Skip to content

Commit 885977f

Browse files
committed
late PM fixes. reviewed with Nick.
1 parent 152d55f commit 885977f

File tree

3 files changed

+37
-26
lines changed

3 files changed

+37
-26
lines changed
22.2 KB
Loading

articles/azure-monitor/platform/private-link-security.md

Lines changed: 33 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -10,9 +10,13 @@ ms.subservice:
1010

1111
# Use Azure Private Link to securely connect networks to Azure Monitor
1212

13+
> [!IMPORTANT]
14+
> At this time, you must **request access** to use this capability. You may apply for access using the [signup form](https://aka.ms/AzMonPrivateLinkSignup).
15+
16+
1317
[Azure Private Link](../../private-link/private-link-overview.md) allows you to securely link Azure PaaS services to your virtual network using private endpoints. For many services, you just set up an endpoint per resource. However, Azure Monitor is a constellation of different interconnected services that work together to monitor your workloads. As a result, we have built a resource called an Azure Monitor Private Link Scope (AMPLS) that allows you to define the boundaries of your monitoring network and connect to your virtual network. This article covers when to use and how to set up an Azure Monitor Private Link Scope.
1418

15-
## Advantages of Private Link with Azure Monitor
19+
## Advantages
1620

1721
With Private Link you can:
1822

@@ -33,7 +37,7 @@ Azure Monitor Private Link Scope is a grouping resource to connect one or more p
3337
> [!NOTE]
3438
> A single Azure Monitor resource can belong to multiple AMPLSs, but you cannot connect a single VNet to more than one AMPLS.
3539
36-
## Planning AMPLS based on your network
40+
## Planning based on your network
3741

3842
Before setting up your AMPLS resources, consider your network isolation requirements. Evaluate your virtual networks' access to public internet, and the access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
3943

@@ -48,7 +52,7 @@ Review each of your Azure Monitor resources:
4852
- Should the resource allow ingestion of logs from resources located on specific VNets only?
4953
- Should the resource be queried only by clients located on specific VNETs?
5054

51-
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configure-log-analytics) workspaces and [Configuring Application Insights components](#Configuring Application Insights components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
55+
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configure-log-analytics) workspaces and [Configuring Application Insights components](#configure-application-insights-components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
5256
Remember – you can connect the same workspaces or application to multiple AMPLS, to allow them to be reached by different networks.
5357

5458
### Group together monitoring resources by network accessibility
@@ -61,7 +65,7 @@ For example, if your internal virtual networks VNet1 and VNet2 should connect to
6165

6266
![Diagram of AMPLS B topology](./media/private-link-security/ampls-topology-b-1.png)
6367

64-
## Example connection of Azure Monitor to Private Link
68+
## Example connection
6569

6670
Let's start by creating an Azure Monitor Private Link Scope resource.
6771

@@ -138,42 +142,37 @@ Restricting access in this manner only applies to data in the workspace. Configu
138142
139143
## Configure Application Insights
140144

141-
In your Azure Monitor Application Insights Component resource in the Azure portal is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
142-
143-
**---------- TODO ------------- get screenshot----**
145+
Configuring Application Insights components
146+
In the Azure portal in your Azure Monitor Application Insights Component resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
144147

145-
<!-- ![AI Network Isolation](./media/private-link-security/ampls-application-insights-network-isolation.png) -->
148+
![AI Network Isolation](./media/private-link-security/ampls-application-insights-lan-network-isolation-6.png)
146149

147-
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
150+
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click Add and select the Azure Monitor Private Link Scope. Click Apply to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
148151

149152
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
150-
If you set **Allow public network access for ingestion** to **No**, then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to dashboards, query API, insights in the Azure portal, and more.
153+
If you set **Allow public network access for ingestion** to **No**, then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to dashboards, query API, insights in the Azure portal, and more.
154+
155+
Restricting access in this manner only applies to data in the Application Insights resource. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
151156

152-
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
153157

154-
## Using customer-owned storage accounts for log ingestion
158+
## Collect LA Custom Logs over Private Link
155159

156160
Storage accounts are used in the ingestion process of several data types of logs. By default, service-managed storage accounts are used. However, you can now use your own storage accounts and gain control over the access rights, keys, content, encryption, and retention of your logs during ingestion.
157161

158162
## Data types sent to storage accounts
159163

160-
The following data types are ingested into a storage account.
164+
The following data types require using your own "customer-managed storage" account. If you do not, these types will be blocked. --TODO reword---
161165

162166
- Custom logs
163-
- IIS logs
164-
- Syslog
165-
- Windows event logs
166-
- Windows ETW logs
167-
- Service fabric
168167
- ASC Watson dump files
169168

170169
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
171170

172-
## Restrictions and limitations with Azure Monitor Private Link
171+
## Restrictions and limitations
173172

174173
### Log Analytics Windows agent
175174

176-
Your must use the Log Analytics agent version 18.20.18038.0 or later.
175+
Your must use the Log Analytics agent version 18.20.18038.0 or later.
177176

178177
### Log Analytics Linux agent
179178

@@ -184,6 +183,12 @@ $ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -X
184183
$ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -w <workspace id> -s <workspace key>
185184
```
186185

186+
### Azure portal
187+
188+
Profiles / Snapshots can be sent from applications running in your VNET, however, they cannot be seen from within the VNET. They can only be seen only if portal is accessed from the public internet.
189+
190+
If you need to use the query experience from your VNET, add the **AzureActiveDirectory** [service tag](../..firewall/service-tags.md) to so you can authenticate. To use any part of the Azure Monitor portal that accesses the data in your workspace, add the **AzurePortal**, **AzureFrontDoor.Frontend** service tags to your firewall.
191+
187192
### Azure Resource Manager queries
188193

189194
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
@@ -194,6 +199,12 @@ Bundle the JavaScript code in your script so that the browser does not attempt t
194199

195200
### Log Analytics solution download
196201

197-
**-------------TODO -------------**
202+
To allow the Log Analytics Agent to download solution packs, whitelist the following fully-qualified domain names in your firewall as appropriate.
203+
204+
205+
| Cloud environment | Agent Resource | Ports | Direction |
206+
|:--|:--|:--|:--|
207+
|Azure Public | scadvisor.blob.core.windows.net | 443 | Outbound
208+
|Azure Government | usbn1oicore.blob.core.usgovcloudapi.net | 443 | Outbound
209+
|Azure China | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
198210

199-
Please put xxx in your allow list. FQD?

articles/azure-monitor/platform/private-storage.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,12 @@ Data types that are ingested from a storage account include the following. See [
2323

2424
| Type | Table information |
2525
|:-----|:------------------|
26-
| IIS logs | Blob: wad-iis-logfiles|
27-
|Windows event logs | Table: WADWindowsEventLogsTable |
28-
| Syslog | Table: LinuxsyslogVer2v0 |
26+
| IIS logs | Blob: wad-iis-logfiles|
27+
|Windows event logs | Table: WADWindowsEventLogsTable |
28+
| Syslog | Table: LinuxsyslogVer2v0 |
2929
| Windows ETW logs | Table: WADETWEventTable|
3030
| Service fabric | Table: WADServiceFabricSystemEventTable <br/> WADServiceFabricReliableActorEventTable<br/> WADServiceFabricReliableServicEventTable |
31-
| Custom logs | n/a |
31+
| Custom logs | n/a |
3232
| Azure Security Center Watson dump files | n/a|
3333

3434
## Storage account requirements

0 commit comments

Comments
 (0)