You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-connect-to-data-source-privately.md
+32-27Lines changed: 32 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,31 +5,34 @@ ms.service: managed-grafana
5
5
ms.topic: how-to
6
6
author: maud-lv
7
7
ms.author: malev
8
-
ms.date: 10/06/2023
8
+
ms.date: 02/05/2024
9
9
---
10
10
11
-
# Connect to a data source privately (preview)
11
+
# Connect to a data source privately
12
12
13
-
In this guide, you learn how to connect your Azure Managed Grafana instance to a data source using Managed Private Endpoint. Azure Managed Grafana’s managed private endpoints are endpoints created in a Managed Virtual Network that the Managed Grafana service uses. They establish private links from that network to your Azure data sources. Azure Managed Grafana sets up and manages these private endpoints on your behalf. You can create managed private endpoints from your Azure Managed Grafana to access other Azure managed services (for example, Azure Monitor private link scope or Azure Monitor workspace).
13
+
In this guide, you learn how to connect your Azure Managed Grafana instance to a data source using Managed Private Endpoint. Azure Managed Grafana’s managed private endpoints are endpoints created in a Managed Virtual Network that the Azure Managed Grafana service uses. They establish private links from that network to your Azure data sources. Azure Managed Grafana sets up and manages these private endpoints on your behalf. You can create managed private endpoints from your Azure Managed Grafana to access other Azure managed services (for example, Azure Monitor private link scope or Azure Monitor workspace) and your own self-hosted data sources (for example, connecting to your self-hosted Prometheus behind a private link service).
14
14
15
15
When you use managed private endpoints, traffic between your Azure Managed Grafana and its data sources traverses exclusively over the Microsoft backbone network without going through the internet. Managed private endpoints protect against data exfiltration. A managed private endpoint uses a private IP address from your Managed Virtual Network to effectively bring your Azure Managed Grafana workspace into that network. Each managed private endpoint is mapped to a specific resource in Azure and not the entire service. Customers can limit connectivity to only resources approved by their organizations.
16
16
17
-
A private endpoint connection is created in a "Pending" state when you create a managed private endpoint in your Managed Grafana workspace. An approval workflow is started. The private link resource owner is responsible for approving or rejecting the new connection. If the owner approves the connection, the private link is established. Otherwise, the private link won't be set up. Managed Grafana shows the current connection status. Only a managed private endpoint in an approved state can be used to send traffic to the private link resource that is connected to the managed private endpoint.
17
+
A private endpoint connection is created in a "Pending" state when you create a managed private endpoint in your Azure Managed Grafana workspace. An approval workflow is started. The private link resource owner is responsible for approving or rejecting the new connection. If the owner approves the connection, the private link is established. Otherwise, the private link isn't set up. Azure Managed Grafana shows the current connection status. Only a managed private endpoint in an approved state can be used to send traffic to the private link resource that is connected to the managed private endpoint.
18
18
19
19
While managed private endpoints are free, there may be charges associated with private link usage on a data source. For more information, see your data source’s pricing details.
20
20
21
-
> [!IMPORTANT]
22
-
> Managed Private Endpoint is currently in preview. See the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/) for legal terms that apply to Azure features that are in beta, preview, or otherwise not yet released into general availability.
21
+
> [!NOTE]
22
+
> Managed private endpoints are currently only available in Azure Global.
23
23
24
-
## Supported Azure data sources
24
+
## Supported data sources
25
25
26
-
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Managed Grafana workspace to the following Azure data stores over private connectivity:
26
+
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Azure Managed Grafana workspace to the following Azure data stores over private connectivity:
27
27
28
-
1. Azure Monitor private link scope (for example, Log Analytics workspace)
29
-
1. Azure Monitor workspace, for Managed Service for Prometheus
30
-
1. Azure Data Explorer
31
-
1. Azure Cosmos DB for Mongo DB
32
-
1. Azure SQL server
28
+
- Azure Cosmos DB for Mongo DB
29
+
- Azure Cosmos DB for PostgreSQL
30
+
- Azure Data Explorer
31
+
- Azure Monitor private link scope (for example, Log Analytics workspace)
32
+
- Azure Monitor workspace, for Managed Service for Prometheus
33
+
- Azure SQL managed instance
34
+
- Azure SQL server
35
+
- Private link services
33
36
34
37
## Prerequisites
35
38
@@ -40,47 +43,49 @@ To follow the steps in this guide, you must have:
40
43
41
44
## Create a managed private endpoint for Azure Monitor workspace
42
45
43
-
You can create a managed private endpoint in your Managed Grafana workspace to connect to a [supported Azure data source](#supported-azure-data-sources) using a private link.
46
+
You can create a managed private endpoint in your Azure Managed Grafana workspace to connect to a [supported data source](#supported-data-sources) using a private link.
44
47
45
48
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking (Preview)**.
