Skip to content

Commit 98af548

Browse files
authored
Merge pull request #184287 from shayoniseth/shseth/dcepl
Updating docs for DCE GA launch
2 parents 6c7409c + d635532 commit 98af548

16 files changed

+162
-17
lines changed

articles/azure-monitor/agents/azure-monitor-agent-overview.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -119,9 +119,10 @@ The Azure Monitor agent sends data to Azure Monitor Metrics (preview) or a Log A
119119
The Azure Monitor agent doesn't require any keys but instead requires a [system-assigned managed identity](../../active-directory/managed-identities-azure-resources/qs-configure-portal-windows-vm.md#system-assigned-managed-identity). You must have a system-assigned managed identity enabled on each virtual machine before you deploy the agent.
120120

121121
## Networking
122-
The Azure Monitor agent supports Azure service tags. Both AzureMonitor and AzureResourceManager tags are required. The Azure Monitor agent doesn't yet work with Azure Monitor Private Link Scopes. If the machine connects through a proxy server to communicate over the internet, review the following requirements to understand the network configuration required.
122+
The Azure Monitor agent supports Azure service tags (both AzureMonitor and AzureResourceManager tags are required). It supports connecting via private links and direct proxies as described below.
123123

124124
### Proxy configuration
125+
If the machine connects through a proxy server to communicate over the internet, review requirements below to understand the network configuration required.
125126

126127
The Azure Monitor agent extensions for Windows and Linux can communicate either through a proxy server or a Log Analytics gateway to Azure Monitor by using the HTTPS protocol. Use it for Azure virtual machines, Azure virtual machine scale sets, and Azure Arc for servers. Use the extensions settings for configuration as described in the following steps. Both anonymous and basic authentication by using a username and password are supported.
127128

@@ -162,6 +163,9 @@ New-AzConnectedMachineExtension -Name AzureMonitorLinuxAgent -ExtensionType Azur
162163

163164
---
164165

166+
## Private link configuration
167+
To configure the agent to use private links for network communications with Azure Monitor, you can use [Azure Monitor Private Links Scopes (AMPLS)](../logs/private-link-security.md) and [data collection endpoints](./data-collection-endpoint-overview.md) to enable required network isolation. [View steps to configure network isolation for the agent](./data-collection-endpoint-overview.md#enable-network-isolation-for-the-azure-monitor-agent)
168+
165169
## Next steps
166170

