Skip to content

Commit 686623d

Browse files
authored
Merge pull request #206244 from lauradolan/ams-network
SAP AMS: edit network setup topic
2 parents b0d8021 + b885052 commit 686623d

File tree

2 files changed

+66
-64
lines changed

2 files changed

+66
-64
lines changed
Lines changed: 66 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -1,60 +1,57 @@
11
---
22
title: Set up network for Azure Monitor for SAP solutions (preview)
3-
description: This article provides details to consider network setup while setting up Azure monitor for SAP solutions.
3+
description: Learn how to set up an Azure virtual network for use with Azure Monitor for SAP solutions.
44
author: MightySuz
55
ms.service: virtual-machines-sap
66
ms.subservice: baremetal-sap
7-
ms.topic: article
8-
ms.date: 07/21/2022
7+
ms.topic: how-to
8+
ms.date: 07/28/2022
99
ms.author: sujaj
10-
10+
#Customer intent: As a developer, I want to set up an Azure virtual network so that I can use Azure Monitor for SAP solutions.
1111
---
1212
# Set up network for Azure monitor for SAP solutions (preview)
1313

1414
[!INCLUDE [Azure Monitor for SAP solutions public preview notice](./includes/preview-azure-monitor.md)]
1515

16-
Before you can deploy Azure Monitor for SAP solutions (AMS), you need to configure an Azure virtual network with all necessary settings.
16+
In this how-to guide, you'll learn how to configure an Azure virtual network so that you can deploy *Azure Monitor for SAP solutions (AMS)*. You'll learn to [create a new subnet](#create-new-subnet) for use with Azure Functions for both versions of the product, *AMS* and *AMS (classic)*. Then, if you're using the current version of AMS, you'll learn to [set up outbound internet access](#configure-outbound-internet-access) to the SAP environment that you want to monitor.
1717

18-
## Configure new subnet
18+
## Create new subnet
1919

20+
> [!NOTE]
21+
> This section applies to both AMS and AMS (classic).
2022
21-
> [!IMPORTANT]
22-
> The following steps apply to both *current* and *classic* versions of AMS.
23+
Azure Functions is the data collection engine for AMS. You'll need to create a new subnet to host Azure Functions.
2324

24-
Create a [new subnet with an **IPv4/28** block or larger](../../../azure-functions/functions-networking-options.md#subnets). Then, make sure there's network connectivity between the new subnet and any target systems that you want to monitor.
25+
[Create a new subnet](../../../azure-functions/functions-networking-options.md#subnets) with an **IPv4/28** block or larger.
2526

26-
You'll use this new subnet to host Azure Functions, which is the telemetry collection engine for AMS. For more information, see how to [integrate your app with an Azure virtual network](../../../app-service/overview-vnet-integration.md).
27+
For more information, see how to [integrate your app with an Azure virtual network](../../../app-service/overview-vnet-integration.md).
2728

2829
## Configure outbound internet access
2930

3031
> [!IMPORTANT]
31-
> The following steps only apply to the *current* version of AMS, and not the *classic* version.
32+
> This section only applies to the current version of AMS. If you're using AMS (classic), skip this section.
3233
33-
34-
In many use cases, you might choose to restrict or block outbound internet access to your SAP network environment. However, AMS requires network connectivity between the [subnet that you configured](#configure-new-subnet) and the systems that you want to monitor. Before you deploy an AMS resource, you need to configure outbound internet access or the deployment will fail.
34+
In many use cases, you might choose to restrict or block outbound internet access to your SAP network environment. However, AMS requires network connectivity between the [subnet that you configured](#create-new-subnet) and the systems that you want to monitor. Before you deploy an AMS resource, you need to configure outbound internet access, or the deployment will fail.
3535

3636
There are multiple methods to address restricted or blocked outbound internet access. Choose the method that works best for your use case:
3737

3838
- [Use the **Route All** feature in Azure functions](#use-route-all)
3939
- [Use service tags with a network security group (NSG) in your virtual network](#use-service-tags)
4040
- [Use a private endpoint for your subnet](#use-private-endpoint)
4141

42-
4342
### Use Route All
4443

45-
**Route All** is a [standard feature of virtual network integration](../../../azure-functions/functions-networking-options.md#virtual-network-integration) in Azure Functions, which is deployed as part of AMS. Enabling or disabling this setting only impacts traffic from Azure Functions. This setting doesn't impact any other incoming or outgoing traffic within your virtual network.
44+
**Route All** is a [standard feature of virtual network integration](../../../azure-functions/functions-networking-options.md#virtual-network-integration) in Azure Functions, which is deployed as part of AMS. Enabling or disabling this setting only affects traffic from Azure Functions. This setting doesn't affect any other incoming or outgoing traffic within your virtual network.
4645

