You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/agents/agents-overview.md
-87Lines changed: 0 additions & 87 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,93 +85,6 @@ Azure Monitor Agent is available in all public regions and Azure Government clou
85
85
86
86
There's no cost for the Azure Monitor Agent, but you might incur charges for the data ingested. For information on Log Analytics data collection and retention and for customer metrics, see [Azure Monitor pricing](https://azure.microsoft.com/pricing/details/monitor/).
87
87
88
-
## Networking
89
-
90
-
The Azure Monitor Agent supports Azure service tags. Both *AzureMonitor* and *AzureResourceManager* tags are required. It supports connecting via *direct proxies, Log Analytics gateway, and private links* as described in the following sections.
| Azure Commercial |global.handler.control.monitor.azure.com |Access control service|Port 443 |Outbound|Yes |
97
-
| Azure Commercial |`<virtual-machine-region-name>`.handler.control.monitor.azure.com |Fetch data collection rules for specific machine |Port 443 |Outbound|Yes |
| Azure Commercial | management.azure.com | Only needed if sending time series data (metrics) to Azure Monitor [Custom metrics](../essentials/metrics-custom-overview.md) database | Port 443 | Outbound | Yes |
100
-
| Azure Government | Replace '.com' above with '.us' | Same as above | Same as above | Same as above| Same as above |
101
-
| Azure China | Replace '.com' above with '.cn' | Same as above | Same as above | Same as above| Same as above |
102
-
103
-
If you use private links on the agent, you must also add the [DCE endpoints](../essentials/data-collection-endpoint-overview.md#components-of-a-data-collection-endpoint).
104
-
105
-
### Proxy configuration
106
-
107
-
If the machine connects through a proxy server to communicate over the internet, review the following requirements to understand the network configuration required.
108
-
109
-
The Azure Monitor Agent extensions for Windows and Linux can communicate either through a proxy server or a [Log Analytics gateway](./gateway.md) to Azure Monitor by using the HTTPS protocol. Use it for Azure virtual machines, Azure virtual machine scale sets, and Azure Arc for servers. Use the extensions settings for configuration as described in the following steps. Both anonymous and basic authentication by using a username and password are supported.
110
-
111
-
> [!IMPORTANT]
112
-
> Proxy configuration is not supported for [Azure Monitor Metrics (Public preview)](../essentials/metrics-custom-overview.md) as a destination. If you're sending metrics to this destination, it will use the public internet without any proxy.
113
-
114
-
1. Use this flowchart to determine the values of the *`Settings` and `ProtectedSettings` parameters first.
115
-
116
-

117
-
118
-
1. After determining the `Settings` and `ProtectedSettings` parameter values, *provide these other parameters* when you deploy Azure Monitor Agent, using PowerShell commands, as shown in the following examples:
1. Follow the preceding instructions to configure proxy settings on the agent and provide the IP address and port number that corresponds to the gateway server. If you've deployed multiple gateway servers behind a load balancer, the agent proxy configuration is the virtual IP address of the load balancer instead.
161
-
1. Add the **configuration endpoint URL** to fetch data collection rules to the allowlist for the gateway
(If you're using private links on the agent, you must also add the [data collection endpoints](../essentials/data-collection-endpoint-overview.md#components-of-a-data-collection-endpoint).)
165
-
1. Add the **data ingestion endpoint URL** to the allowlist for the gateway
1. Restart the **OMS Gateway** service to apply the changes
168
-
`Stop-Service -Name <gateway-name>`
169
-
`Start-Service -Name <gateway-name>`.
170
-
171
-
### Private link configuration
172
-
173
-
To configure the agent to use private links for network communications with Azure Monitor, follow instructions to [enable network isolation](./azure-monitor-agent-data-collection-endpoint.md#enable-network-isolation-for-the-azure-monitor-agent) by using [data collection endpoints](azure-monitor-agent-data-collection-endpoint.md).
174
-
175
88
## Compare to legacy agents
176
89
177
90
The tables below provide a comparison of Azure Monitor Agent with the legacy the Azure Monitor telemetry agents for Windows and Linux.
description: Define network settings and enable network isolation for Azure Monitor Agent.
4
4
ms.topic: conceptual
5
5
author: shseth
6
6
ms.author: shseth
@@ -9,19 +9,105 @@ ms.custom: references_region
9
9
ms.reviewer: shseth
10
10
11
11
---
12
+
# Define Azure Monitor Agent network settings
12
13
13
-
# Enable network isolation for the Azure Monitor agent
14
+
Azure Monitor Agent supports connecting using direct proxies, Log Analytics gateway, and private links. This article explains how to define network settings and enable network isolation for Azure Monitor Agent.
15
+
16
+
## Virtual network service tags
17
+
18
+
The Azure Monitor Agent supports [Azure virtual network service tags](../../virtual-network/service-tags-overview.md). Both *AzureMonitor* and *AzureResourceManager* tags are required.
| Azure Commercial |global.handler.control.monitor.azure.com |Access control service|Port 443 |Outbound|Yes |
25
+
| Azure Commercial |`<virtual-machine-region-name>`.handler.control.monitor.azure.com |Fetch data collection rules for specific machine |Port 443 |Outbound|Yes |
| Azure Commercial | management.azure.com | Only needed if sending time series data (metrics) to Azure Monitor [Custom metrics](../essentials/metrics-custom-overview.md) database | Port 443 | Outbound | Yes |
28
+
| Azure Government | Replace '.com' above with '.us' | Same as above | Same as above | Same as above| Same as above |
29
+
| Azure China | Replace '.com' above with '.cn' | Same as above | Same as above | Same as above| Same as above |
30
+
31
+
If you use private links on the agent, you must also add the [DCE endpoints](../essentials/data-collection-endpoint-overview.md#components-of-a-data-collection-endpoint).
