You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: How to connect to a data source privately in Azure Managed Grafana
3
-
description: Learn how to connect an Azure Managed Grafana workspace to a data source using Managed Private Endpoint
3
+
description: Learn how to connect an Azure Managed Grafana workspace to a data source using Managed Private Endpoint.
4
4
ms.service: azure-managed-grafana
5
5
ms.topic: how-to
6
6
author: maud-lv
7
7
ms.author: malev
8
-
ms.date: 02/05/2024
8
+
ms.date: 07/17/2025
9
+
#customer intent: As a Grafana user, I want to connect an Azure Managed Grafana workspace a data source using Managed Private Endpoint, so that the traffic stays on the Azure network instead of the internet.
9
10
---
10
11
11
12
# Connect to a data source privately
12
13
13
-
In this guide, you learn how to connect your Azure Managed Grafana workspace to a data source using Managed Private Endpoint. Azure Managed Grafana’s managed private endpoints are endpoints created in a Managed Virtual Network that the Azure Managed Grafana service uses. They establish private links from that network to your Azure data sources. Azure Managed Grafana sets up and manages these private endpoints on your behalf. You can create managed private endpoints from your Azure Managed Grafana to access other Azure managed services (for example, Azure Monitor private link scope or Azure Monitor workspace) and your own self-hosted data sources (for example, connecting to your self-hosted Prometheus behind a private link service).
14
+
In this guide, you learn how to connect your Azure Managed Grafana workspace to a data source using Managed Private Endpoint. Managed private endpoints for Azure Managed Grafana are endpoints created in a Managed Virtual Network that the Azure Managed Grafana service uses. They establish private links from that network to your Azure data sources. Azure Managed Grafana sets up and manages these private endpoints on your behalf. You can create managed private endpoints from your Azure Managed Grafana to access:
14
15
15
-
When you use managed private endpoints, traffic between your Azure Managed Grafana and its data sources traverses exclusively over the Microsoft backbone network without going through the internet. Managed private endpoints protect against data exfiltration. A managed private endpoint uses a private IP address from your Managed Virtual Network to effectively bring your Azure Managed Grafana workspace into that network. Each managed private endpoint is mapped to a specific resource in Azure and not the entire service. Customers can limit connectivity to only resources approved by their organizations.
16
+
- Other Azure managed services, for example, Azure Monitor private link scope or Azure Monitor workspace
17
+
- Your own self-hosted data sources, for example, connecting to your self-hosted Prometheus behind a private link service
16
18
17
-
A private endpoint connection is created in a "Pending" state when you create a managed private endpoint in your Azure Managed Grafana workspace. An approval workflow is started. The private link resource owner is responsible for approving or rejecting the new connection. If the owner approves the connection, the private link is established. Otherwise, the private link isn't set up. Azure Managed Grafana shows the current connection status. Only a managed private endpoint in an approved state can be used to send traffic to the private link resource that is connected to the managed private endpoint.
19
+
When you use managed private endpoints, traffic between your Azure Managed Grafana and its data sources travels only over the Microsoft backbone network instead of the internet. A managed private endpoint uses a private IP address from your Managed Virtual Network to effectively bring your Azure Managed Grafana workspace into that network. Managed private endpoints protect against data exfiltration. Each managed private endpoint is mapped to a specific resource in Azure and not the entire service. You can limit connectivity to only resources approved by your organization.
18
20
19
-
While managed private endpoints are free, there may be charges associated with private link usage on a data source. For more information, see your data source’s pricing details.
21
+
## Prerequisites
20
22
21
-
> [!NOTE]
22
-
> Managed private endpoints are currently only available in Azure Global.
23
+
To follow the procedures in this guide, you must have:
23
24
24
-
> [!NOTE]
25
-
> If you're running a private data source in an AKS cluster, when the service’s `externalTrafficPolicy` is set to local, Azure Private Link Service needs to use a different subnet than the Pod’s subnet. If the same subnet is required, the service should use Cluster `externalTrafficPolicy`. See [Cloud Provider Azure](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/#restrictions).
