Skip to content

Commit 34e5522

Browse files
authored
Merge pull request #282187 from EdB-MSFT/patch-2
Update prometheus-remote-write-virtual-machines.md
2 parents 98101e4 + 4d8e7ca commit 34e5522

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

articles/azure-monitor/essentials/prometheus-remote-write-virtual-machines.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -26,18 +26,17 @@ Use user-assigned managed identity authentication for services running self mana
2626

2727
- Azure Virtual Machines
2828
- Azure Virtual Machine Scale Sets
29-
- Azure Arc-enabled Virtual Machines
3029
- Azure Kubernetes Service (AKS)
3130

3231
To set up remote write for Azure-managed resources, see [Remote-write using user-assigned managed identity](#remote-write-using-user-assigned-managed-identity-authentication).
3332

3433

3534
## Virtual machines and Kubernetes clusters running on non-Azure environments.
3635

37-
If you have virtual machines, or a Kubernetes cluster in non-Azure environments, and you don't want to onboard to Azure Arc, install self-managed Prometheus, and configure remote-write using Microsoft Entra ID application authentication. For more information, see [Remote-write using Microsoft Entra ID application authentication](#remote-write-using-microsoft-entra-id-application-authentication).
38-
39-
Onboarding to Azure Arc-enabled services allows you to manage and configure non-Azure virtual machines in Azure. Once onboarded, configure [Remote-write using user-assigned managed identity](#remote-write-using-user-assigned-managed-identity-authentication) authentication. For more Information on onboarding Virtual Machines to Azure Arc-enabled servers, see [Azure Arc-enabled servers](/azure/azure-arc/servers/overview) and [Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/overview).
36+
If you have virtual machines or a Kubernetes cluster in non-Azure environments, or you have onboarded to Azure Arc, install self-managed Prometheus, and configure remote-write using Microsoft Entra ID application authentication. For more information, see [Remote-write using Microsoft Entra ID application authentication](#remote-write-using-microsoft-entra-id-application-authentication).
4037

38+
Onboarding to Azure Arc-enabled services allows you to manage and configure non-Azure virtual machines in Azure. For more Information on onboarding Virtual Machines to Azure Arc-enabled servers, see [Azure Arc-enabled servers](/azure/azure-arc/servers/overview) and [Azure Arc-enabled Kubernetes](/azure/azure-arc/kubernetes/overview). Arc-enabled services only support Microsoft Entra ID authentication.
39+
4140
> [!NOTE]
4241
> System-assigned managed identity is not supported for remote-write to Azure Monitor workspaces. Use user-assigned managed identity or Microsoft Entra ID application authentication.
4342
@@ -67,7 +66,7 @@ Use the Azure portal or CLI to create a user-assigned managed identity or Micros
6766

6867
### Remote-write using user-assigned managed identity authentication
6968

70-
User-assigned managed identity authentication can be used in any Azure-managed environment. If your Prometheus service is running in a non-Azure environment, you can use Entra ID application authentication.
69+
User-assigned managed identity authentication can be used in any Azure-managed environment. If your Prometheus service is running in a non-Azure environment, you can use Microsoft Entra ID application authentication.
7170

7271
To configure a user-assigned managed identity for remote-write to Azure Monitor workspace, complete the following steps.
7372

0 commit comments

Comments
 (0)