You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-enable-arc-enabled-clusters.md
+84-8Lines changed: 84 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,6 +32,8 @@ ms.reviewer: aul
32
32
- To view the monitoring data, you need to have [Log Analytics Reader](../logs/manage-access.md#azure-rbac) role assignment on the Log Analytics workspace.
33
33
- The following endpoints need to be enabled for outbound access in addition to the ones mentioned under [connecting a Kubernetes cluster to Azure Arc](../../azure-arc/kubernetes/quickstart-connect-cluster.md#meet-network-requirements).
34
34
35
+
**Azure public cloud**
36
+
35
37
| Endpoint | Port |
36
38
|----------|------|
37
39
|`*.ods.opinsights.azure.com`| 443 |
@@ -40,14 +42,30 @@ ms.reviewer: aul
40
42
|`*.monitoring.azure.com`| 443 |
41
43
|`login.microsoftonline.com`| 443 |
42
44
45
+
The following table lists the additional firewall configuration required for managed identity authentication.
46
+
47
+
|Agent resource| Purpose | Port |
48
+
|--------------|------|---|
49
+
|`global.handler.control.monitor.azure.com`| Access control service | 443 |
50
+
|`<cluster-region-name>.handler.control.monitor.azure.com`| Fetch data collection rules for specific AKS cluster | 443 |
51
+
52
+
**Azure Government cloud**
53
+
43
54
If your Azure Arc-enabled Kubernetes resource is in Azure US Government environment, following endpoints need to be enabled for outbound access:
44
55
45
56
| Endpoint | Port |
46
57
|----------|------|
47
58
|`*.ods.opinsights.azure.us`| 443 |
48
59
|`*.oms.opinsights.azure.us`| 443 |
49
60
|`dc.services.visualstudio.com`| 443 |
50
-
61
+
62
+
The following table lists the additional firewall configuration required for managed identity authentication.
63
+
64
+
|Agent resource| Purpose | Port |
65
+
|--------------|------|---|
66
+
|`global.handler.control.monitor.azure.cn`| Access control service | 443 |
67
+
|`<cluster-region-name>.handler.control.monitor.azure.cn`| Fetch data collection rules for specific AKS cluster | 443 |
68
+
51
69
52
70
- If you are using an Arc enabled cluster on AKS, and previously installed [monitoring for AKS](./container-insights-enable-existing-clusters.md), please ensure that you have [disabled monitoring](./container-insights-optout.md) before proceeding to avoid issues during the extension install
53
71
@@ -81,7 +99,9 @@ Run the following commands to locate the full Azure Resource Manager identifier
81
99
>[!TIP]
82
100
> This `id` can also be found in the *Overview* blade of the Log Analytics workspace through the Azure portal.
83
101
84
-
## Create extension instance using Azure CLI
102
+
## Create extension instance
103
+
104
+
## [CLI](#tab/create-cli)
85
105
86
106
### Option 1 - With default values
87
107
@@ -94,6 +114,13 @@ This option uses the following defaults:
To use [managed identity authentication (preview)](container-insights-onboard.md#authentication), add the `configuration-settings` parameter as in the following:
> If you are explicitly specifying the version of the extension to be installed in the create command, then ensure that the version specified is >= 2.8.2.
125
153
126
-
## Create extension instance using Azure portal
154
+
## [Azure portal](#tab/create-portal)
127
155
128
156
>[!IMPORTANT]
129
157
> If you are deploying Azure Monitor on a Kubernetes cluster running on top of Azure Stack Edge, then the Azure CLI option needs to be followed instead of the Azure portal option as a custom mount path needs to be set for these clusters.
az deployment group create --resource-group <resource-group> --template-file ./arc-k8s-azmon-extension-arm-template.json --parameters @./arc-k8s-azmon-extension-arm-template-params.json
170
204
```
171
205
206
+
---
207
+
172
208
## Verify extension installation status
173
209
Once you have successfully created the Azure Monitor extension for your Azure Arc-enabled Kubernetes cluster, you can additionally check the status of installation using the Azure portal or CLI. Successful installations should show the status as 'Installed'. If your status is showing 'Failed' or remains in the 'Pending' state for long periods of time, proceed to the Troubleshooting section below.
174
210
175
-
### Azure portal
211
+
### [Azure portal](#tab/verify-portal)
176
212
1. In the Azure portal, select the Azure Arc-enabled Kubernetes cluster with the extension installing
177
213
2. Select the 'Extensions' item under the 'Settings' section of the resource blade
178
214
3. You should see an extension with the name 'azuremonitor-containers' listed, with the listed status in the 'Install status' column
179
-
### Azure CLI
215
+
### [CLI](#tab/verify-cli)
180
216
Run the following command to show the latest status of the `Microsoft.AzureMonitor.Containers` extension
181
217
```azurecli
182
218
az k8s-extension show --name azuremonitor-containers --cluster-name <cluster-name> --resource-group <resource-group> --cluster-type connectedClusters -n azuremonitor-containers
183
219
```
184
220
221
+
---
222
+
223
+
## Migrate to managed identity authentication (preview)
224
+
Use the flowing guidance to migrate an existing extension instance to managed identity authentication (preview).
225
+
226
+
## [CLI](#tab/migrate-cli)
227
+
First retrieve the Log Analytics workspace configured for Container insights extension.
228
+
229
+
```cli
230
+
az k8s-extension show --name azuremonitor-containers --cluster-name \<cluster-name\> --resource-group \<resource-group\> --cluster-type connectedClusters -n azuremonitor-containers
231
+
```
232
+
233
+
Enable Container insights extension with managed identity authentication option using the workspace returned in the first step.
1. Download the template at [https://aka.ms/arc-k8s-azmon-extension-msi-arm-template](https://aka.ms/arc-k8s-azmon-extension-msi-arm-template) and save it as **arc-k8s-azmon-extension-msi-arm-template.json**.
243
+
244
+
2. Download the parameter file at [https://aka.ms/arc-k8s-azmon-extension-msi-arm-template-params](https://aka.ms/arc-k8s-azmon-extension-msi-arm-template) and save it as **arc-k8s-azmon-extension-msi-arm-template-params.json**.
245
+
246
+
3. Edit the values in the parameter file.
247
+
248
+
- For **workspaceDomain**, use *opinsights.azure.com* for Azure public cloud and *opinsights.azure.us* for Azure Government cloud.
249
+
- Specify the tags in the **resourceTagValues** parameter if you want to use any Azure tags on the Azure resources that will be created as part of the Container insights extension.
250
+
251
+
4. Deploy the template to create Container Insights extension.
252
+
253
+
```cli
254
+
az login
255
+
az account set --subscription "Subscription Name"
256
+
az deployment group create --resource-group <resource-group> --template-file ./arc-k8s-azmon-extension-msi-arm-template.json --parameters @./arc-k8s-azmon-extension-msi-arm-template-params.json
257
+
```
258
+
259
+
---
260
+
185
261
## Delete extension instance
186
262
187
263
The following command only deletes the extension instance, but doesn't delete the Log Analytics workspace. The data within the Log Analytics resource is left intact.
0 commit comments