46
-
1. Select **Managed private endpoint**, and then select **Create**.
49
+
1. Select **Managed Private Endpoint**, and then select **Create**.
47
50
48
-
:::image type="content" source="media/managed-private-endpoint/create-mpe.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create-mpe.png":::
51
+
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
49
52
50
53
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
51
54
52
-
:::image type="content" source="media/managed-private-endpoint/new-mpe-details.png" alt-text="Screenshot of the Azure portal new managed private endpoint details." lightbox="media/managed-private-endpoint/new-mpe-details.png":::
55
+
:::image type="content" source="media/managed-private-endpoint/new-details-azure-monitor.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Azure Monitor workspace.":::
53
56
54
57
1. Select an Azure *Resource type* (for example, **Microsoft.Monitor/accounts** for Azure Monitor Managed Service for Prometheus).
55
-
1. Click **Create** to add the managed private endpoint resource.
58
+
1. Select **Create** to add the managed private endpoint resource.
56
59
1. Contact the owner of target Azure Monitor workspace to approve the connection request.
57
60
58
61
> [!NOTE]
59
-
> After the new private endpoint connection is approved, all network traffic between your Managed Grafana workspace and the selected data source will flow only through the Azure backbone network.
62
+
> After the new private endpoint connection is approved, all network traffic between your Azure Managed Grafana workspace and the selected data source will flow only through the Azure backbone network.
60
63
61
64
## Create a managed private endpoint to Azure Private Link service
62
65
63
-
If you have a data source internal to your virtual network, such as an InfluxDB server hosted on an Azure virtual machine, you can connect your Managed Grafana workspace to it. You first need to add a private link access to that resource using the Azure Private Link service. The exact steps required to set up a private link is dependent on the type of Azure resource. Refer to the documentation of the hosting service you have. For example, [this article](../aks/private-clusters.md#use-a-private-endpoint-connection) describes to configure a private link to an Azure Kubernetes Service cluster.
66
+
If you have a data source internal to your virtual network, such as an InfluxDB server hosted on an Azure virtual machine, or a Loki server hosted inside your AKS cluster, you can connect your Azure Managed Grafana to it. You first need to add a private link access to that resource using the Azure Private Link service. The exact steps required to set up a private link is dependent on the type of Azure resource. Refer to the documentation of the hosting service you have. For example, [this article](https://cloud-provider-azure.sigs.k8s.io/topics/pls-integration/) describes how to create a private link service in Azure Kubernetes Service by specifying a kubernetes service object.
64
67
65
68
Once you've set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
66
69
67
70
1. In the Azure portal, navigate to your Grafana resource and then select **Networking (Preview)**.
68
-
1. Select **Managed private endpoint**, and then select **Create**.
71
+
1. Select **Managed Private Endpoint**, and then select **Create**.
69
72
70
-
:::image type="content" source="media/managed-private-endpoint/create-mpe.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create-mpe.png":::
73
+
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
71
74
72
75
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
73
76
77
+
:::image type="content" source="media/managed-private-endpoint/new-details-private-link.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Private link services.":::
78
+
74
79
> [!TIP]
75
-
> The *Private link service url* field is optional unless you need TLS. If you specify a URL, Managed Grafana will ensure that the host IP address for that URL matches the private endpoint's IP address. Due to security reasons, AMG have an allowed list of the URL.
80
+
> The *Domain name* field is optional. If you specify a domain name, Azure Managed Grafana will ensure that this domain name will be resolved to the managed private endpoint's private IP inside this Grafana's service managed network. You can use this domain name in your Grafana data source's URL configuration instead of the private IP address. You will be required to use the domain name if you enabled TLS or Server Name Indication (SNI) for your self-hosted data store.
76
81
77
-
1. Click **Create** to add the managed private endpoint resource.
82
+
1. Select **Create** to add the managed private endpoint resource.
78
83
1. Contact the owner of target private link service to approve the connection request.
79
-
1. After the connection request is approved, click **Refresh** to see the connection status and private IP address.
84
+
1. After the connection request is approved, select **Refresh** to ensure the connection status is **Approved** and private IP address is shown.
80
85
81
86
> [!NOTE]
82
-
> After the new private endpoint connection is approved, all network traffic between your Managed Grafana workspace and the selected data source will flow only through the Azure backbone network.
87
+
> The **Refresh** step cannot be skipped, since refreshing triggers a network sync operation by Azure Managed Grafana. Once the new managed private endpoint connection is shown approved, all network traffic between your Azure Managed Grafana workspace and the selected data source will only flow through the Azure backbone network.
83
88
84
89
## Next steps
85
90
86
-
In this how-to guide, you learned how to configure private access between a Managed Grafana workspace and a data source. To learn how to set up private access from your users to a Managed Grafana workspace, see [Set up private access](how-to-set-up-private-access.md).
91
+
In this how-to guide, you learned how to configure private access between an Azure Managed Grafana workspace and a data source. To learn how to set up private access from your users to an Azure Managed Grafana workspace, see [Set up private access](how-to-set-up-private-access.md).
0 commit comments