Skip to content

Commit 1d6415a

Browse files
authored
Merge pull request #273202 from akarshprabhu/main
Removing private end point documentation
2 parents d277c0a + 1418d69 commit 1d6415a

File tree

2 files changed

+2
-123
lines changed

2 files changed

+2
-123
lines changed

articles/sap/monitor/provider-ha-pacemaker-cluster.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ For SUSE-based Pacemaker clusters, Please follow below steps to install in each
4545
sudo systemctl enable prometheus-ha_cluster_exporter
4646
```
4747

48-
1. Data is then collected in the system by ha_cluster_exporter. You can export the data via URL `http://<ip address of the server>:9644/metrics`.
48+
1. Data is then collected in the system by ha_cluster_exporter. You can export the data via URL `http://<ip address of the server>:9664/metrics`.
4949
To check if the metrics are fetched via URL on the server where the ha_cluster_exporter is installed, Run below command on the server.
5050

5151
```bash
52-
curl http://localhost:9644/metrics
52+
curl http://localhost:9664/metrics
5353
```
5454

5555
For RHEL-based clusters, install **performance co-pilot (PCP)** and the **pcp-pmda-hacluster** subpackage in each node. For more information, see the [PCP HACLUSTER agent installation guide](https://access.redhat.com/articles/6139852). Supported RHEL versions include 8.2, 8.4, and later versions.

articles/sap/monitor/set-up-network.md

Lines changed: 0 additions & 121 deletions
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,6 @@ There are multiple methods to address restricted or blocked outbound internet ac
4545

4646
- [Use the Route All feature in Azure Functions](#use-route-all)
4747
- [Use service tags with an NSG in your virtual network](#use-service-tags)
48-
- [Use a private endpoint for your subnet](#use-a-private-endpoint)
4948

5049
### Use Route All
5150

@@ -101,126 +100,6 @@ The Azure Monitor for SAP solution's subnet IP address refers to the IP of the s
101100

102101
For the rules that you create, **allow_vnet** must have a lower priority than **deny_internet**. All other rules also need to have a lower priority than **allow_vnet**. The remaining order of these other rules is interchangeable.
103102

104-
### Use a private endpoint
105-
106-
You can enable a private endpoint by creating a new subnet in the same virtual network as the system that you want to monitor. No other resources can use this subnet. It's not possible to use the same subnet as Azure Functions for your private endpoint.
107-
108-
To create a private endpoint for Azure Monitor for SAP solutions:
109-
110-
1. Create an Azure Private DNS zone to contain the private endpoint records. Follow the steps in [Create a private DNS zone](../../dns/private-dns-getstarted-portal.md) to create a private DNS zone. Make sure to link the private DNS zone to the virtual networks that contain your SAP system and Azure Monitor for SAP solutions resources.
111-
112-
> [!div class="mx-imgBorder"]
113-
> ![Screenshot that shows adding a virtual network link to a private DNS zone.]([../../media/set-up-network/dns-add-private-link.png)
114-
115-
1. Create a subnet in the virtual network that will be used for the private endpoint. Note the subnet ID and private IP address for these subnets.
116-
1. To find the resources in the Azure portal, go to your Azure Monitor for SAP solutions resource.
117-
1. On the **Overview** page for the Azure Monitor for SAP solutions resource, select the **Managed resource group**.
118-
119-
#### Create a key vault endpoint
120-
121-
Follow the steps in [Create a private endpoint for Azure Key Vault](../../key-vault/general/private-link-service.md) to configure the endpoint and test the connectivity to a key vault.
122-
123-
#### Create a storage endpoint
124-
125-
It's necessary to create a separate private endpoint for each Azure Storage account resource, including the queue, table, storage blob, and file. If you create a private endpoint for the storage queue, it's not possible to access the resource from systems outside the virtual networking, including the Azure portal. Other resources in the same storage account are accessible.
126-
127-
Repeat the following process for each type of storage subresource (table, queue, blob, and file):
128-
129-
1. On the storage account's menu, under **Settings**, select **Networking**.
130-
1. Select the **Private endpoint connections** tab.
131-
1. Select **Create** to open the endpoint creation page.
132-
1. On the **Basics** tab, enter or select all required information.
133-
1. On the **Resource** tab, enter or select all required information. For the **Target sub-resource**, select one of the subresource types (table, queue, blob, or file).
134-
1. On the **Virtual Network** tab, select the virtual network and the subnet that you created specifically for the endpoint. It's not possible to use the same subnet as the Azure Functions app.
135-
136-
> [!div class="mx-imgBorder"]
137-
> ![Screenshot that shows creating a private endpoint on the Virtual Network tab.]([../../media/set-up-network/private-endpoint-vnet-step.png)
138-
139-
1. On the **DNS** tab, for **Integrate with private DNS zone**, select **Yes**.
140-
1. On the **Tags** tab, add tags if necessary.
141-
1. Select **Review + create** to create the private endpoint.
142-
1. After the deployment is complete, go back to your storage account. On the **Networking** page, select the **Firewalls and virtual networks** tab.
143-
1. For **Public network access**, select **Enable from all networks**.
144-
1. Select **Apply** to save the changes.
145-
1. Make sure to create private endpoints for all storage subresources (table, queue, blob, and file).
146-
147-
