Skip to content

Commit 615209b

Browse files
committed
added filed
1 parent 837800a commit 615209b

File tree

5 files changed

+29
-36
lines changed

5 files changed

+29
-36
lines changed

articles/azure-monitor/agents/agents-overview.md

Lines changed: 5 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -6,19 +6,19 @@ services: azure-monitor
66
ms.topic: conceptual
77
author: bwren
88
ms.author: bwren
9-
ms.date: 07/22/2021
9+
ms.date: 03/16/2021
1010
---
1111

1212
# Overview of Azure Monitor agents
1313

1414
Virtual machines and other compute resources require an agent to collect monitoring data required to measure the performance and availability of their guest operating system and workloads. This article describes the agents used by Azure Monitor and helps you determine which you need to meet the requirements for your particular environment.
1515

1616
> [!NOTE]
17-
> Azure Monitor recently launched a new agent, the Azure Monitor agent, that provides all capabilities necessary to collect guest operating system monitoring data. While there are multiple legacy agents that exist due to the consolidation of Azure Monitor and Log Analytics, each with their unique capabilities with some overlap, we recommend that you use the new agent that aims to consolidate features from all existing agents, and provide additional benefits. [Learn More](./azure-monitor-agent-overview.md)
17+
> Azure Monitor recently launched a new agent, the [Azure Monitor agent](./azure-monitor-agent-overview.md), that provides all capabilities necessary to collect guest operating system monitoring data. **Use this new agent if you don't require the current limitations**, as it consolidates the features of all the legacy agents listed below and provides additional benefits. If you do require the limitations today, you may continue using the other legacy agents listed below until **August 2024**. [Learn more](./azure-monitor-agent-overview.md)
1818
1919
## Summary of agents
2020

21-
The following tables provide a quick comparison of the Azure Monitor agents for Windows and Linux. Further detail on each is provided in the section below.
21+
The following tables provide a quick comparison of the telemetry agents for Windows and Linux. Further detail on each is provided in the section below.
2222

2323
### Windows agents
2424

@@ -61,17 +61,11 @@ Use the Azure Monitor agent if you need to:
6161
- Use different [solutions](../monitor-reference.md#insights-and-curated-visualizations) to monitor a particular service or application. */
6262
-->
6363

64-
Limitations of the Azure Monitor Agent include:
65-
66-
- Not yet supported by all features in production. See [Supported services and features](./azure-monitor-agent-overview.md#supported-services-and-features).
67-
- No support yet for networking scenarios involving private links.
68-
- No support yet collecting custom logs (files) or IIS log files.
69-
- No support yet for Event Hubs and Storage accounts as destinations.
70-
- No support for Hybrid Runbook workers.
64+
When compared with the legacy agents, the Azure Monitor Agent has [these limitations currently](./azure-monitor-agent-overview.md#current-limitations).
7165

7266
## Log Analytics agent
7367

74-
The [Log Analytics agent](./log-analytics-agent.md) collects monitoring data from the guest operating system and workloads of virtual machines in Azure, other cloud providers, and on-premises machines. It sends data to a Log Analytics workspace. The Log Analytics agent is the same agent used by System Center Operations Manager, and you can multihome agent computers to communicate with your management group and Azure Monitor simultaneously. This agent is also required by certain insights in Azure Monitor and other services in Azure.
68+
The legacy [Log Analytics agent](./log-analytics-agent.md) collects monitoring data from the guest operating system and workloads of virtual machines in Azure, other cloud providers, and on-premises machines. It sends data to a Log Analytics workspace. The Log Analytics agent is the same agent used by System Center Operations Manager, and you can multihome agent computers to communicate with your management group and Azure Monitor simultaneously. This agent is also required by certain insights in Azure Monitor and other services in Azure.
7569

7670
> [!NOTE]
7771
> The Log Analytics agent for Windows is often referred to as Microsoft Monitoring Agent (MMA). The Log Analytics agent for Linux is often referred to as OMS agent.

articles/azure-monitor/agents/azure-monitor-agent-data-collection-endpoint.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,19 @@
11
---
2-
title: Using data collection endpoints with Azure Monitor agent (preview)
2+
title: Using data collection endpoints with Azure Monitor agent
33
description: Use data collection endpoints to uniquely configure ingestion settings for your machines.
44
ms.topic: conceptual
55
author: shseth
66
ms.author: shseth
7-
ms.date: 1/5/2022
7+
ms.date: 3/16/2022
88
ms.custom: references_region
99

1010
---
1111

12-
# Using data collection endpoints with Azure Monitor agent (preview)
12+
# Using data collection endpoints with Azure Monitor agent
1313
[Data Collection Endpoints (DCEs)](../essentials/data-collection-endpoint-overview.md) allow you to uniquely configure ingestion settings for your machines, giving you greater control over your networking requirements.
1414

1515
## Create data collection endpoint
16-
See [Data collection endpoints in Azure Monitor (preview)](../essentials/data-collection-endpoint-overview.md) for details on data collection endpoints and how to create them.
16+
See [Data collection endpoints in Azure Monitor](../essentials/data-collection-endpoint-overview.md) for details on data collection endpoints and how to create them.
1717

