Skip to content

Commit cf0268f

Browse files
hestolzguywi-ms
andauthored
Apply suggestions from code review
Co-authored-by: Guy Wild <[email protected]>
1 parent f96d753 commit cf0268f

File tree

2 files changed

+11
-11
lines changed

2 files changed

+11
-11
lines changed

articles/azure-monitor/agents/azure-monitor-agent-manage.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The Azure Monitor agent is implemented as an [Azure VM extension](../../virtual-
2020
|:---|:---|:---|
2121
| Publisher | Microsoft.Azure.Monitor | Microsoft.Azure.Monitor |
2222
| Type | AzureMonitorWindowsAgent | AzureMonitorLinuxAgent |
23-
| TypeHandlerVersion | [See below](#extension-versions) | [See below](#extension-versions) |
23+
| TypeHandlerVersion | See [Azure Monitor Agent extension versions](./azure-monitor-agent-extension-versions.md) | [Azure Monitor Agent extension versions](./azure-monitor-agent-extension-versions.md) |
2424

2525
## Extension versions
2626
[View Azure Monitor Agent extension versions](./azure-monitor-agent-extension-versions.md).
@@ -36,7 +36,7 @@ The following prerequisites must be met prior to installing the Azure Monitor ag
3636
| Any role that includes the action *Microsoft.Resources/deployments/** | <ul><li>Subscription and/or</li><li>Resource group and/or </li></ul> | To deploy ARM templates |
3737
- **Non-Azure**: For installing the agent on physical servers and virtual machines hosted *outside* of Azure (i.e. on-premises) or in other clouds, you must [install the Azure Arc Connected Machine agent](../../azure-arc/servers/agent-overview.md) first (at no added cost)
3838
- **Authentication**: [Managed identity](../../active-directory/managed-identities-azure-resources/overview.md) must be enabled on Azure virtual machines. Both system-assigned and user-assigned managed identities are supported.
39-
- **User-assigned**: This is recommended for large scale deployments, configurable via [built-in Azure policies](#using-azure-policy). It can be created once and shared across multiple VMs, and is thus more scalable than system-assigned. If User-assigned managed identity is used, you must pass the managed identity details to Azure Monitor agent via extension settings:
39+
- **User-assigned**: This is recommended for large-scale deployments, configurable via [built-in Azure policies](#using-azure-policy). You can create a user-assigned managed identity once and share it across multiple VMs, and is thus more scalable than a system-assigned managed identity. If you use a user-assigned managed identity, you must pass the managed identity details to Azure Monitor Agent via extension settings:
4040
```json
4141
{
4242
"authentication": {
@@ -47,7 +47,7 @@ The following prerequisites must be met prior to installing the Azure Monitor ag
4747
}
4848
}
4949
```
50-
We recommend using `mi_res_id` as the `identifier-name`, and the below sample commands will only show usage with `mi_res_id` for the sake of brevity. For more details on `mi_res_id`, `object_id`, and `client_id`, visit the [managed identity docs](../../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md#get-a-token-using-http).
50+
We recommend using `mi_res_id` as the `identifier-name`. The sample commands below only show usage with `mi_res_id` for the sake of brevity. For more details on `mi_res_id`, `object_id`, and `client_id`, see the [managed identity documentation](../../active-directory/managed-identities-azure-resources/how-to-use-vm-token.md#get-a-token-using-http).
5151
- **System-assigned**: This is suited for initial testing or small deployments. When used at scale (for example, for all VMs in a subscription) it results in substantial number of identities created (and deleted) in Azure AD (Azure Active Directory). To avoid this churn of identities, it is recommended to use user-assigned managed identities instead. **For Arc-enabled servers, system-assigned managed identity is enabled automatically** (as soon as you install the Arc agent) as it's the only supported type for Arc-enabled servers.
5252
- This is not required for Azure Arc-enabled servers. The system identity will be enabled automatically if the agent is installed via [creating and assigning a data collection rule using the Azure portal](data-collection-rule-azure-monitor-agent.md#create-data-collection-rule-and-association).
5353
- **Networking**: The [AzureResourceManager service tag](../../virtual-network/service-tags-overview.md) must be enabled on the virtual network for the virtual machine. Additionally, the virtual machine must have access to the following HTTPS endpoints:

articles/azure-monitor/agents/resource-manager-agent.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -18,13 +18,13 @@ This article includes sample [Azure Resource Manager templates](../../azure-reso
1818

