Skip to content

Commit 32913d5

Browse files
authored
Merge pull request #266629 from MicrosoftDocs/main
Publish to live, Sunday 4:00PM PST, 02/18
2 parents ab3cc89 + b77c11d commit 32913d5

22 files changed

+336
-207
lines changed

.openpublishing.redirection.json

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -10640,11 +10640,6 @@
1064010640
"redirect_url": "/azure/orbital/overview",
1064110641
"redirect_document_id": false
1064210642
},
10643-
{
10644-
"source_path_from_root": "/articles/load-balancer/cross-region-overview.md",
10645-
"redirect_url": "/azure/reliability/reliability-load-balancer",
10646-
"redirect_document_id": false
10647-
},
1064810643
{
1064910644
"source_path_from_root": "/articles/load-balancer/load-balancer-standard-availability-zones.md",
1065010645
"redirect_url": "/azure/reliability/reliability-load-balancer",

articles/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint.md

Lines changed: 1 addition & 29 deletions
Original file line numberDiff line numberDiff line change
@@ -267,35 +267,7 @@ New-AzConnectedMachineExtension -Name AzureMonitorLinuxAgent -ExtensionType Azur
267267
`Stop-Service -Name <gateway-name>` and
268268
`Start-Service -Name <gateway-name>`.
269269

270-
## Enable network isolation for Azure Monitor Agent
271-
272-
By default, Azure Monitor Agent connects to a public endpoint to connect to your Azure Monitor environment. To enable network isolation for your agents, create [data collection endpoints](../essentials/data-collection-endpoint-overview.md) and add them to your [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources).
273-
274-
### Create a data collection endpoint
275-
276-
[Create a data collection endpoint](../essentials/data-collection-endpoint-overview.md#create-a-data-collection-endpoint) for each of your regions so that agents can connect instead of using the public endpoint. An agent can only connect to a DCE in the same region. If you have agents in multiple regions, you must create a DCE in each one.
277-
278-
### Create a private link
279-
280-
With [Azure Private Link](../../private-link/private-link-overview.md), you can securely link Azure platform as a service (PaaS) resources to your virtual network by using private endpoints. An Azure Monitor private link connects a private endpoint to a set of Azure Monitor resources that define the boundaries of your monitoring network. That set is called an Azure Monitor Private Link Scope. For information on how to create and configure your AMPLS, see [Configure your private link](../logs/private-link-configure.md).
281-
282-
### Add DCEs to AMPLS
283-
284-
Add the data collection endpoints to a new or existing [Azure Monitor Private Link Scopes](../logs/private-link-configure.md#connect-azure-monitor-resources) resource. This process adds the DCEs to your private DNS zone (see [how to validate](../logs/private-link-configure.md#review-and-validate-your-private-link-setup)) and allows communication via private links. You can do this task from the AMPLS resource or on an existing DCE resource's **Network isolation** tab.
285-
286-
> [!NOTE]
287-
> Other Azure Monitor resources like the Log Analytics workspaces configured in your data collection rules that you want to send data to must be part of this same AMPLS resource.
288-
289-
For your data collection endpoints, ensure the **Accept access from public networks not connected through a Private Link Scope** option is set to **No** on the **Network Isolation** tab of your endpoint resource in the Azure portal. This setting ensures that public internet access is disabled and network communication only happens via private links.
290-
<!-- convertborder later -->
291-
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" lightbox="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" alt-text="Screenshot that shows configuring data collection endpoint network isolation." border="false":::
292-
293-
### Associate DCEs to target machines
294-
Associate the data collection endpoints to the target resources by editing the data collection rule in the Azure portal. On the **Resources** tab, select **Enable Data Collection Endpoints**. Select a DCE for each virtual machine. See [Configure data collection for Azure Monitor Agent](../agents/data-collection-rule-azure-monitor-agent.md).
295-
<!-- convertborder later -->
296-
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" lightbox="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" alt-text="Screenshot that shows configuring data collection endpoints for an agent." border="false":::
297-
298270
## Next steps
299271