1818
## Create endpoint association in Azure portal
1919
Use **Data collection rules** in the portal to associate endpoints with a resource (e.g. a virtual machine) or a set of resources. Create a new rule or open an existing rule. In the **Resources** tab, click on the **Data collection endpoint** drop-down to associate an existing endpoint for your resource in the same region (or select multiple resources in the same region to bulk-assign an endpoint for them). Doing this creates an association per resource which links the endpoint to the resource. The Azure Monitor agent running on these resources will now start using the endpoint instead for uploading data to Azure Monitor.

articles/azure-monitor/agents/azure-monitor-agent-overview.md

Lines changed: 16 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Overview of the Azure Monitor agent, which collects monitoring data
44
ms.topic: conceptual
55
author: bwren
66
ms.author: bwren
7-
ms.date: 3/9/2022
7+
ms.date: 3/16/2022
88
ms.custom: references_regions
99
---
1010

@@ -13,7 +13,7 @@ The Azure Monitor agent (AMA) collects monitoring data from the guest operating
1313
Here's an **introductory video** explaining all about this new agent, including a quick demo of how to set things up using the Azure Portal: [ITOps Talk: Azure Monitor Agent](https://www.youtube.com/watch?v=f8bIrFU8tCs)
1414

1515
## Relationship to other agents
16-
The Azure Monitor agent replaces the following legacy agents that are currently used by Azure Monitor to collect guest data from virtual machines ([view known gaps](../faq.yml)):
16+
The Azure Monitor agent is meant to replace the following legacy monitoring agents that are currently used by Azure Monitor to collect guest data from virtual machines ([view known gaps](../faq.yml)):
1717

1818
- [Log Analytics agent](./log-analytics-agent.md): Sends data to a Log Analytics workspace and supports VM insights and monitoring solutions.
1919
- [Diagnostics extension](./diagnostics-extension-overview.md): Sends data to Azure Monitor Metrics (Windows only), Azure Event Hubs, and Azure Storage.
@@ -88,7 +88,7 @@ The following table shows the current support for the Azure Monitor agent with o
8888
| Azure service | Current support | More information |
8989
|:---|:---|:---|
9090
| [Microsoft Defender for Cloud](../../security-center/security-center-introduction.md) | Private preview | [Sign-up link](https://aka.ms/AMAgent) |
91-
| [Microsoft Sentinel](../../sentinel/overview.md) | <ul><li>Windows Forwarding Event (WEF): [Public preview](../../sentinel/data-connectors-reference.md#windows-forwarded-events-preview)</li><li>Windows Security Events: [Generally available](../../sentinel/connect-windows-security-events.md?tabs=AMA)</li></ul> | <ul><li>No sign-up needed </li><li>No sign-up needed</li></ul> |
91+
| [Microsoft Sentinel](../../sentinel/overview.md) | <ul><li>Linux Syslog CEF (Common Event Format): Private preview</li><li>Windows Forwarding Event (WEF): [Public preview](../../sentinel/data-connectors-reference.md#windows-forwarded-events-preview)</li><li>Windows Security Events: [Generally available](../../sentinel/connect-windows-security-events.md?tabs=AMA)</li></ul> | <ul><li>[Sign-up link](https://aka.ms/AMAgent)</li><li>No sign-up needed </li><li>No sign-up needed</li></ul> |
9292

9393
The following table shows the current support for the Azure Monitor agent with Azure Monitor features.
9494

@@ -97,7 +97,6 @@ The following table shows the current support for the Azure Monitor agent with A
9797
| File based logs and Windows IIS logs | Private preview | [Sign-up link](https://aka.ms/amadcr-privatepreviews) |
9898
| Windows Client OS installer | Private preview | [Sign-up link](https://aka.ms/amadcr-privatepreviews) |
9999
| [VM insights](../vm/vminsights-overview.md) | Private preview | [Sign-up link](https://aka.ms/amadcr-privatepreviews) |
100-
| [Connect using private links](azure-monitor-agent-data-collection-endpoint.md) | Public preview | No sign-up needed |
101100

102101
The following table shows the current support for the Azure Monitor agent with Azure solutions.
103102

@@ -148,40 +147,40 @@ The Azure Monitor agent extensions for Windows and Linux can communicate either
148147

149148
| Parameter | Value |
150149
|:---|:---|
151-
| settingsHashtable | A JSON object from the preceding flowchart converted to a hashtable. Skip if not applicable. An example is {"proxy":{"mode":"application","address":"http://[address]:[port]","auth": false}}. |
152-
| protectedSettingsHashtable | A JSON object from the preceding flowchart converted to a hashtable. Skip if not applicable. An example is {"proxy":{"username": "[username]","password": "[password]"}}. |
150+
| settingsString | A JSON string value from the preceding flowchart. Skip if not applicable. |
151+
| protectedSettingsHashtable | A JSON string value from the preceding flowchart. Skip if not applicable. |
153152