4746
You can configure the **Route All** setting when you create an AMS resource through the Azure portal. If your SAP environment doesn't allow outbound internet access, disable **Route All**. If your SAP environment allows outbound internet access, keep the default setting to enable **Route All**.
4847

49-
> [!NOTE]
50-
> You can only use this option before you deploy an AMS resource. It's not possible to change the **Route All** setting after you create the AMS resource.
48+
You can only use this option before you deploy an AMS resource. It's not possible to change the **Route All** setting after you create the AMS resource.
5149

5250
### Use service tags
5351

5452
If you use NSGs, you can create AMS-related [virtual network service tags](../../../virtual-network/service-tags-overview.md) to allow appropriate traffic flow for your deployment. A service tag represents a group of IP address prefixes from a given Azure service.
5553

56-
> [!NOTE]
57-
> You can use this option after you've deployed an AMS resource.
54+
You can use this option after you've deployed an AMS resource.
5855

5956
1. Find the subnet associated with your AMS managed resource group:
6057
1. Sign in to the [Azure portal](https://portal.azure.com).
@@ -71,88 +68,91 @@ If you use NSGs, you can create AMS-related [virtual network service tags](../..
7168

7269
| **Priority** | **Name** | **Port** | **Protocol** | **Source** | **Destination** | **Action** |
7370
|--------------|--------------------------|----------|--------------|------------|----------------------|------------|
74-
| 450 | allow_monitor | 443 | TCP | | AzureMonitor | Allow |
75-
| 501 | allow_keyVault | 443 | TCP | | AzureKeyVault | Allow |
71+
| 450 | allow_monitor | 443 | TCP | | Azure Monitor | Allow |
72+
| 501 | allow_keyVault | 443 | TCP | | Azure Key Vault | Allow |
7673
| 550 | allow_storage | 443 | TCP | | Storage | Allow |
77-
| 600 | allow_azure_controlplane | 443 | Any | | AzureResourceManager | Allow |
74+
| 600 | allow_azure_controlplane | 443 | Any | | Azure Resource Manager | Allow |
7875
| 660 | deny_internet | Any | Any | Any | Internet | Deny |
7976

8077

81-
AMS subnet IP refers to Ip of subnet associated with AMS resource
82-
83-
![Diagram shows the subnet associated with ams resource.](./media/azure-monitor-sap/azure-monitor-network-subnet.png)
78+
The AMS subnet IP address refers to the IP of the subnet associated with your AMS resource. To find the subnet, go to the AMS resource in the Azure portal. On the **Overview** page, review the **vNet/subnet** value.
8479

8580
For the rules that you create, **allow_vnet** must have a lower priority than **deny_internet**. All other rules also need to have a lower priority than **allow_vnet**. However, the remaining order of these other rules is interchangeable.
8681

8782
### Use private endpoint
88-
You can enable a private endpoint by creating a new subnet in the same virtual network as the system that you want to monitor. No other resources can use this subnet, so it's not possible to use the same subnet as Azure Functions for your private endpoint.
89-
To create a private endpoint for AMS:
9083

84+
You can enable a private endpoint by creating a new subnet in the same virtual network as the system that you want to monitor. No other resources can use this subnet. It's not possible to use the same subnet as Azure Functions for your private endpoint.
85+
86+
To create a private endpoint for AMS:
9187

9288
1. [Create a new subnet](../../../virtual-network/virtual-network-manage-subnet.md#add-a-subnet) in the same virtual network as the SAP system that you're monitoring.
9389
1. In the Azure portal, go to your AMS resource.
9490
1. On the **Overview** page for the AMS resource, select the **Managed resource group**.
95-
A private endpoint connection needs to be created for the following resources inside the managed resource group:
96-
1. Key-vault,
97-
2. Storage-account, and
98-
3. Log-analytics workspace
91+
1. Create a private endpoint connection for the following resources inside the managed resource group.
92+
1. [Azure Key Vault resources](#create-key-vault-endpoint)
93+
2. [Azure Storage resources](#create-storage-endpoint)
94+
3. [Azure Log Analytics workspaces](#create-log-analytics-endpoint)
9995

100-
![Diagram that shows LogAnalytics screen.](https://user-images.githubusercontent.com/33844181/176844487-388fbea4-4821-4c8d-90af-917ff9c0ba48.png)
101-
102-
###### Key Vault
96+
#### Create key vault endpoint
10397

