Skip to content

Commit 45cb3e4

Browse files
Merge pull request #284293 from bwren/docs-editor/kubernetes-monitoring-private-1723385885
Update kubernetes-monitoring-private-link.md
2 parents 926b0af + 0bc944c commit 45cb3e4

File tree

1 file changed

+6
-9
lines changed

1 file changed

+6
-9
lines changed

articles/azure-monitor/containers/kubernetes-monitoring-private-link.md

Lines changed: 6 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -32,7 +32,7 @@ If your AKS cluster isn't in the same region as your Azure Monitor workspace, th
3232
:::image type="content" source="media/kubernetes-monitoring-private-link/azure-monitor-workspace-data-collection-rule.png" alt-text="A screenshot show the data collection rules page for an Azure Monitor workspace." lightbox="media/kubernetes-monitoring-private-link/azure-monitor-workspace-data-collection-rule.png" :::
3333

3434

35-
## Ingestion from a private AKS cluster
35+
### Ingestion from a private AKS cluster
3636
By default, a private AKS cluster can send data to Managed Prometheus and your Azure Monitor workspace over the public network using a public Data Collection Endpoint.
3737

3838
If you choose to use an Azure Firewall to limit the egress from your cluster, you can implement one of the following:
@@ -42,7 +42,7 @@ If you choose to use an Azure Firewall to limit the egress from your cluster, yo
4242
- `*.ingest.monitor.azure.com`
4343
- Enable the Azure Firewall to access the Azure Monitor Private Link scope and DCE that's used for data ingestion.
4444

45-
## Private link ingestion for remote write
45+
### Private link ingestion for remote write
4646
Use the following steps to set up remote write for a Kubernetes cluster over a private link virtual network and an Azure Monitor Private Link scope.
4747

4848
1. Create your Azure virtual network.
@@ -63,10 +63,7 @@ Data for Container insights, is stored in a [Log Analytics workspace](../logs/lo
6363
6464
### Cluster using managed identity authentication
6565

66-
67-
### Existing AKS Cluster
68-
69-
**Use default Log Analytics workspace**
66+
**Existing AKS cluster with default Log Analytics workspace**
7067

7168
```azurecli
7269
az aks enable-addons --addon monitoring --name <cluster-name> --resource-group <cluster-resource-group-name> --ampls-resource-id "<azure-monitor-private-link-scope-resource-id>"
@@ -78,7 +75,7 @@ Example:
7875
az aks enable-addons --addon monitoring --name "my-cluster" --resource-group "my-resource-group" --workspace-resource-id "/subscriptions/my-subscription/resourceGroups/my-resource-group/providers/Microsoft.OperationalInsights/workspaces/my-workspace" --ampls-resource-id "/subscriptions/my-subscription /resourceGroups/my-resource-group/providers/microsoft.insights/privatelinkscopes/my-ampls-resource"
7976
```
8077

81-
**Use existing Log Analytics workspace**
78+
**Existing AKS cluster with existing Log Analytics workspace**
8279

8380
```azurecli
8481
az aks enable-addons --addon monitoring --name <cluster-name> --resource-group <cluster-resource-group-name> --workspace-resource-id <workspace-resource-id> --ampls-resource-id "<azure-monitor-private-link-scope-resource-id>"
@@ -90,7 +87,7 @@ Example:
9087
az aks enable-addons --addon monitoring --name "my-cluster" --resource-group "my-resource-group" --workspace-resource-id "/subscriptions/my-subscription/resourceGroups/my-resource-group/providers/Microsoft.OperationalInsights/workspaces/my-workspace" --ampls-resource-id "/subscriptions/my-subscription /resourceGroups/ my-resource-group/providers/microsoft.insights/privatelinkscopes/my-ampls-resource"
9188
```
9289

93-
### New AKS cluster
90+
**New AKS cluster**
9491

9592
```azurecli
9693
az aks create --resource-group rgName --name clusterName --enable-addons monitoring --workspace-resource-id "workspaceResourceId" --ampls-resource-id "azure-monitor-private-link-scope-resource-id"
@@ -103,7 +100,7 @@ az aks create --resource-group "my-resource-group" --name "my-cluster" --enabl
103100
```
104101

105102

106-
## Cluster using legacy authentication
103+
### Cluster using legacy authentication
107104
Use the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace using [Azure Private Link](../logs/private-link-security.md) if your cluster is not using managed identity authentication. This requires a [private AKS cluster](/azure/aks/private-clusters).
108105

109106
1. Create a private AKS cluster following the guidance in [Create a private Azure Kubernetes Service cluster](/azure/aks/private-clusters).

0 commit comments

Comments
 (0)