You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-private-link.md
+37-26Lines changed: 37 additions & 26 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ This article describes how to configure Container insights to use Azure Private
16
16
### [CLI](#tab/cli)
17
17
18
18
19
-
### Pre-requisite
19
+
### Pre-requisites
20
20
- Azure CLI version 2.61.0 or higher.
21
21
- Azure Monitor Private Link Scope (AMPLS)
22
22
@@ -35,7 +35,7 @@ Example:
35
35
az aks enable-addons --addon monitoring --name "my-cluster" --resource-group "my-resource-group" --workspace-resource-id "/subscriptions/my-subscription/resourceGroups/my-resource-group/providers/Microsoft.OperationalInsights/workspaces/my-workspace" --ampls-resource-id "/subscriptions/my-subscription /resourceGroups/ my-resource-group/providers/microsoft.insights/privatelinkscopes/my-ampls-resource"
36
36
```
37
37
38
-
**Existing Log Analytics workspace**
38
+
**Use existing Log Analytics workspace**
39
39
40
40
```azurecli
41
41
az aks enable-addons --addon monitoring --name <cluster-name> --resource-group <cluster-resource-group-name> --workspace-resource-id <workspace-resource-id> --ampls-resource-id "<azure-monitor-private-link-scope-resource-id>"
@@ -56,46 +56,57 @@ az aks create --resource-group rgName --name clusterName --enable-addons monitor
56
56
Example:
57
57
58
58
```azurecli
59
-
az aks create --resource-group “my-resource-group” --name "my-cluster" --enable-addons monitoring --workspace-resource-id "/subscriptions/my-subscription/resourceGroups/my-resource-group/providers/Microsoft.OperationalInsights/workspaces/my-workspace" --ampls-resource-id "/subscriptions/my-subscription /resourceGroups/ my-resource-group/providers/microsoft.insights/privatelinkscopes/my-ampls-resource"
59
+
az aks create --resource-group "my-resource-group" --name "my-cluster" --enable-addons monitoring --workspace-resource-id "/subscriptions/my-subscription/resourceGroups/my-resource-group/providers/Microsoft.OperationalInsights/workspaces/my-workspace" --ampls-resource-id "/subscriptions/my-subscription /resourceGroups/ my-resource-group/providers/microsoft.insights/privatelinkscopes/my-ampls-resource"
60
60
```
61
61
62
62
63
63
### [ARM](#tab/arm)
64
64
65
+
The following sections provide links to the template and parameter files for enabling private link with Container insights on an AKS and Arc-enabled clusters.
66
+
67
+
Edit the values in the parameter file and deploy the template using any valid method for deploying ARM templates. Retrieve the **resource ID** of the resources from the **JSON** View of their **Overview** page.
68
+
69
+
Based on your requirements, you can configure other parameters such `streams`, `enableContainerLogV2`, `enableSyslog`, `syslogLevels`, `syslogFacilities`, `dataCollectionInterval`, `namespaceFilteringModeForDataCollection` and `namespacesForDataCollection`.
70
+
65
71
### Prerequisites
66
72
- Azure Monitor Private Link Scope (AMPLS)
67
73
- The template must be deployed in the same resource group as the cluster.
|`aksResourceLocation`| Azure Region of the cluster. |
86
+
|`workspaceResourceId`| Resource ID of the Log Analytics workspace. |
87
+
|`workspaceRegion`| Region of the Log Analytics workspace. |
88
+
|`resourceTagValues`| Tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name will be MSCI-\<clusterName\>-\<clusterRegion\>, and this resource created in an AKS clusters resource group. For first time onboarding, you can set arbitrary tag values. |
89
+
|`useAzureMonitorPrivateLinkScope`| Boolean flag to indicate whether Azure Monitor link scope is used or not. |
90
+
|`azureMonitorPrivateLinkScopeResourceId`| Resource ID of the Azure Monitor Private link scope. This only used if `useAzureMonitorPrivateLinkScope` is set to **true**. |
80
91
81
-
2. Edit the following values in the parameter file. Retrieve the **resource ID** of the resources from the **JSON** View of their **Overview** page.
