You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/private-link-security.md
+14-16Lines changed: 14 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,15 +10,15 @@ ms.subservice:
10
10
11
11
# Use Azure Private Link to securely connect networks to Azure Monitor
12
12
13
-
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure PaaS services to your virtual network using private endpoints. For many services, you just set up an endpoint per resource. However, Azure Monitor is a constellation of different interconnected services that work together to monitor your workloads. As a result, we have built a resource called an Azure Monitor Private Link Scope (AMPLS) that allows you to define the boundaries of your monitoring network and connect to your virtual network. This article will cover why to use and how to set up an Azure Monitor Private Link Scope.
13
+
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure PaaS services to your virtual network using private endpoints. For many services, you just set up an endpoint per resource. However, Azure Monitor is a constellation of different interconnected services that work together to monitor your workloads. As a result, we have built a resource called an Azure Monitor Private Link Scope (AMPLS) that allows you to define the boundaries of your monitoring network and connect to your virtual network. This article covers when to use and how to set up an Azure Monitor Private Link Scope.
14
14
15
15
## Advantages of Private Link with Azure Monitor
16
16
17
17
With Private Link you can:
18
18
19
19
- Connect privately to Azure Monitor without opening up any public network access
20
20
- Ensure your monitoring data is only accessed through authorized private networks
21
-
- Prevent data exfiltration from your private networks by defining specific Azure Monitor resources connect thru your private endpoint
21
+
- Prevent data exfiltration from your private networks by defining specific Azure Monitor resources connect through your private endpoint
22
22
- Securely connect your private on-premises network to Azure Monitor using ExpressRoute and Private Link
23
23
- Keep all traffic inside the Microsoft Azure backbone network
24
24
@@ -35,11 +35,11 @@ Azure Monitor Private Link Scope is a grouping resource to connect one or more p
35
35
36
36
## Planning AMPLS based on your network needs
37
37
38
-
Before setting up your AMPLS resources, consider your network isolation requirements, by evaluating your virtual networks' access to public internet, and access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
38
+
Before setting up your AMPLS resources, consider your network isolation requirements. Evaluate your virtual networks' access to public internet, and the access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
39
39
40
40
### Evaluate which Virtual Networks should connect to a Private Link
41
41
42
-
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet will need connect to these resources over a Private Link, and through an AMPLS.
42
+
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet needs connect to these resources over a Private Link, and through an AMPLS.
43
43
44
44
### Evaluate which Azure Monitor resources should have a Private Link
45
45
@@ -53,7 +53,7 @@ Remember – you can connect the same workspaces or application to multiple AMPL
53
53
54
54
### Group together Monitoring resources by network accessibility
55
55
56
-
Since each VNet can connect to only one AMPLS resource, you must group together monitoring resources that should be accessible to the same networks. The simplest way to manage this is to create one AMPLS per VNet, and select the resources to connect to that network. However, to reduce resources and improve manageability, you may want to reuse an AMPLS across network.
56
+
Since each VNet can connect to only one AMPLS resource, you must group together monitoring resources that should be accessible to the same networks. The simplest way to manage this grouping is to create one AMPLS per VNet, and select the resources to connect to that network. However, to reduce resources and improve manageability, you may want to reuse an AMPLS across networks.
57
57
58
58
For example, if your internal virtual networks VNet1 and VNet2 should connect to workspaces Workspace1 and Workspace2 and Application Insights component Application Insights 3, associate all three resources to the same AMPLS. If VNet3 should only access Workspace1, create another AMPLS resource, associate Workspace1 to it, and connect VNet3 as shown in the following diagrams:
59
59
@@ -74,21 +74,22 @@ Let's start by creating an Azure Monitor Private Link Scope resource.
74
74
75
75
## Connecting Azure Monitor resources
76
76
77
-
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process will go faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
77
+
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process goes faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
78
78
79
79
1. In your Azure Monitor Private Link scope, click on **Azure Monitor Resources** in the left-hand menu. Click the **Add** button.
80
80
2. Add the workspace or component. Clicking the Add button brings up a dialog where you can select Azure Monitor resources. You can browse through your subscriptions and resource groups, or you can type in their name to filter down to them. Select the workspace or component and click **Apply** to add them to your scope.
81
81
82
82

83
83
84
-
Connecting to a Private Endpoint
84
+
### Connecting to a Private Endpoint
85
+
85
86
Now that we have resources connected to our AMPLS, let's create a private endpoint to connect our network. You can do this in the Private Link center [link to go here], or inside your Azure Monitor Private Link Scope, as done in this example.
86
87
87
88
1. In your scope resource, click on **Private Endpoint connections** in the left hand resource menu Click on **Private Endpoint** to start the endpoint create process. You can also approve connections that were started in the Private Link center here by selecting them and clicking **Approve**.
88
89
89
90

90
91
91
-
2. Pick the subscription, resource group, and name of the endpoint, and the region it will live in. This needs to be the same region as the virtual network you will connect it to.