104-
Only 1 private endpoint is required for all the key vault resources (secrets, certificates, and keys). Once a private endpoint is created for key vault, the vault resources cannot be accessed from systems outside the given vnet.
98+
You only need one private endpoint for all the Azure Key Vault resources (secrets, certificates, and keys). Once a private endpoint is created for key vault, the vault resources can't be accessed from systems outside the given vnet.
10599

106100
1. On the key vault resource's menu, under **Settings**, select **Networking**.
107101
1. Select the **Private endpoint connections** tab.
108102
1. Select **Create** to open the endpoint creation page.
109103
1. On the **Basics** tab, enter or select all required information.
110-
1. On the **Resource** tab, enter or select all required information. For the key vault resource, there's only one sub-resource available, the vault.
104+
1. On the **Resource** tab, enter or select all required information. For the key vault resource, there's only one subresource available, the vault.
111105
1. On the **Virtual Network** tab, select the virtual network and the subnet that you created specifically for the endpoint. It's not possible to use the same subnet as the Azure Functions app.
112106
1. On the **DNS** tab, for **Integrate with private DNS zone**, select **Yes**. If necessary, add tags.
113107
1. Select **Review + create** to create the private endpoint.
114108
1. On the **Networking** page again, select the **Firewalls and virtual networks** tab.
115109
1. For **Allow access from**, select **Allow public access from all networks**.
116110
1. Select **Apply** to save the changes.
117111

118-
### Create storage endpoint
112+
#### Create storage endpoint
119113

120114
It's necessary to create a separate private endpoint for each Azure Storage account resource, including the queue, table, storage blob, and file. If you create a private endpoint for the storage queue, it's not possible to access the resource from systems outside of the virtual networking, including the Azure portal. However, other resources in the same storage account are accessible.
121115

122-
Repeat the following process for each type of storage sub-resource (table, queue, blob, and file):
116+
Repeat the following process for each type of storage subresource (table, queue, blob, and file):
123117

124118
1. On the storage account's menu, under **Settings**, select **Networking**.
125119
1. Select the **Private endpoint connections** tab.
126120
1. Select **Create** to open the endpoint creation page.
127121
1. On the **Basics** tab, enter or select all required information.
128-
1. On the **Resource** tab, enter or select all required information. For the **Target sub-resource**, select one of the sub-resource types (table, queue, blob, or file).
122+
1. On the **Resource** tab, enter or select all required information. For the **Target sub-resource**, select one of the subresource types (table, queue, blob, or file).
129123
1. On the **Virtual Network** tab, select the virtual network and the subnet that you created specifically for the endpoint. It's not possible to use the same subnet as the Azure Functions app.
130124
1. On the **DNS** tab, for **Integrate with private DNS zone**, select **Yes**. If necessary, add tags.
131125
1. Select **Review + create** to create the private endpoint.
132126
1. On the **Networking** page again, select the **Firewalls and virtual networks** tab.
133127
1. For **Allow access from**, select **Allow public access from all networks**.
134128
1. Select **Apply** to save the changes.
135129

136-
### Create log analytics endpoint
130+
#### Create log analytics endpoint
137131

138132
It's not possible to create a private endpoint directly for a Log Analytics workspace. To enable a private endpoint for this resource, you can connect the resource to an [Azure Monitor Private Link Scope (AMPLS)](../../../azure-monitor/logs/private-link-security.md). Then, you can create a private endpoint for the AMPLS resource.
139133

140134
If possible, create the private endpoint before you allow any system to access the Log Analytics workspace through a public endpoint. Otherwise, you'll need to restart the Function App before you can access the Log Analytics workspace through the private endpoint.
141135

136+
Select a scope for the private endpoint:
137+
142138
1. Go to the Log Analytics workspace in the Azure portal.
143139
1. In the resource menu, under **Settings**, select **Network isolation**.
144140
1. Select **Add** to create a new AMPLS setting.
145141
1. Select the appropriate scope for the endpoint. Then, select **Apply**.
146-
To enable private endpoint for Azure Monitor Private Link Scope, go to Private Endpoint connections tab under configure.
147-
![Diagram shows EndPoint Resources.](https://user-images.githubusercontent.com/33844181/176845102-3b5d813e-eb0d-445c-a5fb-9262947eda77.png)
148142

