You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/private-link-security.md
+33-22Lines changed: 33 additions & 22 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,9 +10,13 @@ ms.subservice:
10
10
11
11
# Use Azure Private Link to securely connect networks to Azure Monitor
12
12
13
+
> [!IMPORTANT]
14
+
> At this time, you must **request access** to use this capability. You may apply for access using the [signup form](https://aka.ms/AzMonPrivateLinkSignup).
15
+
16
+
13
17
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure PaaS services to your virtual network using private endpoints. For many services, you just set up an endpoint per resource. However, Azure Monitor is a constellation of different interconnected services that work together to monitor your workloads. As a result, we have built a resource called an Azure Monitor Private Link Scope (AMPLS) that allows you to define the boundaries of your monitoring network and connect to your virtual network. This article covers when to use and how to set up an Azure Monitor Private Link Scope.
14
18
15
-
## Advantages of Private Link with Azure Monitor
19
+
## Advantages
16
20
17
21
With Private Link you can:
18
22
@@ -33,7 +37,7 @@ Azure Monitor Private Link Scope is a grouping resource to connect one or more p
33
37
> [!NOTE]
34
38
> A single Azure Monitor resource can belong to multiple AMPLSs, but you cannot connect a single VNet to more than one AMPLS.
35
39
36
-
## Planning AMPLS based on your network
40
+
## Planning based on your network
37
41
38
42
Before setting up your AMPLS resources, consider your network isolation requirements. Evaluate your virtual networks' access to public internet, and the access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
39
43
@@ -48,7 +52,7 @@ Review each of your Azure Monitor resources:
48
52
- Should the resource allow ingestion of logs from resources located on specific VNets only?
49
53
- Should the resource be queried only by clients located on specific VNETs?
50
54
51
-
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configure-log-analytics) workspaces and [Configuring Application Insights components](#Configuring Application Insights components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
55
+
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configure-log-analytics) workspaces and [Configuring Application Insights components](#configure-application-insights-components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
52
56
Remember – you can connect the same workspaces or application to multiple AMPLS, to allow them to be reached by different networks.
53
57
54
58
### Group together monitoring resources by network accessibility
@@ -61,7 +65,7 @@ For example, if your internal virtual networks VNet1 and VNet2 should connect to
61
65
62
66

63
67
64
-
## Example connection of Azure Monitor to Private Link
68
+
## Example connection
65
69
66
70
Let's start by creating an Azure Monitor Private Link Scope resource.
67
71
@@ -138,42 +142,37 @@ Restricting access in this manner only applies to data in the workspace. Configu
138
142
139
143
## Configure Application Insights
140
144
141
-
In your Azure Monitor Application Insights Component resource in the Azure portal is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
142
-
143
-
**---------- TODO ------------- get screenshot----**
145
+
Configuring Application Insights components
146
+
In the Azure portal in your Azure Monitor Application Insights Component resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
150
+
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click Add and select the Azure Monitor Private Link Scope. Click Apply to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
148
151
149
152
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
150
-
If you set **Allow public network access for ingestion** to **No**, then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to dashboards, query API, insights in the Azure portal, and more.
153
+
If you set **Allow public network access for ingestion** to **No**, then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to dashboards, query API, insights in the Azure portal, and more.
154
+
155
+
Restricting access in this manner only applies to data in the Application Insights resource. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
151
156
152
-
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
153
157
154
-
## Using customer-owned storage accounts for log ingestion
158
+
## Collect LA Custom Logs over Private Link
155
159
156
160
Storage accounts are used in the ingestion process of several data types of logs. By default, service-managed storage accounts are used. However, you can now use your own storage accounts and gain control over the access rights, keys, content, encryption, and retention of your logs during ingestion.
157
161
158
162
## Data types sent to storage accounts
159
163
160
-
The following data types are ingested into a storage account.
164
+
The following data types require using your own "customer-managed storage" account. If you do not, these types will be blocked. --TODO reword---
161
165
162
166
- Custom logs
163
-
- IIS logs
164
-
- Syslog
165
-
- Windows event logs
166
-
- Windows ETW logs
167
-
- Service fabric
168
167
- ASC Watson dump files
169
168
170
169
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
171
170
172
-
## Restrictions and limitations with Azure Monitor Private Link
171
+
## Restrictions and limitations
173
172
174
173
### Log Analytics Windows agent
175
174
176
-
Your must use the Log Analytics agent version 18.20.18038.0 or later.
175
+
Your must use the Log Analytics agent version 18.20.18038.0 or later.
Profiles / Snapshots can be sent from applications running in your VNET, however, they cannot be seen from within the VNET. They can only be seen only if portal is accessed from the public internet.
189
+
190
+
If you need to use the query experience from your VNET, add the **AzureActiveDirectory**[service tag](../..firewall/service-tags.md) to so you can authenticate. To use any part of the Azure Monitor portal that accesses the data in your workspace, add the **AzurePortal**, **AzureFrontDoor.Frontend** service tags to your firewall.
191
+
187
192
### Azure Resource Manager queries
188
193
189
194
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
@@ -194,6 +199,12 @@ Bundle the JavaScript code in your script so that the browser does not attempt t
194
199
195
200
### Log Analytics solution download
196
201
197
-
**-------------TODO -------------**
202
+
To allow the Log Analytics Agent to download solution packs, whitelist the following fully-qualified domain names in your firewall as appropriate.
0 commit comments