Skip to content

Commit 974f9a3

Browse files
committed
acrolinx fixes
1 parent 7a1a0b0 commit 974f9a3

File tree

1 file changed

+29
-28
lines changed

1 file changed

+29
-28
lines changed

articles/azure-monitor/platform/private-link-security.md

Lines changed: 29 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -22,15 +22,15 @@ With Private Link you can:
2222

2323
- Connect privately to Azure Monitor without opening up any public network access
2424
- Ensure your monitoring data is only accessed through authorized private networks
25-
- Prevent data exfiltration from your private networks by defining specific Azure Monitor resources connect through your private endpoint
25+
- Prevent data exfiltration from your private networks by defining specific Azure Monitor resources that connect through your private endpoint
2626
- Securely connect your private on-premises network to Azure Monitor using ExpressRoute and Private Link
2727
- Keep all traffic inside the Microsoft Azure backbone network
2828

29-
For more information, see [Key Benefits of Private Link](../../private-link/private-link-overview.md#key-benefits)
29+
For more information, see [Key Benefits of Private Link](../../private-link/private-link-overview.md#key-benefits).
3030

3131
## How it works
3232

33-
Azure Monitor Private Link Scope is a grouping resource to connect one or more private endpoints (and therefore the virtual networks they are contained in) to one or more Azure Monitor resources. These resources include Log Analytics workspaces and Application Insights components.
33+
Azure Monitor Private Link Scope is a grouping resource to connect one or more private endpoints (and therefore the virtual networks they are contained in) to one or more Azure Monitor resources. The resources include Log Analytics workspaces and Application Insights components.
3434

3535
![Diagram of resource topology](./media/private-link-security/private-link-topology-1.png)
3636

@@ -52,7 +52,7 @@ Review each of your Azure Monitor resources:
5252
- Should the resource allow ingestion of logs from resources located on specific VNets only?
5353
- Should the resource be queried only by clients located on specific VNETs?
5454

55-
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configure-log-analytics) workspaces and [Configuring Application Insights components](#configure-application-insights-components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
55+
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configure-log-analytics) workspaces and [Configuring Application Insights components](#configure-application-insights) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
5656
Remember – you can connect the same workspaces or application to multiple AMPLS, to allow them to be reached by different networks.
5757

5858
### Group together monitoring resources by network accessibility
@@ -67,10 +67,10 @@ For example, if your internal virtual networks VNet1 and VNet2 should connect to
6767

6868
## Example connection
6969

70-
Let's start by creating an Azure Monitor Private Link Scope resource.
70+
Start by creating an Azure Monitor Private Link Scope resource.
7171

7272
1. Go to **Create a resource** in the Azure portal and search for **Azure Monitor Private Link Scope**.
73-
2. Click create.
73+
2. Click **create**.
7474
3. Pick a Subscription and Resource Group.
7575
4. Give the AMPLS a name. It is best to use a name that is clear what purpose and security boundary the Scope will be used for so that someone won't accidentally break network security boundaries. For example, "AppServerProdTelem".
7676
5. Click **Review + Create**.
@@ -81,7 +81,7 @@ Let's start by creating an Azure Monitor Private Link Scope resource.
8181
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process goes faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
8282

8383
1. In your Azure Monitor Private Link scope, click on **Azure Monitor Resources** in the left-hand menu. Click the **Add** button.
84-
2. Add the workspace or component. Clicking the Add button brings up a dialog where you can select Azure Monitor resources. You can browse through your subscriptions and resource groups, or you can type in their name to filter down to them. Select the workspace or component and click **Apply** to add them to your scope.
84+
2. Add the workspace or component. Clicking the **Add** button brings up a dialog where you can select Azure Monitor resources. You can browse through your subscriptions and resource groups, or you can type in their name to filter down to them. Select the workspace or component and click **Apply** to add them to your scope.
8585

8686
![Screenshot of select a scope UX](./media/private-link-security/ampls-select-2.png)
8787

@@ -93,9 +93,9 @@ Now that you have resources connected to your AMPLS, create a private endpoint t
9393

9494
![Screenshot of Private Endpoint Connections UX](./media/private-link-security/ampls-select-private-endpoint-connect-3.png)
9595

96-
2. Pick the subscription, resource group, and name of the endpoint, and the region it should live in. This needs to be the same region as the virtual network you will connect it to.
96+
2. Pick the subscription, resource group, and name of the endpoint, and the region it should live in. The region needs to be the same region as the virtual network you will connect it to.
9797

