You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-instance-apache-cassandra/jaeger.md
+23-16Lines changed: 23 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,27 +11,27 @@ ms.date: 12/08/2023
11
11
12
12
# Run Jaeger with Azure Managed Instance for Apache Cassandra
13
13
14
-
Jaeger, a distributed tracing platform for monitoring microservices, enables the fast identification of performance challenges and optimization. Through features, like tracing instrumentation and logging integration.
15
-
16
-
The article specifically details the use of the sample application HotROD and Jaeger alongside Azure Managed Instance for Apache Cassandra for efficient storage monitoring.
14
+
Jaeger is a distributed tracing platform for monitoring microservices. It enables the fast identification of performance challenges and optimization through features like tracing instrumentation and logging integration.
17
15
16
+
The article details the use of the sample application HotROD and Jaeger alongside Azure Managed Instance for Apache Cassandra for efficient storage monitoring.
18
17
19
18
## Prerequisites and setup
20
-
*[Create an Azure Managed Instance for Apache Cassandra cluster](create-cluster-cli.md).
21
-
*[Ensure Docker is installed](https://www.docker.com/get-started/).
22
19
20
+
*[Create an Azure Managed Instance for Apache Cassandra cluster](create-cluster-cli.md).
21
+
*[Ensure that Docker is installed](https://www.docker.com/get-started/).
23
22
24
23
## Use Jaeger with Azure Managed Instance for Apache Cassandra
24
+
25
25
1.[Download the Jaeger repository](https://github.com/jaegertracing/jaeger.git).
26
-
1.Navigate to the docker-compose folder `cd jaeger\docker-compose`.
27
-
1.Add your Azure Managed Instance Cassandra cluster credentials to the `jaeger-collector and jaeger-query`section within the `jaeger-docker-compose.yml` file:
26
+
1.Go to the *docker-compose* folder:`cd jaeger\docker-compose`.
27
+
1.In the *jaeger-docker-compose.yml* file, add your Azure Managed Instance for Apache Cassandra cluster credentials to the `jaeger-collector` and `jaeger-query`sections:
1. Additionally, add the environment variables to the `cassandra-schema and jaeger-collector`:`
34
+
1. Add the environment variables to the `cassandra-schema` and `jaeger-collector` sections:
35
35
36
36
```yml
37
37
environment:
@@ -41,7 +41,9 @@ The article specifically details the use of the sample application HotROD and Ja
41
41
- CQLSH_SSL=--ssl
42
42
...
43
43
```
44
-
1. To connect your Azure Managed Instance Cassandra cluster, add the Cassandra sign-in credentials to the `cassandra-schema`:
44
+
45
+
1. To connect your Azure Managed Instance Cassandra cluster, add the Cassandra sign-in credentials to the `cassandra-schema` section:
46
+
45
47
```yml
46
48
environment:
47
49
...
@@ -51,25 +53,30 @@ The article specifically details the use of the sample application HotROD and Ja
51
53
- CASSANDRA_USERNAME=cassandra
52
54
...
53
55
```
56
+
54
57
1. Run `docker-compose -f jaeger-docker-compose.yml up -d` to start the application.
55
58
56
-
:::image type="content" source="./media/jaeger/jaeger-running.png" alt-text="Screenshot of running jaeger." lightbox="./media/jaeger/jaeger-running.png" border="true":::
59
+
:::image type="content" source="./media/jaeger/jaeger-running.png" alt-text="Screenshot of a running Jaeger application." lightbox="./media/jaeger/jaeger-running.png" border="true":::
57
60
58
61
> [!TIP]
59
-
> Five containers are created, and you should be able to access the test application at http://localhost:8080/ to generate traces that can be viewed at http://localhost:16686/search.
62
+
> Five containers are created, and you should be able to access the test application at `http://localhost:8080/` to generate traces that can be viewed at `http://localhost:16686/search`.
60
63
61
64
1. Once the containers are running, access the Jaeger UI to view traces from the application.
65
+
62
66
:::image type="content" source="./media/jaeger/jaeger-page-1.png" alt-text="Screenshot of jaeger web interface." lightbox="./media/jaeger/jaeger-page-1.png" border="true":::
63
67
64
68
1. Verify by inspecting your Azure Managed Instance cluster.
69
+
65
70
:::image type="content" source="./media/jaeger/jaeger-table-1.png" alt-text="Screenshot of jaeger tables in managed instance cluster." lightbox="./media/jaeger/jaeger-table-1.png" border="true":::
66
71
67
-
1. Refer to the traces table to view the data related to step 7.
72
+
1. Refer to the traces table to view the data related to step 7.
73
+
68
74
:::image type="content" source="./media/jaeger/jaeger-table-2.png" alt-text="Screenshot of jaeger trace table." lightbox="./media/jaeger/jaeger-table-2.png" border="true":::
69
75
76
+
## Support
70
77
71
-
## FAQs
72
-
If you encounter issues running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
78
+
If you have problems running or testing Jaeger, open a support ticket. Provide the subscription ID and account name where your Jaeger test is running.
73
79
74
80
## Next steps
75
-
- Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
81
+
82
+
* Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
title: Use VPN with Azure Managed Instance for Apache Cassandra
3
-
description: Discover how to secure your cluster with vpn when you use Azure Managed Instance for Apache Cassandra.
