You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/remote-write-prometheus.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -60,27 +60,33 @@ To send data to your Azure Monitor Workspace, you will need the following inform
60
60
1. Select Managed Identity, and then choose Select members. Select the subscription that contains the user-assigned identity, and then select User-assigned managed identity. Select the user-assigned identity that you want to use, and then choose Select.
61
61
1. To complete the role assignment, select **Review + assign**.
62
62
63
-
1. Give the AKS cluster or the resource access to the managed identity. This step isn't required if you're using an AKS or VM identity. An AKS or VM identity already has access to the cluster/VM.
63
+
1. Give the AKS cluster or the resource access to the managed identity. This step isn't required if you're using an AKS agentpool user assigned managed identity or VM system assigned identity. An AKS agentpool user assigned managed identity or VM identity already has access to the cluster/VM.
64
64
65
65
> [!IMPORTANT]
66
-
> To complete the steps in this section, you must have owner or user access administrator permissions for the cluster.
66
+
> To complete the steps in this section, you must have owner or user access administrator permissions for the cluster/resource.
67
67
68
-
- Identify the virtual machine or virtual machine scale sets in the [node resource group](#get-the-name-of-the-aks-node-resource-group) for your AKS cluster.
68
+
#### For AKS: Give the AKS cluster access to the managed identity
69
69
70
-
:::image type="content" source="../containers/media/prometheus-remote-write-managed-identity/resource-group-details-virtual-machine-scale-sets.png" alt-text="Screenshot that shows virtual machine scale sets in the node resource group." lightbox="media/prometheus-remote-write-managed-identity/resource-group-details-virtual-machine-scale-sets.png":::
70
+
- Identify the virtual machine scale sets in the node resource group for your AKS cluster. The node resource group of the AKS cluster contains resources that you use in other steps in this process. This resource group has the name MC_<AKS-RESOURCE-GROUP>_<AKS-CLUSTER-NAME>_<REGION>. You can find the resource group name by using the Resource groups menu in the Azure portal.
71
+
72
+
:::image type="content" source="../containers/media/prometheus-remote-write-managed-identity/resource-group-details-virtual-machine-scale-sets.png" alt-text="Screenshot that shows virtual machine scale sets in the node resource group." lightbox="../containers/media/prometheus-remote-write-managed-identity/resource-group-details-virtual-machine-scale-sets.png":::
71
73
72
74
- For each virtual machine scale set, run the following command in the Azure CLI:
73
75
74
76
```azurecli
75
77
az vmss identity assign -g <AKS-NODE-RESOURCE-GROUP> -n <AKS-VMSS-NAME> --identities <USER-ASSIGNED-IDENTITY-RESOURCE-ID>
76
78
```
77
79
80
+
#### For VM: Give the VM access to the managed identity
81
+
78
82
- For virtual machine, run the following command in the Azure CLI:
79
83
80
84
```azurecli
81
85
az vm identity assign -g <VM-RESOURCE-GROUP> -n <VM-NAME> --identities <USER-ASSIGNED-IDENTITY-RESOURCE-ID>
82
86
```
83
87
88
+
If you are using other Azure resource types, please refer public documentation for the Azure resource type to assign managed identity similar to steps mentioned above for VMs/VMSS.
89
+
84
90
### Azure Entra application
85
91
86
92
The process to set up Prometheus remote write for an application by using Microsoft Entra authentication involves completing the following tasks:
0 commit comments