Skip to content

Commit d65ebf5

Browse files
Merge pull request #286002 from maud-lv/ml-amgimages0209
Update screenshots
2 parents c2b20de + 6d4016b commit d65ebf5

15 files changed

+8
-9
lines changed

articles/managed-grafana/how-to-deterministic-ip.md

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,10 +70,11 @@ This example demonstrates how to disable public access to Azure Data Explorer an
7070

7171
1. Open an Azure Data Explorer Cluster instance in the Azure portal, and under **Settings**, select **Networking**.
7272
1. In the **Public Access** tab, select **Disabled** to disable public access to the data source.
73-
1. Under **Firewall**, check the box **Add your client IP address ('88.126.99.17')** and under **Address range**, enter the IP addresses found in your Azure Managed Grafana workspace.
74-
1. Select **Save** to finish adding the Azure Managed Grafana outbound IP addresses to the allowlist.
7573

76-
:::image type="content" source="media/deterministic-ips/add-ip-data-source-firewall.png" alt-text="Screenshot of the Azure platform. Add Azure Managed Grafana outbound IPs to datasource firewall allowlist.":::
74+
:::image type="content" source="media/deterministic-ips/add-ip-data-source-firewall.png" alt-text="Screenshot of the Azure platform. Add Disable public network access.":::
75+
76+
1. Under **Firewall**, check the box **Add your client IP address** and under **Address range**, enter the IP addresses found in your Azure Managed Grafana workspace.
77+
1. Select **Save** to finish adding the Azure Managed Grafana outbound IP addresses to the allowlist.
7778

7879
You have limited access to your data source by disabling public access, activating a firewall and allowing access from Azure Managed Grafana IP addresses.
7980

@@ -87,7 +88,7 @@ Check if the Azure Managed Grafana endpoint can still access your data source.
8788

8889
1. Go to **Configuration > Data Source > Azure Data Explorer Datasource > Settings** and at the bottom of the page, select **Save & test**:
8990
- If the message "Success" is displayed, Azure Managed Grafana can access your data source.
90-
- If the following error message is displayed, Azure Managed Grafana can't access the data source: `Post "https://<Azure-Data-Explorer-URI>/v1/rest/query": dial tcp 13.90.24.175:443: i/o timeout`. Make sure that you've entered the IP addresses correctly in the data source firewall allowlist.
91+
- If the following error message is displayed, Azure Managed Grafana can't access the data source: `Post "https://<Azure-Data-Explorer-URI>/v1/rest/query": dial tcp ...: i/o timeout`. Make sure that you've entered the IP addresses correctly in the data source firewall allowlist.
9192

9293
### [Azure CLI](#tab/azure-cli)
9394

-11 KB
Loading
-16.8 KB
Loading
-6.93 KB
Loading
-595 Bytes
Loading
2.54 KB
Loading
-15.8 KB
Loading
-84.9 KB
Loading
-34.6 KB
Loading

0 commit comments

Comments
 (0)