Skip to content

Commit 9b285f8

Browse files
committed
Updated article
1 parent 07ec997 commit 9b285f8

File tree

1 file changed

+110
-37
lines changed

1 file changed

+110
-37
lines changed

articles/azure-vmware/integrate-azure-native-services.md

Lines changed: 110 additions & 37 deletions
Original file line numberDiff line numberDiff line change
@@ -12,63 +12,136 @@ ms.custom: engagement-fy23
1212
Microsoft Azure native services let you monitor, manage, and protect your virtual machines (VMs) in a hybrid environment (Azure, Azure VMware Solution, and on-premises). In this article, you'll integrate Azure native services in your Azure VMware Solution private cloud. You'll also learn how to use the tools to manage your VMs throughout their lifecycle.
1313

1414
The Azure native services that you can integrate with Azure VMware Solution include:
15-
16-
- **Azure Arc** extends Azure management to any infrastructure, including Azure VMware Solution, on-premises, or other cloud platforms. [Azure Arc-enabled servers](../azure-arc/servers/overview.md) lets you manage your Windows and Linux physical servers and virtual machines hosted *outside* of Azure, on your corporate network, or another cloud provider. You can attach a Kubernetes cluster hosted in your Azure VMware Solution environment using [Azure Arc enabled Kubernetes](../azure-arc/kubernetes/overview.md).
17-
18-
- **Azure Monitor** collects, analyzes, and acts on data from your cloud and on-premises environments. It requires no deployment. You can monitor guest operating system performance to discover and map application dependencies for Azure VMware Solution or on-premises VMs. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions.
19-
20-
With Azure Monitor, you can collect data from different [sources to monitor and analyze](../azure-monitor/data-sources.md) and different types of [data for analysis, visualization, and alerting](../azure-monitor/data-platform.md). You can also create alert rules to identify issues in your environment, like high use of resources, missing patches, low disk space, and heartbeat of your VMs. You can set an automated response to detected events by sending an alert to IT Service Management (ITSM) tools. Alert detection notification can also be sent via email.
21-
22-
- **Microsoft Defender for Cloud** strengthens data centers' security and provides advanced threat protection across hybrid workloads in the cloud or on-premises. It assesses Azure VMware Solution VMs' vulnerability, raises alerts as needed, and forwards them to Azure Monitor for resolution. For instance, it assesses missing operating system patches, security misconfigurations, and [endpoint protection](../security-center/security-center-services.md). You can also define security policies in [Microsoft Defender for Cloud](azure-security-integration.md).
23-
24-
- **Azure Update Management** manages operating system updates for your Windows and Linux machines in a hybrid environment in Azure Automation. It monitors patching compliance and forwards patching deviation alerts to Azure Monitor for remediation. Azure Update Management must connect to your Log Analytics workspace to use stored data to assess the status of updates on your VMs.
25-
26-
- **Log Analytics workspace** stores log data. Each workspace has its own data repository and configuration to store data. You can monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics Workspace use the [Log Analytics agent](../azure-monitor/agents/log-analytics-agent.md) to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis. Use the Azure Arc enabled servers [VM extensions support](../azure-arc/servers/manage-vm-extensions.md) to deploy Log Analytics agents on VMs.
15+
- Azure Arc extends Azure management Azure VMware Solution. Once your Azure VMware Solution private cloud is onboarded to Arc, you'll be ready to execute operations in Azure VMware Solution vCenter Server from the Azure portal. Operations are related to Create, Read, Update, and Delete (CRUD) virtual machines (VMs) in an Arc-enabled Azure VMware Solution private cloud. Users can also enable guest management and install Azure extensions once the private cloud is Arc-enabled.
16+
- Azure Monitor collects, analyzes, and acts on data from your cloud and on-premises environments. Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions. You can send logs from your AVS private cloud to your Log Analytics workspace, allowing you to take advantage of the Log Analytics feature set, including:
17+
- system patches, security misconfigurations, and endpoint protection. You can also define security policies in Microsoft Defender for Cloud.
18+
- Log Analytics workspace stores log data. Each workspace has its own data repository and configuration to store data. You can monitor Azure VMware Solution VMs through the Log Analytics agent. Machines connected to the Log Analytics Workspace use the Log Analytics agent to collect data about changes to installed software, Microsoft services, Windows registry and files, and Linux daemons on monitored servers. When data is available, the agent sends it to Azure Monitor Logs for processing. Azure Monitor Logs applies logic to the received data, records it, and makes it available for analysis.
2719

