Skip to content

Commit a1caf52

Browse files
authored
Merge pull request #269619 from maud-lv/ml-grafanapreview
Portal UI updates in networking tab
2 parents fb350cd + 103e4f4 commit a1caf52

File tree

5 files changed

+16
-20
lines changed

5 files changed

+16
-20
lines changed

articles/managed-grafana/how-to-connect-to-data-source-privately.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -25,13 +25,13 @@ While managed private endpoints are free, there may be charges associated with p
2525

2626
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Azure Managed Grafana workspace to the following Azure data stores over private connectivity:
2727

28-
- Azure Cosmos DB for Mongo DB
29-
- Azure Cosmos DB for PostgreSQL
30-
- Azure Data Explorer
31-
- Azure Monitor private link scope (for example, Log Analytics workspace)
32-
- Azure Monitor workspace, for Managed Service for Prometheus
33-
- Azure SQL managed instance
34-
- Azure SQL server
28+
- Azure Cosmos DB for Mongo DB
29+
- Azure Cosmos DB for PostgreSQL
30+
- Azure Data Explorer
31+
- Azure Monitor private link scope (for example, Log Analytics workspace)
32+
- Azure Monitor workspace, for Managed Service for Prometheus
33+
- Azure SQL managed instance
34+
- Azure SQL server
3535
- Private link services
3636

3737
## Prerequisites
@@ -45,7 +45,7 @@ To follow the steps in this guide, you must have:
4545

4646
You can create a managed private endpoint in your Azure Managed Grafana workspace to connect to a [supported data source](#supported-data-sources) using a private link.
4747

48-
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking (Preview)**.
48+
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking**.
4949
1. Select **Managed Private Endpoint**, and then select **Create**.
5050

5151
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
@@ -67,7 +67,7 @@ If you have a data source internal to your virtual network, such as an InfluxDB
6767

6868
Once you've set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
6969

70-
1. In the Azure portal, navigate to your Grafana resource and then select **Networking (Preview)**.
70+
1. In the Azure portal, navigate to your Grafana resource and then select **Networking**.
7171
1. Select **Managed Private Endpoint**, and then select **Create**.
7272

7373
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::

articles/managed-grafana/how-to-set-up-private-access.md

Lines changed: 7 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to set up private access (preview) in Azure Managed Grafana
2+
title: How to set up private access in Azure Managed Grafana
33
titlesuffix: Azure Managed Grafana
44
description: How to disable public access to your Azure Managed Grafana workspace and configure private endpoints.
55
#CustomerIntent: As a data professional or developer I want to configure private access to an Azure Managed Grafana workspace.
@@ -11,14 +11,10 @@ ms.date: 01/31/2024
1111
ms.custom: how-to, devx-track-azurecli
1212
---
1313

14-
# Set up private access (preview)
14+
# Set up private access
1515

1616
In this guide, you'll learn how to disable public access to your Azure Managed Grafana workspace and set up private endpoints. Setting up private endpoints in Azure Managed Grafana increases security by limiting incoming traffic only to specific network.
1717

18-
> [!IMPORTANT]
19-
> Private access is currently in PREVIEW.
20-
> See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21-
2218
## Prerequisites
2319

2420
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
@@ -29,12 +25,12 @@ In this guide, you'll learn how to disable public access to your Azure Managed G
2925
Public access is enabled by default when you create an Azure Grafana workspace. Disabling public access prevents all traffic from accessing the resource unless you go through a private endpoint.
3026

3127
> [!NOTE]
32-
> When private access (preview) is enabled, pinging charts using the [*Pin to Grafana*](../azure-monitor/visualize/grafana-plugin.md#pin-charts-from-the-azure-portal-to-azure-managed-grafana) feature will no longer work as the Azure portal can't access an Azure Managed Grafana workspace on a private IP address.
28+
> When private access is enabled, pinging charts using the [*Pin to Grafana*](../azure-monitor/visualize/grafana-plugin.md#pin-charts-from-the-azure-portal-to-azure-managed-grafana) feature will no longer work as the Azure portal can't access an Azure Managed Grafana workspace on a private IP address.
3329
3430
### [Portal](#tab/azure-portal)
3531

3632
1. Navigate to your Azure Managed Grafana workspace in the Azure portal.
37-
1. In the left-hand menu, under **Settings**, select **Networking (Preview)**.
33+
1. In the left-hand menu, under **Settings**, select **Networking**.
3834
1. Under **Public Access**, select **Disabled** to disable public access to the Azure Managed Grafana workspace and only allow access through private endpoints. If you already had public access disabled and instead wanted to enable public access to your Azure Managed Grafana workspace, you would select **Enabled**.
3935
1. Select **Save**.
4036

@@ -56,7 +52,7 @@ Once you have disabled public access, set up a [private endpoint](../private-lin
5652

5753
### [Portal](#tab/azure-portal)
5854

59-
1. In **Networking (Preview)**, select the **Private Access** tab and then **Add** to start setting up a new private endpoint.
55+
1. In **Networking**, select the **Private Access** tab and then **Add** to start setting up a new private endpoint.
6056

6157
:::image type="content" source="media/private-endpoints/add-private-endpoint.png" alt-text="Screenshot of the Azure portal selecting Add button.":::
6258

@@ -115,7 +111,7 @@ Once deployment is complete, you'll get a notification that your endpoint has be
115111

116112
### [Azure CLI](#tab/azure-cli)
117113

118-
1. To set up your private endpoint (preview), you need a virtual network. If you don't have one yet, create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create). Replace the placeholder texts `<vnet>`, `<resource-group>`, `<subnet>`, and `<vnet-location>` with the name of your new virtual network, resource group, and name, and vnet location.
114+
1. To set up your private endpoint, you need a virtual network. If you don't have one yet, create a virtual network with [az network vnet create](/cli/azure/network/vnet#az-network-vnet-create). Replace the placeholder texts `<vnet>`, `<resource-group>`, `<subnet>`, and `<vnet-location>` with the name of your new virtual network, resource group, and name, and vnet location.
119115

120116
```azurecli-interactive
121117
az network vnet create --name <vnet> --resource-group <resource-group> --subnet-name <subnet> --location <vnet-location>
@@ -159,7 +155,7 @@ Once deployment is complete, you'll get a notification that your endpoint has be
159155
160156
### [Portal](#tab/azure-portal)
161157
162-
Go to **Networking (Preview)** > **Private Access** in your Azure Managed Grafana workspace to access the private endpoints linked to your workspace.
158+
Go to **Networking** > **Private Access** in your Azure Managed Grafana workspace to access the private endpoints linked to your workspace.
163159
164160
1. Check the connection state of your private link connection. When you create a private endpoint, the connection must be approved. If the resource for which you're creating a private endpoint is in your directory and you have [sufficient permissions](../private-link/rbac-permissions.md), the connection request will be auto-approved. Otherwise, you must wait for the owner of that resource to approve your connection request. For more information about the connection approval models, go to [Manage Azure Private Endpoints](../private-link/manage-private-endpoint.md#private-endpoint-connections).
165161
-110 KB
Loading
-23.6 KB
Loading
13.4 KB
Loading

0 commit comments

Comments
 (0)