You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/operator-insights/ingestion-agent-configuration-reference.md
+26-25Lines changed: 26 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,27 +20,30 @@ Configuration comprises three parts:
20
20
21
21
This reference shows two pipelines: one with an MCC EDR source and one with an SFTP pull source.
22
22
23
-
```
23
+
```yaml
24
24
# A unique identifier for this agent instance. Reserved URL characters must be percent-encoded. It's included in the upload path to the Data Product's input storage account.
25
25
agent_id: agent01
26
26
# Config for secrets providers. We support reading secrets from Azure Key Vault and from the VM's local filesystem.
27
27
# Multiple secret providers can be defined and each must be given a unique name, which is referenced later in the config.
28
28
# A secret provider of type `key_vault` which contains details required to connect to the Azure Key Vault and allow connection to the Data Product's input storage account. This is always required.
29
29
# A secret provider of type `file_system`, which specifies a directory on the VM where secrets are stored. For example for an SFTP pull source, for storing credentials for connecting to an SFTP server.
# The file system provider specifies a folder in which secrets are stored.
42
-
# Each secret must be an individual file without a file extension, where the secret name is the file name, and the file contains the secret only.
43
-
type: file_system
44
+
# The file system provider specifies a folder in which secrets are stored.
45
+
# Each secret must be an individual file without a file extension, where the secret name is the file name, and the file contains the secret only.
46
+
file_system:
44
47
# The absolute path to the secrets directory
45
48
secrets_directory: /path/to/secrets/directory
46
49
pipelines:
@@ -63,22 +66,21 @@ pipelines:
63
66
64
67
All pipelines require sink config, which covers upload of files to the Data Product's input storage account.
65
68
66
-
```
69
+
```yaml
67
70
sink:
68
71
# The container within the Data Product's input storage account. This *must* be exactly the name of the container that Azure Operator Insights expects. See the Data Product documentation for what value is required.
69
72
container_name: example-container
70
73
# Optional A string giving an optional base path to use in the container in the Data Product's input storage account. Reserved URL characters must be percent-encoded. See the Data Product for what value, if any, is required.
71
74
base_path: base-path
72
-
# Optional. How often the sink should refresh its SAS token for the Data Product's input storage account. Defaults to 1h. Examples: 30s, 10m, 1h, 1d.
73
-
sas_token_cache_period: 1h
74
-
auth:
75
-
type: sas_token
75
+
sas_token:
76
76
# This must reference a secret provider configured above.
77
-
secret_provider: data_product_keyvault
77
+
secret_provider: data_product_keyvault_mi
78
78
# The name of a secret in the corresponding provider.
79
79
# This will be the name of a secret in the Key Vault.
80
80
# This is created by the Data Product and should not be changed.
81
81
secret_name: input-storage-sas
82
+
# Optional. How often the sink should refresh its SAS token for the Data Product's input storage account. Defaults to 1h. Examples: 30s, 10m, 1h, 1d.
83
+
cache_period: 1h
82
84
# Optional. The maximum number of blobs that can be uploaded to the Data Product's input storage account in parallel. Further blobs will be queued in memory until an upload completes. Defaults to 10.
83
85
# Note: This value is also the maximum number of concurrent SFTP reads for the SFTP pull source. Ensure your SFTP server can handle this many concurrent connections. If you set this to a value greater than 10 and are using an OpenSSH server, you may need to increase `MaxSessions` and/or `MaxStartups` in `sshd_config`.
84
86
maximum_parallel_uploads: 10
@@ -95,7 +97,7 @@ Combining different types of source in one agent instance isn't recommended in p
95
97
96
98
### MCC EDR source configuration
97
99
98
-
```
100
+
```yaml
99
101
source:
100
102
mcc_edrs:
101
103
# The maximum amount of data to buffer in memory before uploading. Units are B, KiB, MiB, GiB, etc.
@@ -128,7 +130,7 @@ This configuration specifies which files are ingested from the SFTP server.