98-
3. Click **Next : Resource**.
98+
3. Click **Next: Resource**.
9999

100100
4. In the Resource screen,
101101

@@ -126,34 +126,35 @@ You have now created a new private endpoint that is connected to this Azure Moni
126126

127127
## Configure Log Analytics
128128

129-
In the Azure portal in your Azure Monitor Log Analytics workspace resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
129+
Go to the Azure portal. In your Azure Monitor Log Analytics workspace resource is a menu item **Network Isolation** on the left-hand side. You can control two different states from this menu.
130130

131131
![LA Network Isolation](./media/private-link-security/ampls-log-analytics-lan-network-isolation-6.png)
132132

133-
First, you can connect this Log Analytics resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this workspace. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
133+
First, you can connect this Log Analytics resource to any Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this workspace. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
134134

135135
Second, you can control how this resource can be reached from outside of the private link scopes listed above.
136136
If you set **Allow public network access for ingestion** to **No**, then machines outside of the connected scopes cannot upload data to this workspace. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this workspace. That data includes access to workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Experiences running outside the Azure portal which consume Log Analytics data also have to be running within the private-linked VNET.
137137

138+
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. Restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
138139

139-
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
140-
141-
> [!NOTE]
140+
> [!NOTE]
142141
> Logs and metrics uploaded to a workspace via [Diagnostic Settings](diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
143142
144143
## Configure Application Insights
145144

146-
In the Azure portal in your Azure Monitor Application Insights Component resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
145+
Go to the Azure portal. In your Azure Monitor Application Insights component resource is a menu item **Network Isolation** on the left-hand side. You can control two different states from this menu.
147146

148147
![AI Network Isolation](./media/private-link-security/ampls-application-insights-lan-network-isolation-6.png)
149148

150149
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the **Azure Monitor Private Link Scope**. Click Apply to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connect-azure-monitor-resources).
151150

152-
Second, you can control how this resource can be reached from outside of the private link scopes listed previously. If you set **Allow public network access for ingestion** to **No** , then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No** , then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to APM logs, metrics, and live metrics stream, as well as experiences built on top such as workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more. Note that non-portal consumption experiences have to be running within the private linked VNET that includes the monitored workloads.
151+
Second, you can control how this resource can be reached from outside of the private link scopes listed previously. If you set **Allow public network access for ingestion** to **No**, then machines or SDKs outside of the connected scopes cannot upload data to this component. If you set **Allow public network access for queries** to **No**, then machines outside of the scopes cannot access data in this Application Insights resource. That data includes access to APM logs, metrics, and the live metrics stream, as well as experiences built on top such as workbooks, dashboards, query API-based client experiences, insights in the Azure portal, and more.
152+
153+
Note that non-portal consumption experiences also have to be running within the private-linked VNET that includes the monitored workloads.
153154

154-
You’ll need to add resources hosting the monitored workloads to the private link. Here’s [documentation](https://docs.microsoft.com/en-us/azure/app-service/networking/private-endpoint) for how to do this for App Services.
155+
You’ll need to add resources hosting the monitored workloads to the private link. Here’s [documentation](https://docs.microsoft.com/azure/app-service/networking/private-endpoint) for how to do this for App Services.
155156

156-
Restricting access in this manner only applies to data in the Application Insights resource. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
157+
Restricting access in this manner only applies to data in the Application Insights resource. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. Instead, restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
157158

158159
> [!NOTE]
159160
> To fully secure workspace-based Application Insights, you need to lock down both access to Application Insights resource as well as the underlying Log Analytics workspace.
@@ -165,29 +166,29 @@ Restricting access in this manner only applies to data in the Application Insigh
165166

166167
You can automate the process described earlier using Azure Resource Manager templates and command-line interfaces.
167168

168-
To create and manage private link scopes, use [az monitor private-link-scope](https://docs.microsoft.com/en-us/cli/azure/monitor/private-link-scope?view=azure-cli-latest). Using this command, you can create scopes, associate Log Analytics workspaces and Application Insights components, and add/remove/approve private endpoints.
169+
To create and manage private link scopes, use [az monitor private-link-scope](https://docs.microsoft.com/cli/azure/monitor/private-link-scope?view=azure-cli-latest). Using this command, you can create scopes, associate Log Analytics workspaces and Application Insights components, and add/remove/approve private endpoints.
169170

170171
To manage network access, use the flags `[--ingestion-access {Disabled, Enabled}]` and `[--query-access {Disabled, Enabled}]`on [Log Analytics workspaces](https://docs.microsoft.com/cli/azure/monitor/log-analytics/workspace?view=azure-cli-latest) or [Application Insights components](https://docs.microsoft.com/cli/azure/ext/application-insights/monitor/app-insights/component?view=azure-cli-latest).
171172