2
+
title: Use a VPN with Azure Managed Instance for Apache Cassandra
3
+
description: Discover how to secure your cluster with a VPN when you use Azure Managed Instance for Apache Cassandra.
4
4
author: IriaOsara
5
5
ms.author: iriaosara
6
6
ms.service: managed-instance-apache-cassandra
@@ -9,20 +9,18 @@ ms.date: 02/08/2024
9
9
ms.devlang: azurecli
10
10
11
11
---
12
-
# Use VPN with Azure Managed Instance for Apache Cassandra
12
+
# Use a VPN with Azure Managed Instance for Apache Cassandra
13
13
14
-
Azure Managed Instance for Apache Cassandra nodes requires access to many other Azure services when injected into your VNet. Normally this is enabled by ensuring your VNet has outbound access to the internet. If your security policy prohibits outbound access, you can also configure firewall rules or UDRs for the appropriate access, for more information, see [here](network-rules.md).
14
+
Azure Managed Instance for Apache Cassandra nodes require access to many other Azure services when they're injected into your virtual network. Normally, you enable this access by ensuring that your virtual network has outbound access to the internet. If your security policy prohibits outbound access, you can configure firewall rules or user-defined routes for the appropriate access. For more information, see [Required outbound network rules](network-rules.md).
15
15
16
-
However, if you have internal security concerns around data exfiltration, your security policy might also even prohibit direct access to these services from your VNet. By using a VPN with your Azure Managed Instance for Apache Cassandra, you can ensure that data nodes in the VNet communicate only to a single secure VPN endpoint, with no direct access to any other services.
16
+
However, if you have internal security concerns about data exfiltration, your security policy might prohibit direct access to these services from your virtual network. By using a virtual private network (VPN) with Azure Managed Instance for Apache Cassandra, you can ensure that data nodes in the virtual network communicate with only a single VPN endpoint, with no direct access to any other services.
17
17
18
18
> [!IMPORTANT]
19
-
> Using VPN with Azure Managed Instance for Apache Cassandra is in public preview.
20
-
> This feature is provided without a service level agreement, and it's not recommended for production workloads.
21
-
> For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
19
+
> The ability to use a VPN with Azure Managed Instance for Apache Cassandra is in public preview. This feature is provided without a service-level agreement, and we don't recommend it for production workloads. For more information, see [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
22
20
23
-
## How to use VPN with Azure Managed Instance for Apache Cassandra
21
+
## How to use a VPN with Azure Managed Instance for Apache Cassandra
24
22
25
-
1. Create a cluster of Cassandra Managed Instance using "VPN" as the value for the `--azure-connection-method` option:
23
+
1. Create an Azure Managed Instance for Apache Cassandra cluster by using `"VPN"` as the value for the `--azure-connection-method` option:
26
24
27
25
```bash
28
26
az managed-cassandra cluster create \
@@ -33,26 +31,28 @@ However, if you have internal security concerns around data exfiltration, your s
33
31
--initial-cassandra-admin-password "password"
34
32
```
35
33
36
-
1. Use the following command to see the cluster properties. From the output, make a copy of the `privateLinkResourceId` ID:
34
+
1. Use the following command to see the cluster properties:
37
35
38
36
```bash
39
37
az managed-cassandra cluster show \
40
38
--resource-group "vpn-test-rg" \
41
39
--cluster-name "vpn-test-cluster"
42
40
```
43
41
44
-
1. On the portal, [create a private endpoint](../cosmos-db/how-to-configure-private-endpoints.md)
45
-
1. On the Resource tab, select"Connect to an Azure resource by resource ID or alias." as the connection method and `Microsoft.Network/privateLinkServices` as the resource type. Enter the `privateLinkResourceId` from step (2).
46
-
1. On the Virtual Network tab, select your virtual network's subnet and make sure to select the option for "Statically allocate IP address."
42
+
From the output, make a copy of the `privateLinkResourceId` ID.
43
+
44
+
1. In the Azure portal, [create a private endpoint](../cosmos-db/how-to-configure-private-endpoints.md) by using these details:
45
+
1. On the **Resource** tab, select**Connect to an Azure resource by resource ID or alias** as the connection method and **Microsoft.Network/privateLinkServices** as the resource type. Enter the `privateLinkResourceId` value from the previous step.
46
+
1. On the **Virtual Network** tab, selectyour virtual network's subnet, and select the **Statically allocate IP address** option.
47
47
1. Validate and create.
48
48
49
49
> [!NOTE]
50
-
> At the moment, the connection between our management service and your private endpoint requires the Azure Managed Instance for Apache Cassandra team [email protected] to approve it.
51
-
52
-
1. Get the IP address of your private endpoint NIC.
50
+
> At the moment, the connection between the management service and your private endpoint requires approval from the [Azure Managed Instance for Apache Cassandra team](mailto:[email protected]).
53
51
54
-
1. Create a new data center using the IP address from (5) as the `--private-endpoint-ip-address` parameter.
52
+
1. Get the IP address of your privateendpoint's network interface.
55
53
54
+
1. Create a new datacenter by using the IP address from the previous step as the `--private-endpoint-ip-address` parameter.
56
55
57
56
## Next steps
57
+
58
58
- Learn about [hybrid cluster configuration](configure-hybrid-cluster.md) in Azure Managed Instance for Apache Cassandra.
0 commit comments