2820
## Benefits
29-
3021
- Azure native services can be used to manage your VMs in a hybrid environment (Azure, Azure VMware Solution, and on-premises).
3122
- Integrated monitoring and visibility of your Azure, Azure VMware Solution, and on-premises VMs.
32-
- With Azure Update Management in Azure Automation, you can manage operating system updates for both your Windows and Linux machines.
33-
- Microsoft Defender for Cloud provides advanced threat protection, including:
34-
- File integrity monitoring
35-
- Fileless security alerts
36-
- Operating system patch assessment
37-
- Security misconfigurations assessment
38-
- Endpoint protection assessment
39-
- Easily deploy the Log Analytics agent using Azure Arc enabled servers VM extension support for new and existing VMs.
40-
- Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics agent or extensions. Collect data and logs to a single point and present that data to different Azure native services.
23+
- Fileless security alerts
24+
- Operating system patch assessment
25+
- Security misconfigurations assessment
26+
- Endpoint protection assessment
27+
- Easily deploy the Log Analytics extension after enabling guest management on VMware vSphere virtual machine (VM).
28+
- Your Log Analytics workspace in Azure Monitor enables log collection and performance counter collection using the Log Analytics extensions. Collect data and logs to a single point and present that data to different Azure native services.
4129
- Added benefits of Azure Monitor include:
42-
- Seamless monitoring
43-
- Better infrastructure visibility
44-
- Instant notifications
45-
- Automatic resolution
46-
- Cost efficiency
30+
- Seamless monitoring
31+
- Better infrastructure visibility
32+
- Instant notifications
33+
- Automatic resolution
34+
- Cost efficiency
4735

4836
## Topology
4937

5038
The diagram shows the integrated monitoring architecture for Azure VMware Solution VMs.
5139

5240
:::image type="content" source="media/concepts/integrated-azure-monitoring-architecture.png" alt-text="Diagram showing the integrated Azure monitoring architecture."lightbox="media/concepts/integrated-azure-monitoring-architecture.png" border="false":::
5341

