Skip to content

Commit 191cc4f

Browse files
committed
fixed various errors
1 parent 810ae73 commit 191cc4f

File tree

3 files changed

+28
-26
lines changed

3 files changed

+28
-26
lines changed

articles/azure-monitor/platform/private-link-security.md

Lines changed: 14 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -10,15 +10,15 @@ ms.subservice:
1010

1111
# Use Azure Private Link to securely connect networks to Azure Monitor
1212

13-
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure PaaS services to your virtual network using private endpoints. For many services, you just set up an endpoint per resource. However, Azure Monitor is a constellation of different interconnected services that work together to monitor your workloads. As a result, we have built a resource called an Azure Monitor Private Link Scope (AMPLS) that allows you to define the boundaries of your monitoring network and connect to your virtual network. This article will cover why to use and how to set up an Azure Monitor Private Link Scope.
13+
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure PaaS services to your virtual network using private endpoints. For many services, you just set up an endpoint per resource. However, Azure Monitor is a constellation of different interconnected services that work together to monitor your workloads. As a result, we have built a resource called an Azure Monitor Private Link Scope (AMPLS) that allows you to define the boundaries of your monitoring network and connect to your virtual network. This article covers when to use and how to set up an Azure Monitor Private Link Scope.
1414

1515
## Advantages of Private Link with Azure Monitor
1616

1717
With Private Link you can:
1818

1919
- Connect privately to Azure Monitor without opening up any public network access
2020
- Ensure your monitoring data is only accessed through authorized private networks
21-
- Prevent data exfiltration from your private networks by defining specific Azure Monitor resources connect thru your private endpoint
21+
- Prevent data exfiltration from your private networks by defining specific Azure Monitor resources connect through your private endpoint
2222
- Securely connect your private on-premises network to Azure Monitor using ExpressRoute and Private Link
2323
- Keep all traffic inside the Microsoft Azure backbone network
2424

@@ -35,11 +35,11 @@ Azure Monitor Private Link Scope is a grouping resource to connect one or more p
3535
3636
## Planning AMPLS based on your network needs
3737

38-
Before setting up your AMPLS resources, consider your network isolation requirements, by evaluating your virtual networks' access to public internet, and access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
38+
Before setting up your AMPLS resources, consider your network isolation requirements. Evaluate your virtual networks' access to public internet, and the access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
3939

4040
### Evaluate which Virtual Networks should connect to a Private Link
4141

42-
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet will need connect to these resources over a Private Link, and through an AMPLS.
42+
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet needs connect to these resources over a Private Link, and through an AMPLS.
4343

4444
### Evaluate which Azure Monitor resources should have a Private Link
4545

@@ -53,7 +53,7 @@ Remember – you can connect the same workspaces or application to multiple AMPL
5353

5454
### Group together Monitoring resources by network accessibility
5555

56-
Since each VNet can connect to only one AMPLS resource, you must group together monitoring resources that should be accessible to the same networks. The simplest way to manage this is to create one AMPLS per VNet, and select the resources to connect to that network. However, to reduce resources and improve manageability, you may want to reuse an AMPLS across network.
56+
Since each VNet can connect to only one AMPLS resource, you must group together monitoring resources that should be accessible to the same networks. The simplest way to manage this grouping is to create one AMPLS per VNet, and select the resources to connect to that network. However, to reduce resources and improve manageability, you may want to reuse an AMPLS across networks.
5757

5858
For example, if your internal virtual networks VNet1 and VNet2 should connect to workspaces Workspace1 and Workspace2 and Application Insights component Application Insights 3, associate all three resources to the same AMPLS. If VNet3 should only access Workspace1, create another AMPLS resource, associate Workspace1 to it, and connect VNet3 as shown in the following diagrams:
5959

@@ -74,21 +74,22 @@ Let's start by creating an Azure Monitor Private Link Scope resource.
7474

7575
## Connecting Azure Monitor resources
7676

77-
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process will go faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
77+
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process goes faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
7878

