container insights with Managed Identity Auth using ARM, Bicep, Terraform, Policy and Portal onboarding. ContainerLogV2 can be explicitly enabled through CLI version 2.51.0 or higher using Data collection settings.
15
+
13
16
## How to enable
14
17
15
18
Click on the relevant tab for instructions to enable Managed identity authentication on your clusters.
@@ -28,14 +31,14 @@ If you don't see the *Use managed identity* option, you are using an SPN cluster
28
31
29
32
## [Azure CLI](#tab/cli)
30
33
31
-
See [Migrate to managed identity authentication](https://learn.microsoft.com/azure/azure-monitor/containers/container-insights-enable-aks?tabs=azure-cli#migrate-to-managed-identity-authentication)
34
+
See [Migrate to managed identity authentication](container-insights-enable-aks.md?tabs=azure-cli#migrate-to-managed-identity-authentication)
-**workspaceResourceId**: Use the resource ID of your Log Analytics workspace.
56
59
-**workspaceRegion**: Use the location of your Log Analytics workspace.
57
60
-**resourceTagValues**: Match the existing tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name will match `MSCI-<clusterName>-<clusterRegion>` and this resource is created in the same resource group as the AKS clusters. For first time onboarding, you can set the arbitrary tag values.
58
-
- Other parameters are for cost optimization, refer to [this guide](https://learn.microsoft.com/azure/azure-monitor/containers/container-insights-cost-config?tabs=create-CLI#data-collection-parameters)
61
+
-**enabledContainerLogV2**: Set this parameter value to be true to use the default recommended ContainerLogV2 schema
62
+
- Other parameters are for cost optimization, refer to [this guide](container-insights-cost-config.md?tabs=create-CLI#data-collection-parameters)
59
63
60
64
3. Onboard with the following commands:
61
65
@@ -81,6 +85,7 @@ az deployment group create --resource-group <ClusterResourceGroupName> --templat
81
85
-**workspaceResourceId**: Use the resource ID of your Log Analytics workspace.
82
86
-**workspaceRegion**: Use the location of your Log Analytics workspace.
83
87
-**resourceTagValues**: Match the existing tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name match `MSCI-<clusterName>-<clusterRegion>` and this resource is created in the same resource group as the AKS clusters. For first time onboarding, you can set the arbitrary tag values.
88
+
--**enabledContainerLogV2**: Set this parameter value to be true to use the default recommended ContainerLogV2
84
89
85
90
3. Onboarding with the following commands:
86
91
@@ -91,7 +96,7 @@ az deployment group create --resource-group <ClusterResourceGroupName> --templat
91
96
```
92
97
93
98
For new AKS cluster:
94
-
Replace and use the managed cluster resources in this [guide](https://learn.microsoft.com/azure/aks/learn/quick-kubernetes-deploy-bicep?tabs=azure-cli)
99
+
Replace and use the managed cluster resources in this [guide](../../aks/learn/quick-kubernetes-deploy-bicep.md?tabs=azure-cli)
-**workspace_resource_id**: Use the resource ID of your Log Analytics workspace.
109
114
-**workspace_region**: Use the location of your Log Analytics workspace.
110
115
-**resource_tag_values**: Match the existing tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name match `MSCI-<clusterName>-<clusterRegion>` and this resource is created in the same resource group as the AKS clusters. For first time onboarding, you can set the arbitrary tag values.
111
-
- Other parameters are for cluster settings or cost optimization, refer to [this guide](https://learn.microsoft.com/azure/azure-monitor/containers/container-insights-cost-config?tabs=create-CLI#data-collection-parameters)
116
+
--**enabledContainerLogV2**: Set this parameter value to be true to use the default recommended ContainerLogV2
117
+
- Other parameters are for cluster settings or cost optimization, refer to [this guide](container-insights-cost-config.md?tabs=create-CLI#data-collection-parameters)
112
118
4. Run `terraform init -upgrade` to initialize the Terraform deployment.
113
119
5. Run `terraform plan -out main.tfplan` to initialize the Terraform deployment.
114
120
6. Run `terraform apply main.tfplan` to apply the execution plan to your cloud infrastructure.
-**workspace_resource_id**: Use the resource ID of your Log Analytics workspace.
125
131
-**workspace_region**: Use the location of your Log Analytics workspace.
126
132
-**resource_tag_values**: Match the existing tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name match `MSCI-<clusterName>-<clusterRegion>` and this resource is created in the same resource group as the AKS clusters. For first time onboarding, you can set the arbitrary tag values.
133
+
- Other parameters are for cluster settings, refer [to guide](container-insights-cost-config.md?tabs=create-CLI#data-collection-parameters)
127
134
4. Run `terraform init -upgrade` to initialize the Terraform deployment.
128
135
5. Run `terraform plan -out main.tfplan` to initialize the Terraform deployment.
129
136
6. Run `terraform apply main.tfplan` to apply the execution plan to your cloud infrastructure.
1. Ingestion Transformations are not supported: See [Data collection transformation](https://learn.microsoft.com/azure/azure-monitor/essentials/data-collection-transformations) to read more.
189
+
1. Ingestion Transformations are not supported: See [Data collection transformation](../essentials/data-collection-transformations.md) to read more.
183
190
2. Dependency on DCR/DCRA for region availability - For new AKS region, there might be chances that DCR is still not supported in the new region. In that case, onboarding Container Insights with MSI will fail. One workaround is to onboard to Container Insights through CLI with the old way (with the use of Container Insights solution)
0 commit comments