Skip to content

Commit 0c8d74b

Browse files
Merge pull request #282012 from EdB-MSFT/system-assigned-identities-not-supported
added note on sytem-managed identity
2 parents c9ca955 + fcdcea0 commit 0c8d74b

File tree

1 file changed

+5
-2
lines changed

1 file changed

+5
-2
lines changed

articles/azure-monitor/essentials/prometheus-remote-write-virtual-machines.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ author: EdB-MSFT
55
ms.author: edbaynash
66
ms.topic: conceptual
77
ms.custom: devx-track-azurecli
8-
ms.date: 06/20/2024
8+
ms.date: 07/28/2024
99
#customer intent: As an azure administrator, I want to send Prometheus metrics from my self-managed Prometheus instance to an Azure Monitor workspace.
1010
---
1111

@@ -38,6 +38,9 @@ If you have virtual machines, or a Kubernetes cluster in non-Azure environments,
3838

3939
Onboarding to Azure Arc-enabled services allows you to manage and configure non-Azure virtual machines in Azure. Once onboarded, configure [Remote-write using user-assigned managed identity](#remote-write-using-user-assigned-managed-identity-authentication) authentication. For more Information on onboarding Virtual Machines to Azure Arc-enabled servers, see [Azure Arc-enabled servers](/azure/azure-arc/servers/overview) and [Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/overview).
4040

41+
> [!NOTE]
42+
> System-assigned managed identity is not supported for remote-write to Azure Monitor workspaces. Use user-assigned managed identity or Microsoft Entra ID application authentication.
43+
4144

4245
## Prerequisites
4346

@@ -123,7 +126,7 @@ For each Virtual Machine Scale Set in the resource group, assign the managed ide
123126
### [Microsoft Entra ID application](#tab/entra-application)
124127
### Remote-write using Microsoft Entra ID application authentication
125128

126-
Microsoft Entra ID application authentication can be used in any environment. If your Prometheus service is running in an Azure-managed environment consider using user-assigned managed identity authentication.
129+
Microsoft Entra ID application authentication can be used in any environment. If your Prometheus service is running in an Azure-managed environment, consider using user-assigned managed identity authentication.
127130

128131
To configure remote-write to Azure Monitor workspace using a Microsoft Entra ID application, create an Entra application. On Azure Monitor workspace's data collection rule, assign the `Monitoring Metrics Publisher` role to the Entra application.
129132

0 commit comments

Comments
 (0)