|
1 | 1 | ---
|
2 |
| -title: Monitor an Azure Kubernetes Service (AKS) cluster deployed |
3 |
| -description: Learn how to enable monitoring of an Azure Kubernetes Service (AKS) cluster with Container insights already deployed in your subscription. |
| 2 | +title: Enable Container insights for Azure Kubernetes Service (AKS) cluster |
| 3 | +description: Learn how to enable Container insights on an Azure Kubernetes Service (AKS) cluster. |
4 | 4 | ms.topic: conceptual
|
5 | 5 | ms.date: 01/09/2023
|
6 | 6 | ms.custom: devx-track-terraform, devx-track-azurepowershell, devx-track-azurecli, ignite-2022
|
@@ -385,8 +385,10 @@ AKS clusters with system-assigned identity must first disable monitoring and the
|
385 | 385 | ```
|
386 | 386 |
|
387 | 387 | ## Private link
|
| 388 | +Use one of the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace by using [Azure Private Link](../logs/private-link-security.md). |
388 | 389 |
|
389 |
| -To enable network isolation by connecting your cluster to the Log Analytics workspace by using [Azure Private Link](../logs/private-link-security.md), your cluster must be using managed identity authentication with Azure Monitor Agent. |
| 390 | +### Managed identity authentication |
| 391 | +Use the following procedure if your cluster is using managed identity authentication with Azure Monitor Agent. |
390 | 392 |
|
391 | 393 | 1. Follow the steps in [Enable network isolation for the Azure Monitor agent](../agents/azure-monitor-agent-data-collection-endpoint.md) to create a data collection endpoint and add it to your Azure Monitor private link service.
|
392 | 394 |
|
@@ -415,6 +417,35 @@ To enable network isolation by connecting your cluster to the Log Analytics work
|
415 | 417 |
|
416 | 418 | 1. Enable monitoring with the managed identity authentication option by using the steps in [Migrate to managed identity authentication](#migrate-to-managed-identity-authentication).
|
417 | 419 |
|
| 420 | +### Without managed identity authentication |
| 421 | +Use the following procedure if you're not using managed identity authentication. This requires a [private AKS cluster](../../aks/private-clusters.md). |
| 422 | +
|
| 423 | +1. Create a private AKS cluster following the guidance in [Create a private Azure Kubernetes Service cluster](../../aks/private-clusters.md). |
| 424 | +
|
| 425 | +2. Disable public Ingestion on your Log Analytics workspace. |
| 426 | +
|
| 427 | + Use the following command to disable public ingestion on an existing workspace. |
| 428 | +
|
| 429 | + ```cli |
| 430 | + az monitor log-analytics workspace update --resource-group <azureLogAnalyticsWorkspaceResourceGroup> --workspace-name <azureLogAnalyticsWorkspaceName> --ingestion-access Disabled |
| 431 | + ``` |
| 432 | +
|
| 433 | + Use the following command to create a new workspace with public ingestion disabled. |
| 434 | +
|
| 435 | + ```cli |
| 436 | + az monitor log-analytics workspace create --resource-group <azureLogAnalyticsWorkspaceResourceGroup> --workspace-name <azureLogAnalyticsWorkspaceName> --ingestion-access Disabled |
| 437 | + ``` |
| 438 | +
|
| 439 | +3. Configure private link by following the instructions at [Configure your private link](../logs/private-link-configure.md). Set ingestion access to public and then set to private after the private endpoint is created but before monitoring is enabled. The private link resource region must be same as AKS cluster region. |
| 440 | +
|
| 441 | +
|
| 442 | +4. Enable monitoring for the AKS cluster. |
| 443 | +
|
| 444 | + ```cli |
| 445 | + az aks enable-addons -a monitoring --resource-group <AKSClusterResourceGorup> --name <AKSClusterName> --workspace-resource-id <workspace-resource-id> |
| 446 | + ``` |
| 447 | +
|
| 448 | +
|
418 | 449 | ## Limitations
|
419 | 450 |
|
420 | 451 | - Enabling managed identity authentication (preview) isn't currently supported by using Terraform or Azure Policy.
|
|
0 commit comments