54-
The Log Analytics agent enables collection of log data from Azure, Azure VMware Solution, and on-premises VMs. The log data is sent to Azure Monitor Logs and stored in a Log Analytics workspace. You can deploy the Log Analytics agent using Arc enabled servers [VM extensions support](../azure-arc/servers/manage-vm-extensions.md) for new and existing VMs.
42+
Defender for Cloud forwards the environment vulnerability to Microsoft Sentinel to create an incident and map with other threats. You can also create the scheduled rules query to detect unwanted activity and convert it to the incidents.
43+
44+
## Before you start
45+
If you're new to Azure or not familiar with any of the services previously mentioned, review the following articles:
46+
47+
- [Enable Azure Monitor for VMs overview](../azure/azure-monitor/vm/vminsights-enable-overview)
48+
49+
## Enable guest management and install extension
50+
The guest management must be enabled on the VMware vSphere virtual machine (VM) before you can install an extension. Use the following prerequisite steps to enable guest management.
51+
### Prerequisites
52+
- Navigate to Azure portal.
53+
- Locate the VMware vSphere VM you want to check for guest management and install extensions on, select the name of the VM.
54+
- Select **Configuration** from the left navigation for a VMware VM.
55+
- Verify **Enable guest management** has been checked.
56+
57+
The following conditions are necessary to enable guest management on a VM.
58+
- The machine must be running a supported operating system.
59+
- The machine needs to connect through the firewall to communicate over the internet. Make sure the URLs listed aren't blocked.
60+
- The machine can't be behind a proxy, it's not supported yet.
61+
- If you're using Linux VM, the account must not prompt to sign in on pseudo commands.
62+
- To avoid pseudo commands, follow these steps:
63+
1. Sign into Linux VM.
64+
2. Open terminal and run the following command: sudo visudo.
65+
3. Add the line `username ALL=(ALL) NOPASSWD: ALL` at the end of the file.
66+
4. Replace username with the appropriate user-name.
67+
If your VM template already has these changes incorporated, you won't need to do the steps for the VM created from that template.
68+
### Install extensions
69+
1. Go to **Azure** portal.
70+
1. Find the Arc-enabled Azure VMware Solution VM that you want to install an extension on and select the VM name.
71+
1. Navigate to **Extensions** in the left navigation, select **Add**.
72+
1. Select the extension you want to install.
73+
Based on the extension, you'll need to provide details.
74+
For example, workspace ID and key for Log Analytics extension.
75+
1. When you're done, select **Review + create**.
76+
77+
When the extension installation steps are completed, they trigger deployment and install the selected extension on the VM.
78+
79+
80+
81+
82+
83+
84+
85+
86+
87+
88+
89+
90+
91+
92+
93+
94+
95+
96+
97+
98+
99+
100+
101+
102+
103+
104+
105+
106+
107+
108+
109+
110+
111+
112+
113+
114+
115+
116+
117+
118+
119+
120+
121+
122+
123+
124+
125+
126+
55127

56-
Once the Log Analytics workspace collects the logs, you can configure the Log Analytics workspace with Defender for Cloud to assess the vulnerability status of Azure VMware Solution VMs and raise an alert for any critical vulnerability. For instance, it assesses missing operating system patches, security misconfigurations, and [endpoint protection](../security-center/security-center-services.md).
128+
>
129+
>
130+
>
131+
>
132+
>
133+
>
134+
>
57135
58-
You can configure the Log Analytics workspace with Microsoft Sentinel for alert detection, threat visibility, hunting, and threat response. In the preceding diagram, Defender for Cloud is connected to Microsoft Sentinel using the Defender for Cloud connector. Defender for Cloud forwards the environment vulnerability to Microsoft Sentinel to create an incident and map with other threats. You can also create the scheduled rules query to detect unwanted activity and convert it to the incidents.
136+
____________________________________________OLD**
59137

60138
## Before you start
61139

62-
If you're new to Azure or unfamiliar with any of the services previously mentioned, review the following articles:
140+
If you're new to Azure or not familiar with any of the services previously mentioned, review the following articles:
63141

64-
- [Automation account authentication overview](../automation/automation-security-overview.md)
65-
- [Designing your Azure Monitor Logs deployment](../azure-monitor/logs/workspace-design.md) and [Azure Monitor](../azure-monitor/overview.md)
66-
- [Planning](../security-center/security-center-planning-and-operations-guide.md) and [Supported platforms](../security-center/security-center-os-coverage.md) for Microsoft Defender for Cloud
67142
- [Enable Azure Monitor for VMs overview](../azure-monitor/vm/vminsights-enable-overview.md)
68-
- [What is Azure Arc enabled servers?](../azure-arc/servers/overview.md) and [What is Azure Arc enabled Kubernetes?](../azure-arc/kubernetes/overview.md)
69-
- [Update Management overview](../automation/update-management/overview.md)
70143

71-
## Enable Azure Update Management
144+
## Enable guest management extension
72145

73146
[Azure Update Management](../automation/update-management/overview.md) in Azure Automation manages operating system updates for your Windows and Linux machines in a hybrid environment. It monitors patching compliance and forwards patching deviation alerts to Azure Monitor for remediation. Azure Update Management must connect to your Log Analytics workspace to use stored data to assess the status of updates on your VMs.
74147

0 commit comments

Comments
 (0)