32
+
33
+
## Proxy configuration
34
+
35
+
If the machine connects through a proxy server to communicate over the internet, review the following requirements to understand the network configuration required.
36
+
37
+
The Azure Monitor Agent extensions for Windows and Linux can communicate either through a proxy server or a [Log Analytics gateway](./gateway.md) to Azure Monitor by using the HTTPS protocol. Use it for Azure virtual machines, Azure virtual machine scale sets, and Azure Arc for servers. Use the extensions settings for configuration as described in the following steps. Both anonymous and basic authentication by using a username and password are supported.
38
+
39
+
> [!IMPORTANT]
40
+
> Proxy configuration is not supported for [Azure Monitor Metrics (Public preview)](../essentials/metrics-custom-overview.md) as a destination. If you're sending metrics to this destination, it will use the public internet without any proxy.
41
+
42
+
1. Use this flowchart to determine the values of the *`Settings` and `ProtectedSettings` parameters first.
43
+
44
+

45
+
46
+
1. After determining the `Settings` and `ProtectedSettings` parameter values, *provide these other parameters* when you deploy Azure Monitor Agent, using PowerShell commands, as shown in the following examples:
1. Follow the preceding instructions to configure proxy settings on the agent and provide the IP address and port number that corresponds to the gateway server. If you've deployed multiple gateway servers behind a load balancer, the agent proxy configuration is the virtual IP address of the load balancer instead.
89
+
1. Add the **configuration endpoint URL** to fetch data collection rules to the allowlist for the gateway
(If you're using private links on the agent, you must also add the [data collection endpoints](../essentials/data-collection-endpoint-overview.md#components-of-a-data-collection-endpoint).)
93
+
1. Add the **data ingestion endpoint URL** to the allowlist for the gateway
1. Restart the **OMS Gateway** service to apply the changes
96
+
`Stop-Service -Name <gateway-name>`
97
+
`Start-Service -Name <gateway-name>`.
98
+
99
+
## Enable network isolation for the Azure Monitor agent
14
100
By default, Azure Monitor agent will connect to a public endpoint to connect to your Azure Monitor environment. You can enable network isolation for your agents by creating [data collection endpoints](../essentials/data-collection-endpoint-overview.md) and adding them to your [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources).
15
101
16
102
17
-
## Create data collection endpoint
103
+
###Create data collection endpoint
18
104
To use network isolation, you must create a data collection endpoint for each of your regions for agents to connect instead of the public endpoint. See [Create a data collection endpoint](../essentials/data-collection-endpoint-overview.md#create-data-collection-endpoint) for details on create a DCE. An agent can only connect to a DCE in the same region. If you have agents in multiple regions, then you must create a DCE in each one.
19
105
20
106
21
-
## Create private link
107
+
###Create private link
22
108
With [Azure Private Link](../../private-link/private-link-overview.md), you can securely link Azure platform as a service (PaaS) resources to your virtual network by using private endpoints. An Azure Monitor Private Link connects a private endpoint to a set of Azure Monitor resources, defining the boundaries of your monitoring network. That set is called an Azure Monitor Private Link Scope (AMPLS). See [Configure your Private Link](../logs/private-link-configure.md) for details on creating and configuring your AMPLS.
23
109
24
-
## Add DCE to AMPLS
110
+
###Add DCE to AMPLS
25
111
Add the data collection endpoints to a new or existing [Azure Monitor Private Link Scopes (AMPLS)](../logs/private-link-configure.md#connect-azure-monitor-resources) resource. This adds the DCE endpoints to your private DNS zone (see [how to validate](../logs/private-link-configure.md#review-and-validate-your-private-link-setup)) and allows communication via private links. You can do this from either the AMPLS resource or from within an existing DCE resource's 'Network Isolation' tab.
26
112
27
113
> [!NOTE]
@@ -33,15 +119,12 @@ For your data collection endpoint(s), ensure **Accept access from public network
33
119
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" lightbox="media/azure-monitor-agent-dce/data-collection-endpoint-network-isolation.png" alt-text="Screenshot for configuring data collection endpoint network isolation.":::
34
120
35
121
36
-
37
122
Associate the data collection endpoints to the target resources by editing the data collection rule in Azure portal. From the **Resources** tab, select **Enable Data Collection Endpoints** and select a DCE for each virtual machine. See [Configure data collection for the Azure Monitor agent](../agents/data-collection-rule-azure-monitor-agent.md).
38
123
39
124
40
125
:::image type="content" source="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" lightbox="media/azure-monitor-agent-dce/data-collection-rule-virtual-machines-with-endpoint.png" alt-text="Screenshot for configuring data collection endpoint for an agent.":::
41
126
42
127
43
-
44
-
45
128
## Next steps
46
129
-[Associate endpoint to machines](../agents/data-collection-rule-azure-monitor-agent.md#create-data-collection-rule-and-association)
47
130
-[Add endpoint to AMPLS resource](../logs/private-link-configure.md#connect-azure-monitor-resources)
0 commit comments