7979
1. In your Azure Monitor Private Link scope, click on **Azure Monitor Resources** in the left-hand menu. Click the **Add** button.
8080
2. Add the workspace or component. Clicking the Add button brings up a dialog where you can select Azure Monitor resources. You can browse through your subscriptions and resource groups, or you can type in their name to filter down to them. Select the workspace or component and click **Apply** to add them to your scope.
8181

8282
![Screenshot of select a scope UX](./media/private-link-security/2-ampls-select.png)
8383

84-
Connecting to a Private Endpoint
84+
### Connecting to a Private Endpoint
85+
8586
Now that we have resources connected to our AMPLS, let's create a private endpoint to connect our network. You can do this in the Private Link center [link to go here], or inside your Azure Monitor Private Link Scope, as done in this example.
8687

8788
1. In your scope resource, click on **Private Endpoint connections** in the left hand resource menu Click on **Private Endpoint** to start the endpoint create process. You can also approve connections that were started in the Private Link center here by selecting them and clicking **Approve**.
8889

8990
![Screenshot of Private Endpoint Connections UX](./media/private-link-security/3-ampls-select-pe-connect.png)
9091

91-
2. Pick the subscription, resource group, and name of the endpoint, and the region it will live in. This needs to be the same region as the virtual network you will connect it to.
92+
2. Pick the subscription, resource group, and name of the endpoint, and the region it should live in. This needs to be the same region as the virtual network you will connect it to.
9293

9394
3. Click **Next : Resource**.
9495

@@ -164,9 +165,7 @@ Storage accounts are used in the ingestion process of several data types of logs
164165
- Service fabric
165166
- ASC Watson dump files
166167

167-
**---------- TODO Internal link. ------------- ----**
168-
169-
[To learn more, see Ingestion from customer storage – Bring your own storage (BYOS)](https://microsoft-my.sharepoint.com/:w:/p/noakuper/EaLomLpNFA9GrWFbTGN_Jm0Bgw779xCC-Ww03hN9T0V4fQ?e=HVj1hH)
168+
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
170169

171170
## Restrictions and Limitations with Azure Monitor Private Link
172171

@@ -176,21 +175,20 @@ Use Agent version >= 18.20.18038.0
176175

177176
### Log Analytics Linux Agent
178177

179-
Use Agent version >= 1.12.25.
180-
If they cannot, do below on the VM
178+
Use Agent version >= 1.12.25. If you cannot, run the following commands on your VM.
181179

182180
```cmd
183181
$ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -X
184182
$ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -w <workspace id> -s <workspace key>
185183
```
186184

187-
### ARM Queries
185+
### Azure Resource Manager queries
188186

189-
Experience that query the ARM API will not work unless you add the Service Tag **AzureResourceManager** to your firewall
187+
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
190188

191189
### AI SDK Downloads from CDN
192190

193-
Customers should bundle the JavaScript code in their script, so that the browser does not reach out to CDN to download the code.
191+
You should bundle the JavaScript code in your script, so that the browser does not attempt to download code from a CDN.
194192
An example is provided on [GitHub](https://github.com/microsoft/ApplicationInsights-JS#npm-setup-ignore-if-using-snippet-setup)
195193

196194
### LA Solution download

articles/azure-monitor/platform/private-link-storage.md renamed to articles/azure-monitor/platform/private-storage.md

Lines changed: 12 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -12,20 +12,22 @@ ms.date: 05/20/2020
1212
# Customer-owned storage accounts for log ingestion in Azure Monitor
1313
Storage accounts are used by Azure Monitor in the ingestion process of some data types such as [custom logs](data-sources-custom-logs.md) and some [Azure logs](azure-storage-iis-table.md). During the ingestion process, logs are first sent to a storage account and later ingested into Log Analytics or Application Insights. Customers that want control over their data during ingestion can use their own storage accounts instead of the service-managed storage. The use of customer storage account provides customers control over the access, content, encryption, and retention of the logs during ingestion. We refer to this as Bring Your Own Storage, or BYOS.
1414