1919
The samples in this section install the Azure Monitor agent on Windows and Linux virtual machines and Azure Arc-enabled servers.
2020

21-
> [!IMPORTANT]
22-
> The below templates do not perform the prerequisite [creation](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-arm#create-a-user-assigned-managed-identity-3) and [assignment](../../active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md#user-assigned-managed-identity) of a user-assigned managed identity or [enablement](../../active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md#system-assigned-managed-identity) of system-assigned managed identity. A managed identity is required for Azure Monitor agent to collect and publish data. User-assigned managed identities are _strongly recommended_ over system-assigned managed identities due to their ease of management at scale.
21+
### Prerequisites
2322

24-
> [!IMPORTANT]
25-
> To configure data collection for these agents, you must also deploy [Resource Manager templates data collection rules and associations](./resource-manager-data-collection-rules.md).
23+
To use the templates below, you'll need:
24+
- To [create a user-assigned managed identity](../../active-directory/managed-identities-azure-resources/how-manage-user-assigned-managed-identities.md?pivots=identity-mi-methods-arm#create-a-user-assigned-managed-identity-3) and [assign the user-assigned managed identity](../../active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md#user-assigned-managed-identity), or [enable a system-assigned managed identity](../../active-directory/managed-identities-azure-resources/qs-configure-template-windows-vm.md#system-assigned-managed-identity). A managed identity is required for Azure Monitor agent to collect and publish data. User-assigned managed identities are _strongly recommended_ over system-assigned managed identities due to their ease of management at scale.
25+
- To configure data collection for Azure Monitor Agent, you must also deploy [Resource Manager template data collection rules and associations](./resource-manager-data-collection-rules.md).
2626

27-
## Permissions required
27+
### Permissions required
2828

2929
| Built-in Role | Scope(s) | Reason |
3030
|:---|:---|:---|
@@ -33,7 +33,7 @@ The samples in this section install the Azure Monitor agent on Windows and Linux
3333

3434
### Azure Windows virtual machine
3535

36-
The following sample installs the Azure Monitor agent on an Azure Windows virtual machine. Based on your desired authentication method, choose the appropriate template below.
36+
The following sample installs the Azure Monitor agent on an Azure Windows virtual machine. Use the appropriate template below based on your chosen authentication method.
3737

3838
#### User-assigned managed identity (recommended)
3939

@@ -206,7 +206,7 @@ resource windowsAgent 'Microsoft.Compute/virtualMachines/extensions@2021-11-01'
206206

207207
### Azure Linux virtual machine
208208

209-
The following sample installs the Azure Monitor agent on a Azure Linux virtual machine. Based on your desired authentication method, choose the appropriate template below.
209+
The following sample installs the Azure Monitor agent on an Azure Linux virtual machine. Use the appropriate template below based on your chosen authentication method.
210210

211211
#### User-assigned managed identity (recommended)
212212

@@ -453,7 +453,7 @@ resource windowsAgent 'Microsoft.HybridCompute/machines/extensions@2021-12-10-pr
453453

454454
### Azure Arc-enabled Linux server
455455

456-
The following sample installs the Azure Monitor agent on a Azure Arc-enabled Linux server.
456+
The following sample installs the Azure Monitor agent on an Azure Arc-enabled Linux server.
457457

458458
#### Template file
459459

0 commit comments

Comments
 (0)