167171
- [Install the Azure Monitor agent](azure-monitor-agent-install.md) on Windows and Linux virtual machines.
Lines changed: 110 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,110 @@
1+
---
2+
title: Data collection endpoints in Azure Monitor (preview)
3+
description: Overview of data collection endpoints (DCEs) in Azure Monitor including their contents and structure and how you can create and work with them.
4+
ms.topic: conceptual
5+
author: shseth
6+
ms.author: shseth
7+
ms.date: 1/5/2022
8+
ms.custom: references_region
9+
10+
---
11+
12+
# Data collection endpoints in Azure Monitor (preview)
13+
Data Collection Endpoints (DCEs) allow you to uniquely configure ingestion settings for your machines, giving you greater control over your networking requirements. This article provides an overview of data collection endpoints including their contents and structure and how you can create and work with them.
14+
15+
## Components of a data collection endpoint
16+
A data collection endpoint includes the following components.
17+
18+
| Component | Description |
19+
|:---|:---|
20+
| Configuration access endpoint | The endpoint used to access the configuration service to fetch associated data collection rules (DCR). Example: `<unique-dce-identifier>.<regionname>.handler.control` |
21+
| Logs ingestion endpoint | The endpoint used to ingest logs to Log Analytics workspace(s). Example: `<unique-dce-identifier>.<regionname>.ingest` |
22+
| Network Access Control Lists (ACLs) | Network access control rules for the endpoints
23+
24+
25+
## Regionality
26+
Data collection endpoints are ARM resources created within specific regions. An endpoint in a given region can only be **associated with machines in the same region**, although you can have more than one endpoint within the same region as per your needs.
27+
28+
## Limitations
29+
Data collection endpoints only support Log Analytics as a destination for collected data. [Custom Metrics (preview)](../essentials/metrics-custom-overview.md) collected and uploaded via the Azure Monitor Agent are not controlled by Data Collection endpoints nor can they be configured over private links.
30+
31+
## Create endpoint and association in Azure portal
32+
You can use the Azure portal to create a data collection endpoint and associate virtual machines in your subscription to that rule.
33+
34+
> [!NOTE]
35+
> The data collection endpoint should be created in the **same region** where your virtual machines exist.
36+
37+
In the **Azure Monitor** menu in the Azure portal, select **Data Collection Endpoint** from the **Settings** section. Click **Create** to create a new Data Collection Rule and assignment.
38+
39+
[![Data Collection Endpoints](media/data-collection-endpoint-overview/data-collection-endpoint-overview.png)](media/data-collection-endpoint-overview/data-collection-endpoint-overview.png#lightbox)
40+
41+
Click **Create** to create a new endpoint. Provide a **Rule name** and specify a **Subscription**, **Resource Group** and **Region**. This specifies where the DCE will be created.
42+
43+
[![Data Collection Rule Basics](media/data-collection-endpoint-overview/data-collection-endpoint-basics.png)](media/data-collection-endpoint-overview/data-collection-endpoint-basics.png#lightbox)
44+
45+
Click **Review + create** to review the details of the data collection endpoint. Click **Create** to create it.
46+
47+
Next, you can use 'Data collection rules' in the portal to associate endpoints with a resource (e.g. a virtual machine) or a set of resources.
48+
Create a new rule or open an existing rule. In the **Resources** tab, click on the **Data collection endpoint** drop-down to associate an existing endpoint for your resource in the same region (or select multiple resources in the same region to bulk-assign an endpoint for them). Doing this creates an association per resource which links the endpoint to the resource. The Azure Monitor agent running on these resources will now start using the endpoint instead for uploading data to Azure Monitor.
49+
50+
[![Data Collection Rule virtual machines](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png)](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png#lightbox)
51+
52+
## Create endpoint and association using REST API
53+
54+
> [!NOTE]
55+
> The data collection endpoint should be created in the **same region** where your virtual machines exist.
56+
57+
1. Create data collection endpoint(s) using these [DCE REST APIs](/rest/api/monitor/datacollectionendpoints).
58+
2. Create association(s) to link the endpoint(s) to your target machines or resources, using these [DCRA REST APIs](/rest/api/monitor/datacollectionruleassociations/create#examples).
59+
60+
61+
## Sample data collection endpoint
62+
The sample data collection endpoint below is for virtual machines with Azure Monitor agent, with public network access disabled so that agent only uses private links to communicate and send data to Azure Monitor/Log Analytics.
63+
64+
```json
65+
{
66+
"id": "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxx/resourceGroups/myResourceGroup/providers/Microsoft.Insights/dataCollectionEndpoints/myCollectionEndpoint",
67+
"name": "myCollectionEndpoint",
68+
"type": "Microsoft.Insights/dataCollectionEndpoints",
69+
"location": "eastus",
70+
"tags": {
71+
"tag1": "A",
72+
"tag2": "B"
73+
},
74+
"properties": {
75+
"configurationAccess": {
76+
"endpoint": "https://mycollectionendpoint-abcd.eastus-1.control.monitor.azure.com"
77+
},
78+
"logsIngestion": {
79+
"endpoint": "https://mycollectionendpoint-abcd.eastus-1.ingest.monitor.azure.com"
80+
},
81+
"networkAcls": {
82+
"publicNetworkAccess": "Disabled"
83+
}
84+
},
85+
"systemData": {
86+
"createdBy": "user1",
87+
"createdByType": "User",
88+
"createdAt": "yyyy-mm-ddThh:mm:ss.sssssssZ",
89+
"lastModifiedBy": "user2",
90+
"lastModifiedByType": "User",
91+
"lastModifiedAt": "yyyy-mm-ddThh:mm:ss.sssssssZ"
92+
},
93+
"etag": "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
94+
}
95+
```
96+
97+
## Enable network isolation for the Azure Monitor Agent
98+
You can use data collection endpoints to enable the Azure Monitor agent to communicate to the internet via private links. To do so, you must:
99+
1. Create data collection endpoint(s), at least one per region, as shown above
100+
2. Add the data collection endpoints to a new or existing [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources) resource. This adds the DCE endpoints to your private DNS zone (see [how to validate](../logs/private-link-configure.md#review-and-validate-your-private-link-setup)) and allows communication via private links. You can do this from either the AMPLS resource or from within an existing DCE resource's 'Network Isolation' tab.
101+
> [!NOTE]
102+
> Other Azure Monitor resources like the Log Analytics workspace(s) configured in your data collection rules that you wish to send data to, must be part of this same AMPLS resource.
103+
3. For your data collection endpoint(s), ensure **Accept access from public networks not connected through a Private Link Scope** option is set to **No** under the 'Network Isolation' tab of your endpoint resource in Azure portal, as shown below. This ensures that public internet access is disabled, and network communication only happen via private links.
104+
4. Associate the data collection endpoints to the target resources, using the data collection rules experience in Azure portal. This results in the agent using the configured the data collection endpoint(s) for network communications. See [Configure data collection for the Azure Monitor agent](../agents/data-collection-rule-azure-monitor-agent.md).
105+
106+
![Data collection endpoint network isolation](media/data-collection-endpoint-overview/data-collection-endpoint-network-isolation.png)
107+
108+
## Next steps
109+
- [Associate endpoint to machines](data-collection-rule-azure-monitor-agent.md#create-rule-and-association-in-azure-portal)
110+
- [Add endpoint to AMPLS resource](../logs/private-link-configure.md#connect-azure-monitor-resources)