#### Create a Log Analytics endpoint
148-
149-
It's not possible to create a private endpoint directly for a Log Analytics workspace. To enable a private endpoint for this resource, connect the resource to an [Azure Monitor Private Link Scope (AMPLS)](../../azure-monitor/logs/private-link-security.md). Then, you can create a private endpoint for the AMPLS resource.
150-
151-
If possible, create the private endpoint before you allow any system to access the Log Analytics workspace through a public endpoint. Otherwise, you must restart the function app before you can access the Log Analytics workspace through the private endpoint.
152-
153-
Select a scope for the private endpoint:
154-
155-
1. Go to the Log Analytics workspace in the Azure portal.
156-
1. In the resource menu, under **Settings**, select **Network isolation**.
157-
1. Select **Add** to create a new AMPLS setting.
158-
1. Select the appropriate scope for the endpoint. Then select **Apply**.
159-
160-
Create the private endpoint:
161-
162-
1. Go to the AMPLS resource in the Azure portal.
163-
1. On the resource menu, under **Configure**, select **Private Endpoint connections**.
164-
1. Select **Private Endpoint** to create a new endpoint.
165-
1. On the **Basics** tab, enter or select all required information.
166-
1. On the **Resource** tab, enter or select all required information.
167-
1. On the **Virtual Network** tab, select the virtual network and the subnet that you created specifically for the endpoint. It's not possible to use the same subnet as the function app.
168-
1. On the **DNS** tab, for **Integrate with private DNS zone**, select **Yes**. If necessary, add tags.
169-
1. Select **Review + create** to create the private endpoint.
170-
171-
Configure the scope:
172-
173-
1. Go to the Log Analytics workspace in the Azure portal.
174-
1. On the resource's menu, under **Settings**, select **Network Isolation**.
175-
1. Under **Virtual networks access configuration**:
176-
1. Set **Accept data ingestion from public networks not connected through a Private Link Scope** to **No**. This setting disables data ingestion from any system outside the virtual network.
177-
1. Set **Accept queries from public networks not connected through a Private Link Scope** to **Yes**. This setting allows workbooks to display data.
178-
1. Select **Save**.
179-
180-
If you enable a private endpoint after any system accessed the Log Analytics workspace through a public endpoint, restart the function app before you move forward. Otherwise, you can't access the Log Analytics workspace through the private endpoint.
181-
182-
1. Go to the Azure Monitor for SAP solutions resource in the Azure portal.
183-
1. On the **Overview** page, select the name of the **Managed resource group**.
184-
1. On the managed resource group's page, select the function app.
185-
1. On the function app's **Overview** page, select **Restart**.
186-
187-
Find and note important IP address ranges:
188-
189-
1. Find the Azure Monitor for SAP solutions resource's IP address range.
190-
1. Go to the Azure Monitor for SAP solutions resource in the Azure portal.
191-
1. On the resource's **Overview** page, select the **vNet/subnet** to go to the virtual network.
192-
1. Note the IPv4 address range, which belongs to the source system.
193-
1. Find the IP address range for the key vault and storage account.
194-
1. Go to the resource group that contains the Azure Monitor for SAP solutions resource in the Azure portal.
195-
1. On the **Overview** page, note the **Private endpoint** in the resource group.
196-
1. On the resource group's menu, under **Settings**, select **DNS configuration**.
197-
1. On the **DNS configuration** page, note the **IP addresses** for the private endpoint.
198-
1. Find the subnet for the Log Analytics private endpoint.
199-
1. Go to the private endpoint created for the AMPLS resource.
200-
1. On the private endpoint's menu, under **Settings**, select **DNS configuration**.
201-
1. On the **DNS configuration** page, note the associated IP addresses.
202-
1. Go to the Azure Monitor for SAP solutions resource in the Azure portal.
203-
1. On the **Overview** page, select the **vNet/subnet** to go to that resource.
204-
1. On the virtual network page, select the subnet that you used to create the Azure Monitor for SAP solutions resource.
205-
206-
Add outbound security rules:
207-
208-
1. Go to the NSG resource in the Azure portal.
209-
1. On the NSG menu, under **Settings**, select **Outbound security rules**.
210-
1. Add the following required security rules.
211-
212-
| Priority | Description |
213-
| -------- | ------------- |
214-
| 550 | Allow the source IP for making calls to a source system to be monitored. |
215-
| 600 | Allow the source IP for making calls to an Azure Resource Manager service tag. |
216-
| 650 | Allow the source IP to access the key vault resource by using a private endpoint IP. |
217-
| 700 | Allow the source IP to access storage account resources by using a private endpoint IP. (Include IPs for each of the storage account subresources: table, queue, file, and blob.) |
218-
| 800 | Allow the source IP to access a Log Analytics workspace resource by using a private endpoint IP. |
219-
220-
### DNS configuration for private endpoints
221-
222-
After you create the private endpoints, you need to configure DNS to resolve the private endpoint IP addresses. You can use either Azure Private DNS or custom DNS servers. For more information, see [Configure DNS for private endpoints](../../private-link/private-endpoint-dns.md).
223-
224103
## Next steps
225104

226105
- [Quickstart: Set up Azure Monitor for SAP solutions through the Azure portal](quickstart-portal.md)

0 commit comments

Comments
 (0)