15-
One scenario that requires this feature is network isolation through Private Links. When using a VNet, network isolation is often a requirement, and access to the public internet is limited. In such cases, accessing Azure Monitor service storage for log ingestion is either completely blocked, or simply considered a bad practice. Logs should instead be ingested through a customer-owned storage account inside the VNet or easily accessible from it.
15+
One scenario that requires this feature is network isolation through Private Links. When using a VNet, network isolation is often a requirement, and access to the public internet is limited. In such cases, accessing Azure Monitor service storage for log ingestion is either completely blocked, or considered a bad practice. Instead, Logs should be ingested through a customer-owned storage account inside the VNet or easily accessible from it.
1616

17-
Another scenario is the encryption of logs with Customer Managed Keys (CMK). Customers can encrypt logged data by using CMK on the clusters that store the logs. The same key can also be used to encrypt logs during the ingestion process.
17+
Another scenario is the encryption of logs with Customer-Managed Keys (CMK). Customers can encrypt logged data by using CMK on the clusters that store the logs. The same key can also be used to encrypt logs during the ingestion process.
1818

1919
## Data types supported
2020
Data types that are ingested from a storage account include the following. See [Collect data from Azure diagnostics extension to Azure Monitor Logs](azure-storage-iis-table.md) for more information about the ingestion of these types.
2121

22-
- IIS logs (Blob: wad-iis-logfiles)
23-
- Windows event logs (Table: WADWindowsEventLogsTable)
24-
- Syslog (Table: LinuxsyslogVer2v0)
25-
- Windows ETW logs (Table: WADETWEventTable)
26-
- Service fabric (Table: WADServiceFabricSystemEventTable, WADServiceFabricReliableActorEventTable, WADServiceFabricReliableServiceEventTable)
27-
- Custom logs
28-
- Azure Security Center Watson dump files
22+
| Type | Table information |
23+
|:-----|:------------------|
24+
| IIS logs | Blob: wad-iis-logfiles|
25+
|Windows event logs | Table: WADWindowsEventLogsTable |
26+
| Syslog | Table: LinuxsyslogVer2v0 |
27+
| Windows ETW logs | Table: WADETWEventTable|
28+
| Service fabric | Table: WADServiceFabricSystemEventTable <br/> WADServiceFabricReliableActorEventTable<br/> WADServiceFabricReliableServicEventTable |
29+
| Custom logs | n/a |
30+
| Azure Security Center Watson dump files | n/a|
2931

3032
## Storage account requirements
3133
The storage account must meet the following requirements:
@@ -210,7 +212,7 @@ Agent configuration will be refreshed after a few minutes, and they will switch
210212
## Manage storage account
211213

212214
### Load
213-
Storage accounts can handle a certain load of read and write requests before they start throttling requests. Throttling affects the time it takes to ingest logs and may results in lost data. If your storage is overloaded, register additional storage accounts and spread the load between them.
215+
Storage accounts can handle a certain load of read and write requests before they start throttling requests. Throttling affects the time it takes to ingest logs and may result in lost data. If your storage is overloaded, register additional storage accounts and spread the load between them.
214216

215217
### Related charges
216218
Storage accounts are charged by the volume of stored data, types of storage, and type of redundancy. For details see [Block blob pricing](https://azure.microsoft.com/pricing/details/storage/blobs/) and [Table Storage pricing](https://azure.microsoft.com/pricing/details/storage/tables/).

articles/azure-monitor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -100,6 +100,8 @@
100100
href: platform/customer-managed-keys.md
101101
- name: Private Link networking
102102
href: platform/private-link-security.md
103+
- name: Private storage
104+
href: platform/private-stroage.md
103105
- name: Personal log data handling
104106
href: platform/personal-data-mgmt.md
105107
- name: Application data collection, retention, and storage

0 commit comments

Comments
 (0)