154153
# [Windows VM](#tab/PowerShellWindows)
155154

156155
```powershell
157-
$settingsHashtable = @{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": false}};
158-
$protectedSettingsHashtable = @{"proxy":{"username": "[username]","password": "[password]"}};
156+
$settingsString = '{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": true}}';
157+
$protectedSettingsString = '{"proxy":{"username":"[username]","password": "[password]"}}';
159158
160-
Set-AzVMExtension -ExtensionName AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion 1.0 -Settings <settingsHashtable> -ProtectedSettings <protectedSettingsHashtable>
159+
Set-AzVMExtension -ExtensionName AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion 1.0 -Settings $settingsString -ProtectedSettings $protectedSettingsString
161160
```
162161

163162
# [Linux VM](#tab/PowerShellLinux)
164163
```powershell
165-
$settingsHashtable = @{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": false}};
164+
$settingsHashtable = @{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": true}};
166165
$protectedSettingsHashtable = @{"proxy":{"username": "[username]","password": "[password]"}};
167166
168-
Set-AzVMExtension -ExtensionName AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion 1.5 -Settings <settingsHashtable> -ProtectedSettings <protectedSettingsHashtable>
167+
Set-AzVMExtension -ExtensionName AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -VMName <virtual-machine-name> -Location <location> -TypeHandlerVersion 1.5 -Settings $settingsString -ProtectedSettings $protectedSettingsString
169168
```
170169

171170
# [Windows Arc enabled server](#tab/PowerShellWindowsArc)
172171
```powershell
173-
$settingsHashtable = @{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": false}};
174-
$protectedSettingsHashtable = @{"proxy":{"username": "[username]","password": "[password]"}};
172+
$settingsString = '{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": true}}';
173+
$protectedSettingsString = '{"proxy":{"username":"[username]","password": "[password]"}}';
175174
176-
New-AzConnectedMachineExtension -Name AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Settings <settingsHashtable> -ProtectedSettings <protectedSettingsHashtable>
175+
New-AzConnectedMachineExtension -Name AzureMonitorWindowsAgent -ExtensionType AzureMonitorWindowsAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Settings $settingsString -ProtectedSettings $protectedSettingsString
177176
```
178177

179178
# [Linux Arc enabled server](#tab/PowerShellLinuxArc)
180179
```powershell
181-
$settingsHashtable = @{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": false}};
182-
$protectedSettingsHashtable = @{"proxy":{"username": "[username]","password": "[password]"}};
180+
$settingsString = '{"proxy":{"mode":"application","address":"http://[address]:[port]","auth": true}}';
181+
$protectedSettingsString = '{"proxy":{"username":"[username]","password": "[password]"}}';
183182
184-
New-AzConnectedMachineExtension -Name AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Settings <settingsHashtable> -ProtectedSettings <protectedSettingsHashtable>
183+
New-AzConnectedMachineExtension -Name AzureMonitorLinuxAgent -ExtensionType AzureMonitorLinuxAgent -Publisher Microsoft.Azure.Monitor -ResourceGroupName <resource-group-name> -MachineName <arc-server-name> -Location <arc-server-location> -Settings $settingsString -ProtectedSettings $protectedSettingsString
185184
```
186185

187186
---

articles/azure-monitor/agents/data-collection-rule-azure-monitor-agent.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ Additionally, choose the appropriate **Platform Type** which specifies the type
4848

4949
In the **Resources** tab, add the resources (virtual machines, virtual machine scale sets, Arc for servers) that should have the Data Collection Rule applied. The Azure Monitor Agent will be installed on resources that don't already have it installed, and will enable Azure Managed Identity as well.
5050

51-
### Private link configuration using data collection endpoints (preview)
51+
### Private link configuration using data collection endpoints
5252
If you need network isolation using private links for collecting data using agents from your resources, simply select existing endpoints (or create a new endpoint) from the same region for the respective resource(s) as shown below. See [how to create data collection endpoint](../essentials/data-collection-endpoint-overview.md).
5353

5454
[![Data Collection Rule virtual machines](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png)](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png#lightbox)

articles/azure-monitor/essentials/data-collection-endpoint-overview.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
---
2-
title: Data collection endpoints in Azure Monitor (preview)
2+
title: Data collection endpoints in Azure Monitor
33
description: Overview of data collection endpoints (DCEs) in Azure Monitor including their contents and structure and how you can create and work with them.
44
ms.topic: conceptual
5-
ms.date: 02/21/2022
5+
ms.date: 03/16/2022
66
ms.custom: references_region
77

88
---
99

10-
# Data collection endpoints in Azure Monitor (preview)
10+
# Data collection endpoints in Azure Monitor
1111
Data Collection Endpoints (DCEs) allow you to uniquely configure ingestion settings for Azure Monitor. This article provides an overview of data collection endpoints including their contents and structure and how you can create and work with them.
1212

1313
## Workflows that use DCEs

0 commit comments

Comments
 (0)