128
130
129
131
Multiple SFTP pull sources can be defined for one agent instance, where they can reference either different SFTP servers, or different folders on the same SFTP server.
130
132
131
-
```
133
+
```yaml
132
134
source:
133
135
sftp_pull:
134
136
server: Information relating to the SFTP session.
@@ -140,16 +142,15 @@ source:
140
142
known_hosts_file: /path/to/known_hosts
141
143
# The name of the user on the SFTP server which the agent will use to connect.
142
144
user: sftp-user
143
-
auth:
145
+
# The form of authentication to the SFTP server. This can take the values 'password' or 'private_key'. The appropriate field(s) must be configured below depending on which type is specified.
146
+
password:
144
147
# The name of the secret provider configured above which contains the secret for the SFTP user.
145
148
secret_provider: local_file_system
146
-
# The form of authentication to the SFTP server. This can take the values 'password' or 'ssh_key'. The appropriate field(s) must be configured below depending on which type is specified.
147
-
type: password
148
-
# Only for use with 'type: password'. The name of the file containing the password in the secrets_directory folder
149
+
# Only for use with password authentication. The name of the file containing the password in the secrets_directory folder
149
150
secret_name: sftp-user-password
150
-
# Only for use with 'type: ssh_key'. The name of the file containing the SSH key in the secrets_directory folder
151
+
# Only for use with private key authentication. The name of the file containing the SSH key in the secrets_directory folder
151
152
key_secret: sftp-user-ssh-key
152
-
# Optional. Only for use with 'type: ssh_key'. The passphrase for the SSH key. This can be omitted if the key is not protected by a passphrase.
153
+
# Optional. Only for use with private key authentication. The passphrase for the SSH key. This can be omitted if the key is not protected by a passphrase.
Copy file name to clipboardExpand all lines: articles/operator-insights/ingestion-agent-overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -61,7 +61,7 @@ The ingestion agent is designed to be highly reliable and resilient to low level
61
61
62
62
The ingestion agent authenticates to two separate systems, with separate credentials.
63
63
64
-
- To authenticate to the ingestion endpoint of an Azure Operator Insights Data Product, the agent obtains a connection string from an Azure Key Vault. The agent authenticates to this Key Vault with a Microsoft Entra ID service principal and certificate that you setup when you created the agent.
64
+
- To authenticate to the ingestion endpoint of an Azure Operator Insights Data Product, the agent obtains a SAS token from an Azure Key Vault. The agent authenticates to this Key Vault with either a Microsoft Entra ID managed identity or service principal and certificate that you setup when you created the agent.
65
65
- To authenticate to your SFTP server, the agent can use password authentication or SSH key authentication.
66
66
67
67
For configuration instructions, see [Set up authentication to Azure](set-up-ingestion-agent.md#set-up-authentication-to-azure), [Prepare the VMs](set-up-ingestion-agent.md#prepare-the-vms) and [Configure the agent software](set-up-ingestion-agent.md#configure-the-agent-software).
Copy file name to clipboardExpand all lines: articles/operator-insights/ingestion-agent-release-notes.md
+17Lines changed: 17 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,23 @@ The Azure Operator Insights ingestion agent receives improvements on an ongoing
15
15
16
16
This page is updated for each new release of the ingestion agent, so revisit it regularly. If you're looking for items older than six months, you can find them in [archive for What's new with Azure Operator Insights ingestion agent](ingestion-agent-release-notes-archive.md).
17
17
18
+
## Version 2.0.0 - March 2024
19
+
20
+
Download for [RHEL8](https://download.microsoft.com/download/8/2/7/82777410-04a8-4219-a8c8-2f2ea1d239c4/az-aoi-ingestion-2.0.0-1.el8.x86_64.rpm).
21
+
22
+
### Known issues
23
+
24
+
None
25
+
26
+
### New features
27
+
28
+
- Simplified configuration schema. This is a significant breaking change and requires manual updates to the configuration file in order to upgrade existing agents. See the [configuration reference](./ingestion-agent-configuration-reference.md) for the new schema.