300272
- [Associate endpoint to machines](../agents/data-collection-rule-azure-monitor-agent.md#create-a-data-collection-rule)
301-
- [Add endpoint to AMPLS resource](../logs/private-link-configure.md#connect-azure-monitor-resources).
273+
- [Enable network isolation for Azure Monitor Agent by using Private Link](../agents/azure-monitor-agent-private-link.md).
Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
---
2+
title: Enable network isolation for Azure Monitor Agent by using Private Link
3+
description: Enable network isolation for Azure Monitor Agent.
4+
ms.topic: conceptual
5+
ms.date: 5/1/2023
6+
ms.custom: references_region
7+
ms.reviewer: jeffwo
8+
9+
---
10+
11+
# Enable network isolation for Azure Monitor Agent by using Private Link
12+
13+
By default, Azure Monitor Agent connects to a public endpoint to connect to your Azure Monitor environment. This article explains how to enable network isolation for your agents by using [Azure Private Link](../../private-link/private-link-overview.md).
14+
15+
## Prerequisites
16+
17+
- A [data collection rule](../essentials/data-collection-rule-create-edit.md), which defines the data Azure Monitor Agent collects and the destination to which the agent sends data.
18+
19+
## Link your data collection endpoints to your Azure Monitor Private Link Scope
20+
21+
1. [Create a data collection endpoint](../essentials/data-collection-endpoint-overview.md#create-a-data-collection-endpoint) for each of your regions for agents to connect to instead of using the public endpoint. An agent can only connect to a data collection endpoint in the same region. If you have agents in multiple regions, create a data collection endpoint in each one.
22+
23+
1. [Configure your private link](../logs/private-link-configure.md). You'll use the private link to connect your data collection endpoint to a set of Azure Monitor resources that define the boundaries of your monitoring network. This set is called an Azure Monitor Private Link Scope.
24+
25+
1. [Add the data collection endpoints to your Azure Monitor Private Link Scope](../logs/private-link-configure.md#connect-azure-monitor-resources) resource. This process adds the data collection endpoints to your private DNS zone (see [how to validate](../logs/private-link-configure.md#review-and-validate-your-private-link-setup)) and allows communication via private links. You can do this task from the AMPLS resource or on an existing data collection endpoint resource's **Network isolation** tab.
26+
27+
> [!IMPORTANT]
28+
> Other Azure Monitor resources like the Log Analytics workspaces configured in your data collection rules that you want to send data to must be part of this same AMPLS resource.
29+
30+
For your data collection endpoints, ensure the **Accept access from public networks not connected through a Private Link Scope** option is set to **No** on the **Network Isolation** tab of your endpoint resource in the Azure portal. This setting ensures that public internet access is disabled and network communication only happens via private links.
31+
32+
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" lightbox="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" alt-text="Screenshot that shows configuring data collection endpoint network isolation." border="false":::
33+
34+
1. Associate the data collection endpoints to the target resources by editing the data collection rule in the Azure portal. On the **Resources** tab, select **Enable Data Collection Endpoints**. Select a data collection endpoint for each virtual machine. See [Configure data collection for Azure Monitor Agent](../agents/data-collection-rule-azure-monitor-agent.md).
35+
36+
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" lightbox="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" alt-text="Screenshot that shows configuring data collection endpoints for an agent." border="false":::
37+
38+
39+
## Next steps
40+
41+
- Learn more about [Best practices for monitoring virtual machines in Azure Monitor](../best-practices-vm.md).

articles/azure-monitor/autoscale/autoscale-custom-metric.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,9 @@ If you're not going to continue to use this application, delete resources.
144144

145145
:::image type="content" source="media/autoscale-custom-metric/delete-web-app.png" alt-text="Screenshot that shows the App Service page where you can delete the web app.":::
146146

147-
1. On the **App Service plans** page, select **Delete**. The autoscale settings are deleted along with the App Service plan.
147+
1. On the **Autoscale setting** page, in the **JSON** tab, select the trash bin icon next to the **Autoscale setting name**. Note that the autoscale settings are not deleted along with the App Service plan unless you delete the resource group. If you dont delete the Autoscale settings and you recreate an app service plan with the same name, it will inherit the original autoscale settings.
148+
149+
1. On the **App Service plans** page, select **Delete**.
148150

149151
:::image type="content" source="media/autoscale-custom-metric/delete-service-plan.png" alt-text="Screenshot that shows the App Service plans page where you can delete the App Service plan.":::
150152

articles/azure-monitor/containers/container-insights-private-link.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This article describes how to configure Container insights to use Azure Private
1414
## Cluster using managed identity authentication
1515
Use the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace using [Azure Private Link](../logs/private-link-security.md) if your cluster is using managed identity authentication.
1616

17-
1. Follow the steps in [Enable network isolation for the Azure Monitor agent](../agents/azure-monitor-agent-data-collection-endpoint.md#enable-network-isolation-for-azure-monitor-agent) to create a data collection endpoint (DCE) and add it to your Azure Monitor private link service (AMPLS).
17+
1. Follow the steps in [Enable network isolation for Azure Monitor Agent by using Private Link](../agents/azure-monitor-agent-private-link.md) to create a data collection endpoint (DCE) and add it to your Azure Monitor private link service (AMPLS).
1818

1919
1. Create an association between the cluster and the DCE by using the following API call. For information on this call, see [Data collection rule associations - Create](/rest/api/monitor/data-collection-rule-associations/create). The DCR association name must be **configurationAccessEndpoint**, and `resourceUri` is the resource ID of the AKS cluster.
2020

articles/azure-monitor/essentials/resource-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ In this mode, individual tables in the selected workspace are created for each c
3636

3737
All Azure services will eventually migrate to the resource-specific mode.
3838

39-
The preceding example creates three tables:
39+
The example below creates three tables:
4040

4141
- Table `Service1AuditLogs`
4242

articles/azure-monitor/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -702,6 +702,8 @@ items:
702702
href: agents/azure-monitor-agent-send-data-to-event-hubs-and-storage.md
703703
- name: Define network settings
704704
href: agents/azure-monitor-agent-data-collection-endpoint.md
705+
- name: Configure Private Link for Azure Monitor Agent
706+
href: agents/azure-monitor-agent-private-link.md
705707
- name: Migrate from Log Analytics Agent
706708
items:
707709
- name: Migration guidance

0 commit comments

Comments
 (0)