Skip to content

Commit da36b67

Browse files
committed
Update screenshot
1 parent 1463d06 commit da36b67

10 files changed

+2
-17
lines changed

articles/managed-grafana/how-to-deterministic-ip.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,11 +70,9 @@ This example demonstrates how to disable public access to Azure Data Explorer an
7070

7171
1. Open an Azure Data Explorer Cluster instance in the Azure portal, and under **Settings**, select **Networking**.
7272
1. In the **Public Access** tab, select **Disabled** to disable public access to the data source.
73-
1. Under **Firewall**, check the box **Add your client IP address ('88.126.99.17')** and under **Address range**, enter the IP addresses found in your Azure Managed Grafana workspace.
73+
1. Under **Firewall**, check the box **Add your client IP address** and under **Address range**, enter the IP addresses found in your Azure Managed Grafana workspace.
7474
1. Select **Save** to finish adding the Azure Managed Grafana outbound IP addresses to the allowlist.
7575

76-
:::image type="content" source="media/deterministic-ips/add-ip-data-source-firewall.png" alt-text="Screenshot of the Azure platform. Add Azure Managed Grafana outbound IPs to datasource firewall allowlist.":::
77-
7876
You have limited access to your data source by disabling public access, activating a firewall and allowing access from Azure Managed Grafana IP addresses.
7977

8078
## Check access to the data source
@@ -87,7 +85,7 @@ Check if the Azure Managed Grafana endpoint can still access your data source.
8785

8886
1. Go to **Configuration > Data Source > Azure Data Explorer Datasource > Settings** and at the bottom of the page, select **Save & test**:
8987
- If the message "Success" is displayed, Azure Managed Grafana can access your data source.
90-
- If the following error message is displayed, Azure Managed Grafana can't access the data source: `Post "https://<Azure-Data-Explorer-URI>/v1/rest/query": dial tcp 13.90.24.175:443: i/o timeout`. Make sure that you've entered the IP addresses correctly in the data source firewall allowlist.
88+
- If the following error message is displayed, Azure Managed Grafana can't access the data source: `Post "https://<Azure-Data-Explorer-URI>/v1/rest/query": dial tcp ...: i/o timeout`. Make sure that you've entered the IP addresses correctly in the data source firewall allowlist.
9189

9290
### [Azure CLI](#tab/azure-cli)
9391

Binary file not shown.
-595 Bytes
Loading
-29.4 KB
Loading

articles/managed-grafana/tutorial-mpe-oss-prometheus.md

Lines changed: 0 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -154,28 +154,15 @@ spec:
154154

155155
1. The private link service with name `promManagedPls` is created in the AKS managed resource group. This process takes a few minutes.
156156

157-
:::image type="content" source="media/tutorial-managed-private-endpoint/private-link-service-prometheus.png" alt-text="Screenshot of the Azure platform: showing the created Private Link Service resource.":::
158-
159157
## Connect with a managed private endpoint
160158

161159
1. If you don't have an Azure Managed Grafana workspace yet, create one by following the [Azure Managed Grafana quickstart](./quickstart-managed-grafana-portal.md).
162160
1. Open your Azure Managed Grafana workspace and go to **Networking** > **Managed Private Endpoint** > **Create**.
163-
164-
:::image type="content" source="media/tutorial-managed-private-endpoint/create-managed-private-endpoint.png" alt-text="Screenshot of the Azure platform showing the managed private endpoints page within an Azure Managed Grafana resource.":::
165-
166161
1. Enter a name for your managed private endpoint and select your Azure subscription.
167162
1. For **Resource type** select **Microsoft.Network/privateLinkServices (Private link services)**, and for **Target resource**, select the `promManagedPls` private link service created in the above step. Each managed private endpoint gets a private IP address. You can also provide a domain name for this managed private endpoint. The Azure Managed Grafana service ensures that this domain is resolved to the managed private endpoint's private IP inside the Azure Managed Grafana environment. For example, set the domain to `*.prom.my-own-domain.com`.
168-
169-
:::image type="content" source="media/tutorial-managed-private-endpoint/private-link-service-managed-private-endpoint-create-info.png" alt-text="Screenshot of the Azure platform showing Prometheus information entered for the new managed private endpoint.":::
170-
171163
1. Approve the private endpoint connection by going to the promManagedPls resource. Under **Settings**, go **Private endpoint connections**, select your connection using the checkbox and **Approve**.
172-
173-
:::image type="content" source="media/tutorial-managed-private-endpoint/private-link-service-approve-connection.png" alt-text="Screenshot of the Azure platform showing the Approve connection action.":::
174-
175164
1. After the private endpoint connection is approved, go back to your Azure Managed Grafana resource and select the **Refresh** button in the Managed Private Endpoint tab to synchronize the `Connection state`. It should now show as **Approved**.
176165

177-
:::image type="content" source="media/tutorial-managed-private-endpoint/managed-private-endpoint-sync.png" alt-text="Screenshot of the Azure platform showing the Refresh button.":::
178-
179166
## Display Prometheus data in a Grafana dashboard
180167

181168
1. Add the Prometheus data source to Grafana from your Grafana portal. For more information, go to [Add a data source](./how-to-data-source-plugins-managed-identity.md#add-a-data-source). Our Prometheus URL is `http://prom-service.prom.my-own-domain.com:9090`.

0 commit comments

Comments
 (0)