92
+
### Arc-enabled Kubernetes cluster
82
93
83
-
| Parameter | Description |
84
-
|:---|:---|
85
-
| AKS: `aksResourceId`<br>Arc: `clusterResourceId` | Resource ID of the cluster. |
86
-
| AKS: `aksResourceLocation`<br>Arc: `clusterRegion` | Azure Region of the cluster. |
87
-
| AKS: `workspaceResourceId`<br>Arc: `workspaceResourceId` | Resource ID of the Log Analytics workspace. |
88
-
| AKS: `workspaceRegion`<br>Arc: `workspaceRegion` | Region of the Log Analytics workspace. |
89
-
| Arc: `workspaceDomain` | Domain of the Log Analytics workspace:<br>`opinsights.azure.com` for Azure public cloud<br>`opinsights.azure.us` for Azure US Government<br>`opinsights.azure.cn` for Azure China Cloud |
90
-
| AKS: `resourceTagValues` | Tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name will be MSCI-\<clusterName\>-\<clusterRegion\>, and this resource created in an AKS clusters resource group. For first time onboarding, you can set arbitrary tag values. |
91
-
| AKS: `useAzureMonitorPrivateLinkScope`<br>Arc: `useAzureMonitorPrivateLinkScope` | Boolean flag to indicate whether Azure Monitor link scope is used or not. |
92
-
| AKS: `azureMonitorPrivateLinkScopeResourceId`<br>Arc: `azureMonitorPrivateLinkScopeResourceId` | Resource ID of the Azure Monitor Private link scope. This only used if `useAzureMonitorPrivateLinkScope` is set to **true**. |
Based on your requirements, you can configure other parameters such `streams`, `enableContainerLogV2`, `enableSyslog`, `syslogLevels`, `syslogFacilities`, `dataCollectionInterval`, `namespaceFilteringModeForDataCollection` and `namespacesForDataCollection`.
97
+
| Parameter | Description |
98
+
|:---|:---|
99
+
|`clusterResourceId`| Resource ID of the cluster. |
100
+
|`clusterRegion`| Azure Region of the cluster. |
101
+
|`workspaceResourceId`| Resource ID of the Log Analytics workspace. |
102
+
|`workspaceRegion`| Region of the Log Analytics workspace. |
103
+
|`workspaceDomain`| Domain of the Log Analytics workspace:<br>`opinsights.azure.com` for Azure public cloud<br>`opinsights.azure.us` for Azure US Government<br>`opinsights.azure.cn` for Azure China Cloud |
104
+
|`resourceTagValues`| Tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name will be MSCI-\<clusterName\>-\<clusterRegion\>, and this resource created in an AKS clusters resource group. For first time onboarding, you can set arbitrary tag values. |
105
+
|`useAzureMonitorPrivateLinkScope`| Boolean flag to indicate whether Azure Monitor link scope is used or not. |
106
+
|`azureMonitorPrivateLinkScopeResourceId`| Resource ID of the Azure Monitor Private link scope. This only used if `useAzureMonitorPrivateLinkScope` is set to **true**. |
95
107
96
-
3. Deploy the template with the parameter file by using any valid method for deploying Resource Manager templates. For examples of different methods, see [Deploy the sample templates](../resource-manager-samples.md#deploy-the-sample-templates).
97
108
98
-
###Cluster using legacy authentication
109
+
## Cluster using legacy authentication
99
110
Use the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace using [Azure Private Link](../logs/private-link-security.md) if your cluster is not using managed identity authentication. This requires a [private AKS cluster](../../aks/private-clusters.md).
100
111
101
112
1. Create a private AKS cluster following the guidance in [Create a private Azure Kubernetes Service cluster](../../aks/private-clusters.md).
0 commit comments