Skip to content

Commit 7a1a0b0

Browse files
committed
Final changes.
1 parent 470e3e9 commit 7a1a0b0

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

articles/azure-monitor/platform/private-link-security.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -151,6 +151,8 @@ First, you can connect this Application Insights resource to Azure Monitor Priva
151151

152152
Second, you can control how this resource can be reached from outside of the private link scopes listed previously. If you set **Allow public network access for ingestion** to **No** , then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No** , then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to APM logs, metrics, and live metrics stream, as well as experiences built on top such as workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Note that non-portal consumption experiences have to be running within the private linked VNET that includes the monitored workloads.
153153

154+
You’ll need to add resources hosting the monitored workloads to the private link. Here’s [documentation](https://docs.microsoft.com/en-us/azure/app-service/networking/private-endpoint) for how to do this for App Services.
155+
154156
Restricting access in this manner only applies to data in the Application Insights resource. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
155157

156158
> [!NOTE]
@@ -200,7 +202,7 @@ To use Azure Monitor portal experiences such as Application Insights and Log Ana
200202

201203
To use the REST API, [CLI](https://docs.microsoft.com/cli/azure/monitor?view=azure-cli-latest) or PowerShell with Azure Monitor on private networks, add the [service tags](https://docs.microsoft.com/azure/virtual-network/service-tags-overview) **AzureActiveDirectory** and **AzureResourceManager** to your firewall.
202204

203-
Adding these tags allows you to perform actions such as quering log data, create and manage Log Analytics workspaces and AI components.
205+
Adding these tags allows you to perform actions such as quering log data, create and manage Log Analytics workspaces and AI components.
204206

205207
### Application Insights SDK downloads from a content delivery network
206208

0 commit comments

Comments
 (0)