Skip to content

Commit 422f328

Browse files
committed
version for review
1 parent 5d22c85 commit 422f328

File tree

1 file changed

+29
-46
lines changed

1 file changed

+29
-46
lines changed

articles/azure-monitor/best-practices-multicloud.md

Lines changed: 29 additions & 46 deletions
Original file line numberDiff line numberDiff line change
@@ -2,91 +2,74 @@
22
title: Multicloud monitoring with Azure Monitor
33
description: Guidance and recommendations for using Azure Monitor to monitor resources and applications in other clouds.
44
ms.topic: conceptual
5-
ms.date: 10/18/2021
5+
ms.date: 01/23/2023
66
ms.reviewer: bwren
77

88
---
99

1010
# Multicloud monitoring with Azure Monitor
11-
Most customer environments include in multiple clouds. In addition to Azure, you may have applications and other resources in Amazon Web Services (AWS) and Google Cloud Platform (GCP)
12-
13-
In addition to monitoring services and application in Azure, Azure Monitor can provide complete monitoring for your resources and applications running in other clouds. This article describes features of Azure Monitor that allow you to provide complete monitoring across your AWS and GCP environments.
14-
15-
16-
## Azure Arc
17-
Azure Arc simplifies governance and management by delivering a consistent multi-cloud management platform.
11+
In addition to monitoring services and application in Azure, Azure Monitor can provide complete monitoring for your resources and applications running in other clouds including Amazon Web Services (AWS) and Google Cloud Platform (GCP). This article describes features of Azure Monitor that allow you to provide complete monitoring across your AWS and GCP environments.
1812

1913
## Virtual machines
2014
Using [Azure Arc-enabled servers](../azure-arc/servers/overview.md), [VM insights](vm/vminsights-overview.md) in Azure Monitor provides a consistent experience between both Azure virtual machines and your AWS EC2 or GCP VM instances. You can view your hybrid machines right alongside your Azure machines and onboard them using identical methods. This includes using standard Azure constructs such as Azure Policy and applying tags.
2115

22-
- [Overview of Azure Arc-enabled servers](../azure-arc/servers/overview.md)
23-
- [Plan and deploy Azure Arc-enabled servers](../azure-arc/servers/plan-at-scale-deployment.md)
24-
25-
The Azure Monitor agent installed by VM insights collects data from the client operating system of virtual machines regardless of their location. Use the same [data collection rules](essentials/data-collection-rule-overview.md) that define your data collection across all of the virtual machines across your different cloud environments.
16+
The [Azure Monitor agent](agents/agents-overview.md) installed by VM insights collects telemetry from the client operating system of virtual machines regardless of their location. Use the same [data collection rules](essentials/data-collection-rule-overview.md) that define your data collection across all of the virtual machines across your different cloud environments.
2617

27-
- [Azure Monitor Agent overview](agents/agents-overview.md)
18+
- [Plan and deploy Azure Arc-enabled servers](../azure-arc/servers/plan-at-scale-deployment.md)
2819
- [Manage Azure Monitor Agent](agents/azure-monitor-agent-manage.md)
29-
- [Collect events and performance counters from virtual machines with Azure Monitor Agent](agents/data-collection-rule-azure-monitor-agent.md)
20+
- [Enable VM insights overview](vm/vminsights-enable-overview.md)
3021

22+
If you use Defender for Cloud for cloud security management and threat detection, then you can use auto provisioning to automate the deployment of the Azure Arc agent to your AWS EC2 and GCP VM instances.
3123

24+
- [Connect your AWS accounts to Microsoft Defender for Cloud](../defender-for-cloud/quickstart-onboard-aws.md)
25+
- [Connect your GCP projects to Microsoft Defender for Cloud](../defender-for-cloud/quickstart-onboard-gcp.md)
3226

33-
## Kubernetes
27+
## Containers
3428
Using [Azure Arc-enabled Kubernetes](../azure-arc/servers/overview.md), [Container insights](containers/container-insights-overview.md) in Azure Monitor provides a consistent experience between both [Azure Kubernetes Service (AKS)](../aks/intro-kubernetes.md) and Kubernetes clusters in your AWS EC2 or GCP VM instances. You can view your hybrid clusters right alongside your Azure machines and onboard them using identical methods. This includes using standard Azure constructs such as Azure Policy and applying tags.
3529

36-
- [Overview of Azure Arc-enabled Kubernetes?](../azure-arc/kubernetes/overview.md)
37-
- [Connect an existing Kubernetes cluster to Azure Arc](../azure-arc/kubernetes/quickstart-connect-cluster.md)
38-
39-
The Azure Monitor agent installed by Container insights collects data from the client operating system of virtual machines regardless of their location.
30+
The [Azure Monitor agent](agents/agents-overview.md) installed by Container insights collects telemetry from the client operating system of virtual machines regardless of their location. Use the same analysis tools on Container insights to monitor clusters across your different cloud environments.
4031

32+
- [Connect an existing Kubernetes cluster to Azure Arc](../azure-arc/kubernetes/quickstart-connect-cluster.md)
4133
- [Azure Monitor Container Insights for Azure Arc-enabled Kubernetes clusters](containers/container-insights-enable-arc-enabled-clusters.md)
4234
- [Monitoring Azure Kubernetes Service (AKS) with Azure Monitor](../aks/monitor-aks.md)
4335

4436
## Applications
45-
A feature of Azure Monitor, Application Insights is an extensible Application Performance Management (APM) service for developers and DevOps professionals, which provides telemetry insights and information, in order to better understand how applications are performing and to identify areas for optimization.
37+
Application Insights in Azure Monitor is an extensible Application Performance Management (APM) service that provides telemetry insights and information in order to better understand how applications are performing and to identify areas for optimization. [Instrumentation methods](/app/app-insights-overview.md?tabs=net#how-do-i-instrument-an-application) are available for many languages and any platform, including ap[plications running in AWS and GCP.
4638

