You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-connect-to-data-source-privately.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,13 +25,13 @@ While managed private endpoints are free, there may be charges associated with p
25
25
26
26
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Azure Managed Grafana workspace to the following Azure data stores over private connectivity:
27
27
28
-
-Azure Cosmos DB for Mongo DB
29
-
-Azure Cosmos DB for PostgreSQL
30
-
-Azure Data Explorer
31
-
-Azure Monitor private link scope (for example, Log Analytics workspace)
32
-
-Azure Monitor workspace, for Managed Service for Prometheus
33
-
-Azure SQL managed instance
34
-
-Azure SQL server
28
+
-Azure Cosmos DB for Mongo DB
29
+
-Azure Cosmos DB for PostgreSQL
30
+
-Azure Data Explorer
31
+
-Azure Monitor private link scope (for example, Log Analytics workspace)
32
+
-Azure Monitor workspace, for Managed Service for Prometheus
33
+
-Azure SQL managed instance
34
+
-Azure SQL server
35
35
- Private link services
36
36
37
37
## Prerequisites
@@ -45,7 +45,7 @@ To follow the steps in this guide, you must have:
45
45
46
46
You can create a managed private endpoint in your Azure Managed Grafana workspace to connect to a [supported data source](#supported-data-sources) using a private link.
47
47
48
-
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking (Preview)**.
48
+
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking**.
49
49
1. Select **Managed Private Endpoint**, and then select **Create**.
50
50
51
51
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
@@ -67,7 +67,7 @@ If you have a data source internal to your virtual network, such as an InfluxDB
67
67
68
68
Once you've set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
69
69
70
-
1. In the Azure portal, navigate to your Grafana resource and then select **Networking (Preview)**.
70
+
1. In the Azure portal, navigate to your Grafana resource and then select **Networking**.
71
71
1. Select **Managed Private Endpoint**, and then select **Create**.
72
72
73
73
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-set-up-private-access.md
+7-11Lines changed: 7 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: How to set up private access (preview) in Azure Managed Grafana
2
+
title: How to set up private access in Azure Managed Grafana
3
3
titlesuffix: Azure Managed Grafana
4
4
description: How to disable public access to your Azure Managed Grafana workspace and configure private endpoints.
5
5
#CustomerIntent: As a data professional or developer I want to configure private access to an Azure Managed Grafana workspace.
@@ -11,14 +11,10 @@ ms.date: 01/31/2024
11
11
ms.custom: how-to, devx-track-azurecli
12
12
---
13
13
14
-
# Set up private access (preview)
14
+
# Set up private access
15
15
16
16
In this guide, you'll learn how to disable public access to your Azure Managed Grafana workspace and set up private endpoints. Setting up private endpoints in Azure Managed Grafana increases security by limiting incoming traffic only to specific network.
17
17
18
-
> [!IMPORTANT]
19
-
> Private access is currently in PREVIEW.
20
-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21
-
22
18
## Prerequisites
23
19
24
20
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
@@ -29,12 +25,12 @@ In this guide, you'll learn how to disable public access to your Azure Managed G
29
25
Public access is enabled by default when you create an Azure Grafana workspace. Disabling public access prevents all traffic from accessing the resource unless you go through a private endpoint.
30
26
31
27
> [!NOTE]
32
-
> When private access (preview) is enabled, pinging charts using the [*Pin to Grafana*](../azure-monitor/visualize/grafana-plugin.md#pin-charts-from-the-azure-portal-to-azure-managed-grafana) feature will no longer work as the Azure portal can't access an Azure Managed Grafana workspace on a private IP address.
28
+
> When private access is enabled, pinging charts using the [*Pin to Grafana*](../azure-monitor/visualize/grafana-plugin.md#pin-charts-from-the-azure-portal-to-azure-managed-grafana) feature will no longer work as the Azure portal can't access an Azure Managed Grafana workspace on a private IP address.
33
29
34
30
### [Portal](#tab/azure-portal)
35
31
36
32
1. Navigate to your Azure Managed Grafana workspace in the Azure portal.
37
-
1. In the left-hand menu, under **Settings**, select **Networking (Preview)**.
33
+
1. In the left-hand menu, under **Settings**, select **Networking**.
38
34
1. Under **Public Access**, select **Disabled** to disable public access to the Azure Managed Grafana workspace and only allow access through private endpoints. If you already had public access disabled and instead wanted to enable public access to your Azure Managed Grafana workspace, you would select **Enabled**.
39
35
1. Select **Save**.
40
36
@@ -56,7 +52,7 @@ Once you have disabled public access, set up a [private endpoint](../private-lin
56
52
57
53
### [Portal](#tab/azure-portal)
58
54
59
-
1. In **Networking (Preview)**, select the **Private Access** tab and then **Add** to start setting up a new private endpoint.
55
+
1. In **Networking**, select the **Private Access** tab and then **Add** to start setting up a new private endpoint.
60
56
61
57
:::image type="content" source="media/private-endpoints/add-private-endpoint.png" alt-text="Screenshot of the Azure portal selecting Add button.":::
62
58
@@ -115,7 +111,7 @@ Once deployment is complete, you'll get a notification that your endpoint has be
115
111
116
112
### [Azure CLI](#tab/azure-cli)
117
113
118
-
1. To set up your private endpoint (preview), you need a virtual network. If you don't have one yet, create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create). Replace the placeholder texts `<vnet>`, `<resource-group>`, `<subnet>`, and `<vnet-location>` with the name of your new virtual network, resource group, and name, and vnet location.
114
+
1. To set up your private endpoint, you need a virtual network. If you don't have one yet, create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create). Replace the placeholder texts `<vnet>`, `<resource-group>`, `<subnet>`, and `<vnet-location>` with the name of your new virtual network, resource group, and name, and vnet location.
@@ -159,7 +155,7 @@ Once deployment is complete, you'll get a notification that your endpoint has be
159
155
160
156
### [Portal](#tab/azure-portal)
161
157
162
-
Go to **Networking (Preview)** > **Private Access** in your Azure Managed Grafana workspace to access the private endpoints linked to your workspace.
158
+
Go to **Networking** > **Private Access** in your Azure Managed Grafana workspace to access the private endpoints linked to your workspace.
163
159
164
160
1. Check the connection state of your private link connection. When you create a private endpoint, the connection must be approved. If the resource for which you're creating a private endpoint is in your directory and you have [sufficient permissions](../private-link/rbac-permissions.md), the connection request will be auto-approved. Otherwise, you must wait for the owner of that resource to approve your connection request. For more information about the connection approval models, go to [Manage Azure Private Endpoints](../private-link/manage-private-endpoint.md#private-endpoint-connections).
0 commit comments