articles/azure-monitor/agents/data-collection-rule-azure-monitor-agent.md

Lines changed: 5 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -43,14 +43,17 @@ In the **Monitor** menu in the Azure portal, select **Data Collection Rules** fr
4343

4444
[![Data Collection Rules](media/data-collection-rule-azure-monitor-agent/data-collection-rules-updated.png)](media/data-collection-rule-azure-monitor-agent/data-collection-rules-updated.png#lightbox)
4545

46-
Click **Add** to create a new rule and set of associations. Provide a **Rule name** and specify a **Subscription**, **Resource Group** and **Region**. This specifies where the DCR will be created. The virtual machines and their associations can be in any subscription or resource group in the tenant.
46+
Click **Create** to create a new rule and set of associations. Provide a **Rule name** and specify a **Subscription**, **Resource Group** and **Region**. This specifies where the DCR will be created. The virtual machines and their associations can be in any subscription or resource group in the tenant.
4747
Additionally, choose the appropriate **Platform Type** which specifies the type of resources this rule can apply to. Custom will allow for both Windows and Linux types. This allows for pre-curated creation experiences with options scoped to the selected platform type.
4848

4949
[![Data Collection Rule Basics](media/data-collection-rule-azure-monitor-agent/data-collection-rule-basics-updated.png)](media/data-collection-rule-azure-monitor-agent/data-collection-rule-basics-updated.png#lightbox)
5050

5151
In the **Resources** tab, add the resources (virtual machines, virtual machine scale sets, Arc for servers) that should have the Data Collection Rule applied. The Azure Monitor Agent will be installed on resources that don't already have it installed, and will enable Azure Managed Identity as well.
5252

53-
[![Data Collection Rule virtual machines](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-updated.png)](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-updated.png#lightbox)
53+
### Private link configuration using data collection endpoints (preview)
54+
If you need network isolation using private links for collecting data using agents from your resources, simply select existing endpoints (or create a new endpoint) from the same region for the respective resource(s) as shown below. See [how to create data collection endpoint](./data-collection-endpoint-overview.md).
55+
56+
[![Data Collection Rule virtual machines](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png)](media/data-collection-rule-azure-monitor-agent/data-collection-rule-virtual-machines-with-endpoint.png#lightbox)
5457

5558
On the **Collect and deliver** tab, click **Add data source** to add a data source and destination set. Select a **Data source type**, and the corresponding details to select will be displayed. For performance counters, you can select from a predefined set of objects and their sampling rate. For events, you can select from a set of logs or facilities and the severity level.
5659

312 KB
Loading
Loading
1.26 MB
Loading
Loading
725 KB
Loading
Loading
819 KB
Loading

0 commit comments

Comments
 (0)