Skip to content

Commit 8bf30fa

Browse files
authored
Merge pull request #268280 from bwren/ci-private
Container insights private link
2 parents ec501e2 + 8d90f87 commit 8bf30fa

File tree

1 file changed

+25
-20
lines changed

1 file changed

+25
-20
lines changed

articles/azure-monitor/containers/container-insights-private-link.md

Lines changed: 25 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -12,33 +12,38 @@ This article describes how to configure Container insights to use Azure Private
1212

1313

1414
## Cluster using managed identity authentication
15-
Use the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace using [Azure Private Link](../logs/private-link-security.md) if your cluster is using managed identity authentication.
1615

17-
1. Follow the steps in [Enable network isolation for Azure Monitor Agent by using Private Link](../agents/azure-monitor-agent-private-link.md) to create a data collection endpoint (DCE) and add it to your Azure Monitor private link service (AMPLS).
16+
### Prerequisites
17+
- The template must be deployed in the same resource group as the cluster.
1818

19-
1. Create an association between the cluster and the DCE by using the following API call. For information on this call, see [Data collection rule associations - Create](/rest/api/monitor/data-collection-rule-associations/create). The DCR association name must be **configurationAccessEndpoint**, and `resourceUri` is the resource ID of the AKS cluster.
19+
### Download and install template
2020

21-
```rest
22-
PUT https://management.azure.com/{cluster-resource-id}/providers/Microsoft.Insights/dataCollectionRuleAssociations/configurationAccessEndpoint?api-version=2021-04-01
23-
{
24-
"properties": {
25-
"dataCollectionEndpointId": "{data-collection-endpoint-resource-id}"
26-
}
27-
}
28-
```
21+
1. Download ARM template and parameter file:
22+
23+
**AKS cluster**
24+
- Template file: https://aka.ms/aks-enable-monitoring-msi-onboarding-template-file
25+
- Parameter file: https://aka.ms/aks-enable-monitoring-msi-onboarding-template-parameter-file
2926

30-
For example, using Azure CLI:
27+
**Arc-enabled Kubernetes cluster**
28+
- Template file: https://aka.ms/arc-k8s-azmon-extension-msi-arm-template
29+
- Parameter file: https://aka.ms/arc-k8s-azmon-extension-msi-arm-template-params
3130

32-
```rest
33-
PUT https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myResourceGroup/providers/Microsoft.ContainerService/managedClusters/my-aks-cluster/providers/Microsoft.Insights/dataCollectionRuleAssociations/configurationAccessEndpoint?api-version=2021-04-01
31+
2. Edit the following values in the parameter file. Retrieve the **resource ID** of the resources from the **JSON** View of their **Overview** page.
3432

35-
{
36-
"properties": {
37-
"dataCollectionEndpointId": "/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/myResourceGroup/providers/Microsoft.Insights/dataCollectionEndpoints/myDataCollectionEndpoint"
38-
}
39-
}
40-
```
33+
| Parameter | Description |
34+
|:---|:---|
35+
| AKS: `aksResourceId`<br>Arc: `clusterResourceId` | Resource ID of the cluster. |
36+
| AKS: `aksResourceLocation`<br>Arc: `clusterRegion` | Azure Region of the cluster. |
37+
| AKS: `workspaceResourceId`<br>Arc: `workspaceResourceId` | Resource ID of the Log Analytics workspace. |
38+
| AKS: `workspaceRegion`<br>Arc: `workspaceRegion` | Region of the Log Analytics workspace. |
39+
| Arc: `workspaceDomain` | Domain of the Log Analytics workspace:<br>`opinsights.azure.com` for Azure public cloud<br>`opinsights.azure.us` for Azure US Government<br>`opinsights.azure.cn` for Azure China Cloud |
40+
| AKS: `resourceTagValues` | Tag values specified for the existing Container insights extension data collection rule (DCR) of the cluster and the name of the DCR. The name will be MSCI-\<clusterName\>-\<clusterRegion\>, and this resource created in an AKS clusters resource group. For first time onboarding, you can set arbitrary tag values. |
41+
| AKS: `useAzureMonitorPrivateLinkScope`<br>Arc: `useAzureMonitorPrivateLinkScope` | Boolean flag to indicate whether Azure Monitor link scope is used or not. |
42+
| AKS: `azureMonitorPrivateLinkScopeResourceId`<br>Arc: `azureMonitorPrivateLinkScopeResourceId` | Resource ID of the Azure Monitor Private link scope. This only used if `useAzureMonitorPrivateLinkScope` is set to **true**. |
43+
44+
Based on your requirements, you can configure other parameters such `streams`, `enableContainerLogV2`, `enableSyslog`, `syslogLevels`, `syslogFacilities`, `dataCollectionInterval`, `namespaceFilteringModeForDataCollection` and `namespacesForDataCollection`.
4145

46+
3. Deploy the template with the parameter file by using any valid method for deploying Resource Manager templates. For examples of different methods, see [Deploy the sample templates](../resource-manager-samples.md#deploy-the-sample-templates).
4247

4348
### Cluster using legacy authentication
4449
Use the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace using [Azure Private Link](../logs/private-link-security.md) if your cluster is not using managed identity authentication. This requires a [private AKS cluster](../../aks/private-clusters.md).

0 commit comments

Comments
 (0)