92
+
2. Pick the subscription, resource group, and name of the endpoint, and the region it should live in. This needs to be the same region as the virtual network you will connect it to.
92
93
93
94
3. Click **Next : Resource**.
94
95
@@ -164,9 +165,7 @@ Storage accounts are used in the ingestion process of several data types of logs
164
165
- Service fabric
165
166
- ASC Watson dump files
166
167
167
-
**---------- TODO Internal link. ------------- ----**
168
-
169
-
[To learn more, see Ingestion from customer storage – Bring your own storage (BYOS)](https://microsoft-my.sharepoint.com/:w:/p/noakuper/EaLomLpNFA9GrWFbTGN_Jm0Bgw779xCC-Ww03hN9T0V4fQ?e=HVj1hH)
168
+
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
170
169
171
170
## Restrictions and Limitations with Azure Monitor Private Link
172
171
@@ -176,21 +175,20 @@ Use Agent version >= 18.20.18038.0
176
175
177
176
### Log Analytics Linux Agent
178
177
179
-
Use Agent version >= 1.12.25.
180
-
If they cannot, do below on the VM
178
+
Use Agent version >= 1.12.25. If you cannot, run the following commands on your VM.
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/private-storage.md
+12-10Lines changed: 12 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,20 +12,22 @@ ms.date: 05/20/2020
12
12
# Customer-owned storage accounts for log ingestion in Azure Monitor
13
13
Storage accounts are used by Azure Monitor in the ingestion process of some data types such as [custom logs](data-sources-custom-logs.md) and some [Azure logs](azure-storage-iis-table.md). During the ingestion process, logs are first sent to a storage account and later ingested into Log Analytics or Application Insights. Customers that want control over their data during ingestion can use their own storage accounts instead of the service-managed storage. The use of customer storage account provides customers control over the access, content, encryption, and retention of the logs during ingestion. We refer to this as Bring Your Own Storage, or BYOS.
14
14
15
-
One scenario that requires this feature is network isolation through Private Links. When using a VNet, network isolation is often a requirement, and access to the public internet is limited. In such cases, accessing Azure Monitor service storage for log ingestion is either completely blocked, or simply considered a bad practice. Logs should instead be ingested through a customer-owned storage account inside the VNet or easily accessible from it.
15
+
One scenario that requires this feature is network isolation through Private Links. When using a VNet, network isolation is often a requirement, and access to the public internet is limited. In such cases, accessing Azure Monitor service storage for log ingestion is either completely blocked, or considered a bad practice. Instead, Logs should be ingested through a customer-owned storage account inside the VNet or easily accessible from it.
16
16
17
-
Another scenario is the encryption of logs with CustomerManaged Keys (CMK). Customers can encrypt logged data by using CMK on the clusters that store the logs. The same key can also be used to encrypt logs during the ingestion process.
17
+
Another scenario is the encryption of logs with Customer-Managed Keys (CMK). Customers can encrypt logged data by using CMK on the clusters that store the logs. The same key can also be used to encrypt logs during the ingestion process.
18
18
19
19
## Data types supported
20
20
Data types that are ingested from a storage account include the following. See [Collect data from Azure diagnostics extension to Azure Monitor Logs](azure-storage-iis-table.md) for more information about the ingestion of these types.
21
21
22
-
- IIS logs (Blob: wad-iis-logfiles)
23
-
- Windows event logs (Table: WADWindowsEventLogsTable)
24
-
- Syslog (Table: LinuxsyslogVer2v0)
25
-
- Windows ETW logs (Table: WADETWEventTable)
26
-
- Service fabric (Table: WADServiceFabricSystemEventTable, WADServiceFabricReliableActorEventTable, WADServiceFabricReliableServiceEventTable)
| Service fabric | Table: WADServiceFabricSystemEventTable <br/> WADServiceFabricReliableActorEventTable<br/> WADServiceFabricReliableServicEventTable |
29
+
| Custom logs | n/a |
30
+
| Azure Security Center Watson dump files | n/a|
29
31
30
32
## Storage account requirements
31
33
The storage account must meet the following requirements:
@@ -210,7 +212,7 @@ Agent configuration will be refreshed after a few minutes, and they will switch
210
212
## Manage storage account
211
213
212
214
### Load
213
-
Storage accounts can handle a certain load of read and write requests before they start throttling requests. Throttling affects the time it takes to ingest logs and may results in lost data. If your storage is overloaded, register additional storage accounts and spread the load between them.
215
+
Storage accounts can handle a certain load of read and write requests before they start throttling requests. Throttling affects the time it takes to ingest logs and may result in lost data. If your storage is overloaded, register additional storage accounts and spread the load between them.
214
216
215
217
### Related charges
216
218
Storage accounts are charged by the volume of stored data, types of storage, and type of redundancy. For details see [Block blob pricing](https://azure.microsoft.com/pricing/details/storage/blobs/) and [Table Storage pricing](https://azure.microsoft.com/pricing/details/storage/tables/).
0 commit comments