Skip to content

Commit 7f41166

Browse files
committed
replaced ARM with Azure Resource Manager
1 parent 0450017 commit 7f41166

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

articles/azure-monitor/platform/private-link-security.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -158,9 +158,9 @@ First, you can connect this Log Analytics resource to any Azure Monitor Private
158158
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
159159
If you set **Allow public network access for ingestion** to **No**, then machines outside of the connected scopes cannot upload data to this workspace. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Experiences running outside the Azure portal, and that query Log Analytics data also have to be running within the private-linked VNET.
160160

161-
Restricting access in this manner does not apply to the Azure Resource Manager (ARM) and therefore has the following limitations:
162-
* Access to data - while blocking queries from public networks applies to most Log Analytics experiences, some experiences query data through ARM and won't be able to query data unless Private Link settings are applied to ARM as well (feature coming up soon). This includes, for example, Azure Monitor solutions, workbooks and Insights, and the LogicApp connector.
163-
* Workspace management - Workspace setting and configuration changes (including turning these access settings on or off) are managed by ARM. Restrict access to workspace management using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
161+
Restricting access in this manner does not apply to the Azure Resource Manager and therefore has the following limitations:
162+
* Access to data - while blocking queries from public networks applies to most Log Analytics experiences, some experiences query data through Azure Resource Manager and therefore won't be able to query data unless Private Link settings are applied to the Resource Manager as well (feature coming up soon). This includes, for example, Azure Monitor solutions, workbooks and Insights, and the LogicApp connector.
163+
* Workspace management - Workspace setting and configuration changes (including turning these access settings on or off) are managed by Azure Resource Manager. Restrict access to workspace management using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
164164

165165
> [!NOTE]
166166
> Logs and metrics uploaded to a workspace via [Diagnostic Settings](diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.

0 commit comments

Comments
 (0)