29
+
- Added support for authenticating to the Data Product Key Vault with managed identities.
30
+
31
+
### Fixed
32
+
33
+
None
34
+
18
35
## Version 1.0.0 - February 2024
19
36
20
37
Download for [RHEL8](https://download.microsoft.com/download/c/6/c/c6c49e4b-dbb8-4d00-be7f-f6916183b6ac/az-aoi-ingestion-1.0.0-1.el8.x86_64.rpm).
Copy file name to clipboardExpand all lines: articles/operator-insights/managed-identity.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -27,18 +27,21 @@ For more general information about managed identities, see [What are managed ide
27
27
28
28
## User-assigned managed identities in Azure Operator Insights
29
29
30
-
Azure Operator Insights Data Products use a user-assigned managed identity for:
30
+
Azure Operator Insights use a user-assigned managed identity for:
31
31
32
32
- Encryption with customer-managed keys, also called CMK-based encryption.
33
33
- Integration with Microsoft Purview. The managed identity allows the Data Product to manage the collection and the data catalog within the collection.
34
+
- Authentication to Azure with an [ingestion agent](ingestion-agent-overview.md). See [use a managed identity for authentication](set-up-ingestion-agent.md#use-a-managed-identity-for-authentication).
34
35
35
36
When you [create a Data Product](data-product-create.md), you set up the managed identity and associate it with the Data Product. To use the managed identity with Microsoft Purview, you must also [grant the managed identity the appropriate permissions in Microsoft Purview](purview-setup.md#access-and-set-up-your-microsoft-purview-account).
36
37
37
38
You use Microsoft Entra ID to manage user-assigned managed identities. For more information, see [Create, list, delete, or assign a role to a user-assigned managed identity using the Azure portal](/entra/identity/managed-identities-azure-resources/how-manage-user-assigned-managed-identities).
38
39
39
40
## System-assigned managed identities in Azure Operator Insights
40
41
41
-
Azure Operator Insights doesn't support system-assigned managed identities.
42
+
Azure Operator Insights Data Products don't support system-assigned managed identities.
43
+
44
+
Azure Operator Insights ingestion agents on Azure VMs support system-assigned managed identities. See [Use a managed identity for authentication](set-up-ingestion-agent.md#use-a-managed-identity-for-authentication).
Copy file name to clipboardExpand all lines: articles/operator-insights/rotate-secrets-for-ingestion-agent.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,9 @@ ms.date: 02/29/2024
14
14
15
15
The ingestion agent is a software package that is installed onto a Linux Virtual Machine (VM) owned and managed by you.
16
16
17
-
It uses a service principal to obtain, from the Data Product's Azure Key Vault, the credentials needed to upload data to the Data Product's input storage account.
17
+
It uses a managed identity or service principal to obtain, from the Data Product's Azure Key Vault, the credentials needed to upload data to the Data Product's input storage account.
18
18
19
-
You must refresh your service principal credentials before they expire. In this article, you'll rotate the service principal certificates on the ingestion agent.
19
+
If you use a service principal, you must refresh its credentials before they expire. In this article, you'll rotate the service principal certificates on the ingestion agent.
20
20
21
21
## Prerequisites
22
22
@@ -25,7 +25,7 @@ None.
25
25
## Rotate certificates
26
26
27
27
1. Create a new certificate, and add it to the service principal. For instructions, refer to [Upload a trusted certificate issued by a certificate authority](/entra/identity-platform/howto-create-service-principal-portal).
28
-
1. Obtain the new certificate and private key in the base64-encoded PKCS12 format, as described in [Set up Ingestion Agents for Azure Operator Insights](set-up-ingestion-agent.md).
28
+
1. Obtain the new certificate and private key in the base64-encoded P12 format, as described in [Set up Ingestion Agents for Azure Operator Insights](set-up-ingestion-agent.md#prepare-certificates-for-the-service-principal).
29
29
1. Copy the certificate to the ingestion agent VM.
30
30
1. Save the existing certificate file and replace with the new certificate file.
0 commit comments