25
+
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
26
+
- An Azure Managed Grafana workspace in the Standard tier. If you don't have one yet, [create a new instance](quickstart-managed-grafana-portal.md).
26
27
27
28
## Supported data sources
28
29
@@ -38,58 +39,70 @@ Managed private endpoints work with Azure services that support private link. Us
38
39
- Azure Databricks
39
40
- Private link services
40
41
41
-
## Prerequisites
42
+
When you create a managed private endpoint in your Azure Managed Grafana workspace, a private endpoint connection is created in a *Pending* state. This action begins an approval workflow. The private link resource owner is responsible for approving or rejecting the new connection. If the owner approves the connection, the private link is established. Otherwise, the private link isn't set up.
42
43
43
-
To follow the steps in this guide, you must have:
44
+
Azure Managed Grafana shows the current connection status. Only a managed private endpoint in an *approved* state can be used to send traffic to the private link resource that is connected to the managed private endpoint.
44
45
45
-
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
46
-
- An Azure Managed Grafana workspace in the Standard tier. If you don't have one yet, [create a new instance](quickstart-managed-grafana-portal.md).
46
+
> [!NOTE]
47
+
> Managed private endpoints are currently only available in Azure Global.
48
+
49
+
Managed private endpoints are free. There can be charges associated with private link usage on a data source. For more information, see pricing details for your data source.
50
+
51
+
> [!NOTE]
52
+
> If you run a private data source in an Azure Kubernetes Service (AKS) cluster, if the service `externalTrafficPolicy` is set to local, Azure Private Link Service needs to use a different subnet than the Pod’s subnet. If the same subnet is required, the service should use Cluster `externalTrafficPolicy`. See [Cloud Provider Azure](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/#restrictions).
47
53
48
54
## Create a managed private endpoint for Azure Monitor workspace
49
55
50
56
You can create a managed private endpoint in your Azure Managed Grafana workspace to connect to a [supported data source](#supported-data-sources) using a private link.
51
57
52
-
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking**.
53
-
1. Select **Managed Private Endpoint**, and then select **Create**.
58
+
1. In the Azure portal, navigate to your Grafana workspace and then select **Settings** > **Networking**.
59
+
1. Select **Managed Private Endpoint**, and then select **Add**.
54
60
55
-
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
61
+
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal add managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
56
62
57
-
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
63
+
1. In the **New managed private endpoint** pane, fill out required information for resource to connect to.
58
64
59
-
:::image type="content" source="media/managed-private-endpoint/new-details-azure-monitor.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Azure Monitor workspace.":::
65
+
:::image type="content" source="media/managed-private-endpoint/new-details-azure-monitor.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Azure Monitor workspace." lightbox="media/managed-private-endpoint/new-details-azure-monitor.png":::
60
66
61
-
1. Select an Azure *Resource type* (for example, **Microsoft.Monitor/accounts** for Azure Monitor Managed Service for Prometheus).
67
+
1. Select an Azure **Resource type**, for example, **Microsoft.Monitor/accounts** for Azure Monitor Managed Service for Prometheus.
62
68
1. Select **Create** to add the managed private endpoint resource.
63
69
1. Contact the owner of target Azure Monitor workspace to approve the connection request.
64
70
65
71
> [!NOTE]
66
-
> After the new private endpoint connection is approved, all network traffic between your Azure Managed Grafana workspace and the selected data source will flow only through the Azure backbone network.
72
+
> After the new private endpoint connection is approved, all network traffic between your Azure Managed Grafana workspace and the selected data source flows only through the Azure backbone network.