39+
In addition to analysis tools in Application insights, use Azure Monitor features such as [Log Analytics](logs/log-analytics-overview.md) and [workbooks](visualize/workbooks-overview.md) to correlate the usage and performance data collected by Application Insights with configuration and performance data across the Azure resources that support the app.
4740

48-
49-
### Microsoft Defender for Cloud
50-
If you are using Defender for Cloud, you can connect your AWS account and GCP projects, and automate the deployment of the Azure Arc agent to your AWS EC2 and GCP VM instances.
51-
52-
- [Connect your AWS accounts to Microsoft Defender for Cloud](../defender-for-cloud/quickstart-onboard-aws.md)
53-
- [Connect your GCP projects to Microsoft Defender for Cloud](../defender-for-cloud/quickstart-onboard-gcp.md)
41+
- If you use [Grafana](https://grafana.com/grafana/) for visualization of monitoring data across your different clouds. use the [Azure Monitor data source](https://grafana.com/docs/grafana/latest/datasources/azure-monitor/) to include application log and metric data in your dashboards.
42+
- If you use [Data Dog](https://www.datadoghq.com/), use [Azure integrations](https://www.datadoghq.com/blog/azure-monitoring-enhancements/) to include application log and metric data in your Data Dog UI.
5443

5544

45+
## Audit
46+
In addition to monitoring the health of your cloud resources, you can consolidate auditing data from your AWS and GCP clouds into your Log Analytics workspace so that you can consolidate your analysis and reporting. This is best performed by Azure Sentinel which uses the same workspace as Azure Monitor and provides additional features for collecting and analyzing security and auditing data.
5647

48+
Use the following methods to ingest AWS service log data into Microsoft Sentinel.
5749

50+
- [Microsoft Sentinel connector](../sentinel/connect-aws.md)
51+
- [Azure function](https://github.com/andedevsecops/AWS-CloudTrail-AzFunc)
52+
- [AWS Lambda function](https://github.com/andedevsecops/aws-data-connector-az-sentinel)
5853

59-
## Infrastructure
6054

61-
You can use a plugin to get events stored in GCP Cloud Storage, and then ingest into a Log Analytics workspace.
55+
Use the following methods to use a plugin to collect events, including pub/sub events, stored in GCP Cloud Storage, and then ingest into Log Analytics.
6256

6357
- [Google Cloud Storage Input Plugin](https://www.elastic.co/guide/en/logstash/current/plugins-inputs-google_cloud_storage.html)
64-
- [Azure Sentinel Data connector for Google Cloud Platform](https://github.com/andedevsecops/azure-sentinel-gcp-data-connector)
65-
- [Azure Log Analytics output plugin for Logstash](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/microsoft-logstash-output-azure-loganalytics)
66-
67-
68-
### Audit
69-
Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data.
70-
71-
- [Connect Microsoft Sentinel to Amazon Web Services to ingest AWS service log data](../sentinel/connect-aws.md)
72-
- [Azure native Data connector to ingest AWS CloudTrail Logs](https://github.com/andedevsecops/AWS-CloudTrail-AzFunc)
73-
- [AWS Lambda Function to import CloudTrail Logs to Azure Sentinel](https://github.com/andedevsecops/aws-data-connector-az-sentinel)
74-
75-
You can use a plugin to get pub/sub events stored in GCP Cloud Storage, and then ingest into Log Analytics.
76-
58+
- [GCP Cloud Functions](https://github.com/andedevsecops/azure-sentinel-gcp-data-connector)
7759
- [Google_pubsub input plugin](https://www.elastic.co/guide/en/logstash/current/plugins-inputs-google_pubsub.html#plugins-inputs-google_pubsub)
7860
- [Azure Log Analytics output plugin for Logstash](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/microsoft-logstash-output-azure-loganalytics)
7961

8062

8163
## Custom data sources
64+
Use the following methods to collect data from your cloud resources that doesn't fit into standard collection methods.
8265

83-
To send custom log data from any REST API client.
66+
- Send custom log data from any REST API client with the [Logs Ingestion API in Azure Monitor](logs/logs-ingestion-api-overview.md)
67+
- Use Logstash to collect data and the [Azure Log Analytics output plugin for Logstash](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/microsoft-logstash-output-azure-loganalytics) to ingest it into a Log Analytics workspace.
8468

85-
- [Logs Ingestion API in Azure Monitor](logs/logs-ingestion-api-overview.md)
69+
## Automation
70+
[Azure Automation](automation/overview.md) delivers cloud-based automation, operating system updates, and configuration services that supports consistent management across your Azure and non-Azure environments. It includes process automation, configuration management, update management, shared capabilities, and heterogeneous features. [Hybrid Runbook Worker](automation/automation-hybrid-runbook-worker.md) enables automation runbooks to run directly on the non-Azure virtual machines against resources in the environment to manage those local resources.
8671

87-
Alternatively, use Logstash to collect and the Logstash plugin to ingest data.
88-
89-
- [Azure Log Analytics output plugin for Logstash](https://github.com/Azure/Azure-Sentinel/tree/master/DataConnectors/microsoft-logstash-output-azure-loganalytics)
72+
Through [Arc-enabled servers](azure-arc/servers/overview.md), Azure Automation provides a consistent deployment and management experience for your non-Azure machines. It enables integration with the Automation service using the VM extension framework to deploy the Hybrid Runbook Worker role, and simplify onboarding to Update Management and Change Tracking and Inventory.
9073

9174
## Next steps
9275

0 commit comments

Comments
 (0)