Skip to content

Commit bc8f300

Browse files
Merge pull request #286115 from maud-lv/ml-grafanaendpoint
Add restriction note
2 parents 1945b3d + 6f2eac8 commit bc8f300

File tree

1 file changed

+3
-0
lines changed

1 file changed

+3
-0
lines changed

articles/managed-grafana/how-to-connect-to-data-source-privately.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ While managed private endpoints are free, there may be charges associated with p
2121
> [!NOTE]
2222
> Managed private endpoints are currently only available in Azure Global.
2323

24+
> [!NOTE]
25+
> If you're running a private data source in an AKS cluster, when the service’s `externalTrafficPolicy` is set to local, Azure Private Link Service needs to use a different subnet than the Pod’s subnet. If the same subnet is required, the service should use Cluster `externalTrafficPolicy`. See [Cloud Provider Azure](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/#restrictions).
26+
2427
## Supported data sources
2528

2629
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Azure Managed Grafana workspace to the following Azure data stores over private connectivity:

0 commit comments

Comments
 (0)