67
73
68
74
## Create a managed private endpoint to Azure Private Link service
69
75
70
-
If you have a data source internal to your virtual network, such as an InfluxDB server hosted on an Azure virtual machine, or a Loki server hosted inside your AKS cluster, you can connect your Azure Managed Grafana to it. You first need to add a private link access to that resource using the Azure Private Link service. The exact steps required to set up a private link is dependent on the type of Azure resource. Refer to the documentation of the hosting service you have. For example, [this article](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/) describes how to create a private link service in Azure Kubernetes Service by specifying a kubernetes service object.
76
+
If you have a data source internal to your virtual network, you can connect your Azure Managed Grafana to it. Examples include an InfluxDB server hosted on an Azure virtual machine and a Loki server hosted inside your AKS cluster.
77
+
78
+
You first need to add a private link access to that resource using the Azure Private Link service. The exact steps to set up a private link depend on the type of Azure resource. Refer to the documentation of the hosting service. For example, [Azure Private Link Service Integration](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/) describes how to create a private link service in Azure Kubernetes Service by specifying a kubernetes service object.
71
79
72
-
Once you've set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
80
+
After you set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
73
81
74
-
1. In the Azure portal, navigate to your Grafana resource and then select **Networking**.
75
-
1. Select **Managed Private Endpoint**, and then select **Create**.
82
+
1. In the Azure portal, navigate to your Grafana resource and then select **Settings** > **Networking**.
83
+
1. Select **Managed Private Endpoint**, and then select **Add**.
76
84
77
-
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
85
+
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal add managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
78
86
79
-
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
87
+
1. In the **New managed private endpoint** pane, fill out required information for resource to connect to.
80
88
81
-
:::image type="content" source="media/managed-private-endpoint/new-details-private-link.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Private link services.":::
89
+
:::image type="content" source="media/managed-private-endpoint/new-details-private-link.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Private link services." lightbox="media/managed-private-endpoint/new-details-private-link.png":::
82
90
83
91
> [!TIP]
84
-
> The *Domain name* field is optional. If you specify a domain name, Azure Managed Grafana will ensure that this domain name will be resolved to the managed private endpoint's private IP inside this Grafana's service managed network. You can use this domain name in your Grafana data source's URL configuration instead of the private IP address. You will be required to use the domain name if you enabled TLS or Server Name Indication (SNI) for your self-hosted data store.
92
+
> The *Domain name* field is optional. If you specify a domain name, Azure Managed Grafana ensures that this domain name resolves to the managed private endpoint's private IP inside this Grafana's service managed network. You can use this domain name in your Grafana data source's URL configuration instead of the private IP address. You must use the domain name if you enabled TLS or Server Name Indication (SNI) for your self-hosted data store.
85
93
86
94
1. Select **Create** to add the managed private endpoint resource.
87
95
1. Contact the owner of target private link service to approve the connection request.
88
96
1. After the connection request is approved, select **Refresh** to ensure the connection status is **Approved** and private IP address is shown.
89
97
90
98
> [!NOTE]
91
-
> The **Refresh** step cannot be skipped, since refreshing triggers a network sync operation by Azure Managed Grafana. Once the new managed private endpoint connection is shown approved, all network traffic between your Azure Managed Grafana workspace and the selected data source will only flow through the Azure backbone network.
99
+
> You can't skip the **Refresh** step. Refreshing triggers a network sync operation by Azure Managed Grafana. After the new managed private endpoint connection is shown approved, all network traffic between your Azure Managed Grafana workspace and the selected data source flows only through the Azure backbone network.
100
+
101
+
## Next step
102
+
103
+
In this how-to guide, you learned how to configure private access between an Azure Managed Grafana workspace and a data source.
92
104
93
-
## Next steps
105
+
To learn how to set up private access from your users to an Azure Managed Grafana workspace, see:
94
106
95
-
In this how-to guide, you learned how to configure private access between an Azure Managed Grafana workspace and a data source. To learn how to set up private access from your users to an Azure Managed Grafana workspace, see [Set up private access](how-to-set-up-private-access.md).
107
+
> [!div class="nextstepaction"]
108
+
> [Set up private access](how-to-set-up-private-access.md)
0 commit comments