Skip to content

Commit 72528b2

Browse files
committed
Update screenshots
1 parent 7c9d0a4 commit 72528b2

File tree

4 files changed

+7
-1
lines changed

4 files changed

+7
-1
lines changed

articles/managed-grafana/how-to-deterministic-ip.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ This example demonstrates how to disable public access to Azure Data Explorer an
7070

7171
1. Open an Azure Data Explorer Cluster instance in the Azure portal, and under **Settings**, select **Networking**.
7272
1. In the **Public Access** tab, select **Disabled** to disable public access to the data source.
73+
74+
:::image type="content" source="media/deterministic-ips/add-ip-data-source-firewall.png" alt-text="Screenshot of the Azure platform. Add Disable public network access.":::
75+
7376
1. Under **Firewall**, check the box **Add your client IP address** and under **Address range**, enter the IP addresses found in your Azure Managed Grafana workspace.
7477
1. Select **Save** to finish adding the Azure Managed Grafana outbound IP addresses to the allowlist.
7578

23.7 KB
Loading
53.4 KB
Loading

articles/managed-grafana/tutorial-mpe-oss-prometheus.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,10 @@ spec:
157157
## Connect with a managed private endpoint
158158

159159
1. If you don't have an Azure Managed Grafana workspace yet, create one by following the [Azure Managed Grafana quickstart](./quickstart-managed-grafana-portal.md).
160-
1. Open your Azure Managed Grafana workspace and go to **Networking** > **Managed Private Endpoint** > **Create**.
160+
1. Open your Azure Managed Grafana workspace and go to **Networking** > **Managed Private Endpoint** > **Add**.
161+
162+
:::image type="content" source="media/tutorial-managed-private-endpoint/create-managed-private-endpoint.png" alt-text="Screenshot of the Azure platform showing the managed private endpoints page within an Azure Managed Grafana resource.":::
163+
161164
1. Enter a name for your managed private endpoint and select your Azure subscription.
162165
1. For **Resource type** select **Microsoft.Network/privateLinkServices (Private link services)**, and for **Target resource**, select the `promManagedPls` private link service created in the above step. Each managed private endpoint gets a private IP address. You can also provide a domain name for this managed private endpoint. The Azure Managed Grafana service ensures that this domain is resolved to the managed private endpoint's private IP inside the Azure Managed Grafana environment. For example, set the domain to `*.prom.my-own-domain.com`.
163166
1. Approve the private endpoint connection by going to the promManagedPls resource. Under **Settings**, go **Private endpoint connections**, select your connection using the checkbox and **Approve**.

0 commit comments

Comments
 (0)