You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/private-link-security.md
+27-18Lines changed: 27 additions & 18 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,8 @@ In the Azure portal in your Azure Monitor Log Analytics workspace resource is a
133
133
First, you can connect this Log Analytics resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this workspace. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
134
134
135
135
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
136
-
If you set **Allow public network access for ingestion** to **No**, then machines outside of the connected scopes cannot upload data to this workspace. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to dashboards, query API, insights in the Azure portal, and more.
136
+
If you set **Allow public network access for ingestion** to **No**, then machines outside of the connected scopes cannot upload data to this workspace. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Experiences running outside the Azure portal which consume Log Analytics data also have to be running within the private-linked VNET.
137
+
137
138
138
139
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
139
140
@@ -142,39 +143,47 @@ Restricting access in this manner only applies to data in the workspace. Configu
142
143
143
144
## Configure Application Insights
144
145
145
-
Configuring Application Insights components
146
146
In the Azure portal in your Azure Monitor Application Insights Component resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click Add and select the Azure Monitor Private Link Scope. Click Apply to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
150
+
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the **Azure Monitor Private Link Scope**. Click Apply to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
151
151
152
-
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
153
-
If you set **Allow public network access for ingestion** to **No**, then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to dashboards, query API, insights in the Azure portal, and more.
152
+
Second, you can control how this resource can be reached from outside of the private link scopes listed previously. If you set **Allow public network access for ingestion** to **No** , then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No** , then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to APM logs, metrics, and live metrics stream, as well as experiences built on top such as workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Note that non-portal consumption experiences have to be running within the private linked VNET that includes the monitored workloads.
154
153
155
154
Restricting access in this manner only applies to data in the Application Insights resource. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
156
155
156
+
> [!NOTE]
157
+
> To fully secure workspace-based Application Insights, you need to lock down both access to Application Insights resource as well as the underlying Log Analytics workspace.
158
+
159
+
> [!NOTE]
160
+
> Code-level diagnostics (profiler/debugger) currently do not support Private Link.
161
+
162
+
## Use APIs and command line
157
163
158
-
## Collect LA Custom Logs over Private Link
164
+
You can automate the process described earlier using Azure Resource Manager templates and command-line interfaces.
159
165
160
-
Storage accounts are used in the ingestion process of several data types of logs. By default, service-managed storage accounts are used. However, you can now use your own storage accounts and gain control over the access rights, keys, content, encryption, and retention of your logs during ingestion.
166
+
To create and manage private link scopes, use [az monitor private-link-scope](https://docs.microsoft.com/en-us/cli/azure/monitor/private-link-scope?view=azure-cli-latest). Using this command, you can create scopes, associate Log Analytics workspaces and Application Insights components, and add/remove/approve private endpoints.
161
167
162
-
## Data types sent to storage accounts
168
+
To manage network access, use the flags `[--ingestion-access {Disabled, Enabled}]` and `[--query-access {Disabled, Enabled}]`on [Log Analytics workspaces](https://docs.microsoft.com/cli/azure/monitor/log-analytics/workspace?view=azure-cli-latest) or [Application Insights components](https://docs.microsoft.com/cli/azure/ext/application-insights/monitor/app-insights/component?view=azure-cli-latest).
163
169
164
-
The following data types require using your own "customer-managed storage" account. If you do not, these types will be blocked. --TODO reword---
170
+
## Collect Custom Logs over Private Link
165
171
166
-
- Custom logs
167
-
- ASC Watson dump files
172
+
Storage accounts are used in the ingestion process of custom logs. By default, service-managed storage accounts are used. However to ingest custom logs on private links, you must use your own storage accounts and associate them with Log Analytics workspace. See more details on how to setup such accounts using [command line](https://docs.microsoft.com/en-us/cli/azure/monitor/log-analytics/workspace/linked-storage?view=azure-cli-latest).
168
173
169
-
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
174
+
For information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
170
175
171
176
## Restrictions and limitations
172
177
173
-
### Log Analytics Windows agent
178
+
### Agents
179
+
180
+
The latest versions of the Windows and Linux agents must be used on private networks to enable secure telemetry ingestion to Log Analytics workspaces. Older versions cannot upload telemetry in a private network.
181
+
182
+
**Log Analytics Windows agent**
174
183
175
184
Your must use the Log Analytics agent version 18.20.18038.0 or later.
176
185
177
-
### Log Analytics Linux agent
186
+
**Log Analytics Linux agent**
178
187
179
188
You must use agent version 1.12.25 or later. If you cannot, run the following commands on your VM.
Profiles / Snapshots can be sent from applications running in your VNET, however, they cannot be seen from within the VNET. They can only be seen only if portal is accessed from the public internet.
197
+
To use Azure Monitor portal experiences such as Application Insights and Log Analytics, you need to allow the Azure portal and Azure Monitor extensions to be accessible on the private networks. Add **AzureActiveDirectory**, **AzureResourceManager**, **AzureFrontDoor.FirstParty** and **AzureFrontdoor.Frontend**[service tags](../..firewall/service-tags.md) to your firewall.
189
198
190
-
If you need to use the query experience from your VNET, add the **AzureActiveDirectory**[service tag](../..firewall/service-tags.md) to so you can authenticate. To use any part of the Azure Monitor portal that accesses the data in your workspace, add the **AzurePortal**, **AzureFrontDoor.Frontend** service tags to your firewall.
199
+
### Programmatic access
191
200
192
-
### Azure Resource Manager queries
201
+
To use the REST API, [CLI](https://docs.microsoft.com/cli/azure/monitor?view=azure-cli-latest) or PowerShell with Azure Monitor on private networks, add the [service tags](https://docs.microsoft.com/azure/virtual-network/service-tags-overview)**AzureActiveDirectory** and **AzureResourceManager** to your firewall.
193
202
194
-
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
203
+
Adding these tags allows you to perform actions such as quering log data, create and manage Log Analytics workspaces and AI components.
195
204
196
205
### Application Insights SDK downloads from a content delivery network
0 commit comments