149-
1. Select the **Private endpoint connections** tab.
150-
1. Select **Create** to open the endpoint creation page.
143+
Create the private endpoint:
144+
145+
1. Go to the AMPLS resource in the Azure portal.
146+
1. In the resource menu, under **Configure**, select **Private Endpoint connections**.
147+
1. Select **Private Endpoint** to create a new endpoint.
151148
1. On the **Basics** tab, enter or select all required information.
152149
1. On the **Resource** tab, enter or select all required information.
153150
1. On the **Virtual Network** tab, select the virtual network and the subnet that you created specifically for the endpoint. It's not possible to use the same subnet as the Azure Functions app.
154151
1. On the **DNS** tab, for **Integrate with private DNS zone**, select **Yes**. If necessary, add tags.
155152
1. Select **Review + create** to create the private endpoint.
153+
154+
Configure the scope:
155+
156156
1. Go to the Log Analytics workspace in the Azure portal.
157157
1. In the resource's menu, under **Settings**, select **Network Isolation**.
158158
1. Under **Virtual networks access configuration**:
@@ -167,7 +167,7 @@ If you enable a private endpoint after any system accessed the Log Analytics wor
167167
1. On the managed resource group's page, select the **Function App**.
168168
1. On the Function App's **Overview** page, select **Restart**.
169169

170-
Next, find and note important IP address ranges.
170+
Find and note important IP address ranges:
171171

172172
1. Find the AMS resource's IP address range.
173173
1. Go to the AMS resource in the Azure portal.
@@ -178,27 +178,29 @@ Next, find and note important IP address ranges.
178178
1. On the **Overview** page, note the **Private endpoint** in the resource group.
179179
1. In the resource group's menu, under **Settings**, select **DNS configuration**.
180180
1. On the **DNS configuration** page, note the **IP addresses** for the private endpoint.
181+
1. Find the subnet for the log analytics private endpoint.
182+
1. Go to the private endpoint created for the AMPLS resource.
183+
2. On the private endpoint's menu, under **Settings**, select **DNS configuration**.
184+
3. On the **DNS configuration** page, note the associated IP addresses.
185+
4. Go to the AMS resource in the Azure portal.
186+
5. On the **Overview** page, select the **vNet/subnet** to go to that resource.
187+
6. On the virtual network page, select the subnet that you used to create the AMS resource.
181188

182-
1. For Log analytics private endpoint: Go to the private endpoint created for Azure Monitor Private Link Scope resource.
183-
184-
![Diagram that shows linked scope resource.](https://user-images.githubusercontent.com/33844181/176845649-0ccef546-c511-4373-ac3d-cbf9e857ca78.png)
185-
186-
1. On the private endpoint's menu, under **Settings**, select **DNS configuration**.
187-
1. On the **DNS configuration** page, note the associated IP addresses.
188-
1. Go to the AMS resource in the Azure portal.
189-
1. On the **Overview** page, select the **vNet/subnet** to go to that resource.
190-
1. On the virtual network page, select the subnet that you used to create the AMS resource.
189+
Add outbound security rules:
191190

192191
1. Go to the NSG resource in the Azure portal.
193192
1. In the NSG menu, under **Settings**, select **Outbound security rules**.
194-
The below image contains the required security rules for AMS resource to work.
195-
![Diagram that shows Security Roles.](https://user-images.githubusercontent.com/33844181/176845846-44bbcb1a-4b86-4158-afa8-0eebd1378655.png)
196-
193+
1. Add the following required security rules.
194+
195+
| Priority | Description |
196+
| -------- | ------------- |
197+
| 550 | Allow the source IP for making calls to source system to be monitored. |
198+
| 600 | Allow the source IP for making calls Azure Resource Manager service tag. |
199+
| 650 | Allow the source IP to access key-vault resource using private endpoint IP. |
200+
| 700 | Allow the source IP to access storage-account resources using private endpoint IP. (Include IPs for each of storage account sub resources: table, queue, file, and blob) |
201+
| 800 | Allow the source IP to access log-analytics workspace resource using private endpoint IP. |
202+
203+
## Next steps
197204

198-
| Priority | Description |
199-
| -------- | ------------- |
200-
| 550 | Allow the source IP for making calls to source system to be monitored. |
201-
| 600 | Allow the source IP for making calls AzureResourceManager service tag. |
202-
| 650 | Allow the source IP to access key-vault resource using private endpoint IP. |
203-
| 700 | Allow the source IP to access storage-account resources using private endpoint IP. (Include IPs for each of storage account sub resources: table, queue, file, and blob) |
204-
| 800 | Allow the source IP to access log-analytics workspace resource using private endpoint IP. |
205+
- [Quickstart: set up AMS through the Azure portal](azure-monitor-sap-quickstart.md)
206+
- [Quickstart: set up AMS with PowerShell](azure-monitor-sap-quickstart-powershell.md)

0 commit comments

Comments
 (0)