172173
## Collect Custom Logs over Private Link
173174

174-
Storage accounts are used in the ingestion process of custom logs. By default, service-managed storage accounts are used. However to ingest custom logs on private links, you must use your own storage accounts and associate them with Log Analytics workspace. See more details on how to setup such accounts using [command line](https://docs.microsoft.com/en-us/cli/azure/monitor/log-analytics/workspace/linked-storage?view=azure-cli-latest).
175+
Storage accounts are used in the ingestion process of custom logs. By default, service-managed storage accounts are used. However to ingest custom logs on private links, you must use your own storage accounts and associate them with Log Analytics workspace(s). See more details on how to set up such accounts using the [command line](https://docs.microsoft.com/cli/azure/monitor/log-analytics/workspace/linked-storage?view=azure-cli-latest).
175176

176-
For information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
177+
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
177178

178179
## Restrictions and limitations
179180

180181
### Agents
181182

182-
The latest versions of the Windows and Linux agents must be used on private networks to enable secure telemetry ingestion to Log Analytics workspaces. Older versions cannot upload telemetry in a private network.
183+
The latest versions of the Windows and Linux agents must be used on private networks to enable secure telemetry ingestion to Log Analytics workspaces. Older versions cannot upload monitoring data in a private network.
183184

184185
**Log Analytics Windows agent**
185186

186-
Your must use the Log Analytics agent version 18.20.18038.0 or later.
187+
Use the Log Analytics agent version 18.20.18038.0 or later.
187188

188189
**Log Analytics Linux agent**
189190

190-
You must use agent version 1.12.25 or later. If you cannot, run the following commands on your VM.
191+
Use agent version 1.12.25 or later. If you cannot, run the following commands on your VM.
191192

192193
```cmd
193194
$ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -X
@@ -196,26 +197,26 @@ $ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -w <workspace id> -s <workspace k
196197

197198
### Azure portal
198199

199-
To use Azure Monitor portal experiences such as Application Insights and Log Analytics, you need to allow the Azure portal and Azure Monitor extensions to be accessible on the private networks. Add **AzureActiveDirectory**, **AzureResourceManager**, **AzureFrontDoor.FirstParty** and **AzureFrontdoor.Frontend** [service tags](../..firewall/service-tags.md) to your firewall.
200+
To use Azure Monitor portal experiences such as Application Insights and Log Analytics, you need to allow the Azure portal and Azure Monitor extensions to be accessible on the private networks. Add **AzureActiveDirectory**, **AzureResourceManager**, **AzureFrontDoor.FirstParty, and **AzureFrontdoor.Frontend** [service tags](../../firewall/service-tags.md) to your firewall.
200201

201202
### Programmatic access
202203

203204
To use the REST API, [CLI](https://docs.microsoft.com/cli/azure/monitor?view=azure-cli-latest) or PowerShell with Azure Monitor on private networks, add the [service tags](https://docs.microsoft.com/azure/virtual-network/service-tags-overview) **AzureActiveDirectory** and **AzureResourceManager** to your firewall.
204205

205-
Adding these tags allows you to perform actions such as quering log data, create and manage Log Analytics workspaces and AI components.
206+
Adding these tags allows you to perform actions such as querying log data, create, and manage Log Analytics workspaces and AI components.
206207

207208
### Application Insights SDK downloads from a content delivery network
208209

209210
Bundle the JavaScript code in your script so that the browser does not attempt to download code from a CDN. An example is provided on [GitHub](https://github.com/microsoft/ApplicationInsights-JS#npm-setup-ignore-if-using-snippet-setup)
210211

211212
### Log Analytics solution download
212213

213-
To allow the Log Analytics Agent to download solution packs, whitelist the following fully-qualified domain names in your firewall as appropriate.
214+
To allow the Log Analytics Agent to download solution packs, add the appropriate fully qualified domain names to your firewall allow list.
214215

215216

216217
| Cloud environment | Agent Resource | Ports | Direction |
217218
|:--|:--|:--|:--|
218219
|Azure Public | scadvisor.blob.core.windows.net | 443 | Outbound
219220
|Azure Government | usbn1oicore.blob.core.usgovcloudapi.net | 443 | Outbound
220-
|Azure China | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
221+
|Azure China 21Vianet | mceast2oicore.blob.core.chinacloudapi.cn| 443 | Outbound
221222

0 commit comments

Comments
 (0)