Skip to content

Commit eb943b5

Browse files
committed
PR review
1 parent bdf9c53 commit eb943b5

File tree

4 files changed

+12
-12
lines changed

4 files changed

+12
-12
lines changed

articles/managed-grafana/how-to-connect-to-data-source-privately.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -25,14 +25,14 @@ While managed private endpoints are free, there may be charges associated with p
2525

2626
Managed private endpoints work with Azure services that support private link. Using them, you can connect your Azure Managed Grafana workspace to the following Azure data stores over private connectivity:
2727

28-
1. Azure Cosmos DB for Mongo DB
29-
1. Azure Cosmos DB for PostgreSQL
30-
1. Azure Data Explorer
31-
1. Azure Monitor private link scope (for example, Log Analytics workspace)
32-
1. Azure Monitor workspace, for Managed Service for Prometheus
33-
1. Azure SQL managed instance
34-
1. Azure SQL server
35-
1. Private link services
28+
- Azure Cosmos DB for Mongo DB
29+
- Azure Cosmos DB for PostgreSQL
30+
- Azure Data Explorer
31+
- Azure Monitor private link scope (for example, Log Analytics workspace)
32+
- Azure Monitor workspace, for Managed Service for Prometheus
33+
- Azure SQL managed instance
34+
- Azure SQL server
35+
- Private link services
3636

3737
## Prerequisites
3838

@@ -48,11 +48,11 @@ You can create a managed private endpoint in your Azure Managed Grafana workspac
4848
1. In the Azure portal, navigate to your Grafana workspace and then select **Networking (Preview)**.
4949
1. Select **Managed Private Endpoint**, and then select **Create**.
5050

51-
:::image type="content" source="media/managed-private-endpoint/create-mpe.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create-mpe.png":::
51+
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
5252

5353
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
5454

55-
:::image type="content" source="media/managed-private-endpoint/new-mpe-details-azure-monitor.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Azure Monitor workspace.":::
55+
:::image type="content" source="media/managed-private-endpoint/new-details-azure-monitor.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Azure Monitor workspace.":::
5656

5757
1. Select an Azure *Resource type* (for example, **Microsoft.Monitor/accounts** for Azure Monitor Managed Service for Prometheus).
5858
1. Select **Create** to add the managed private endpoint resource.
@@ -70,11 +70,11 @@ Once you've set up the private link service, you can create a managed private en
7070
1. In the Azure portal, navigate to your Grafana resource and then select **Networking (Preview)**.
7171
1. Select **Managed Private Endpoint**, and then select **Create**.
7272

73-
:::image type="content" source="media/managed-private-endpoint/create-mpe.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create-mpe.png":::
73+
:::image type="content" source="media/managed-private-endpoint/create.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create.png":::
7474

7575
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
7676

77-
:::image type="content" source="media/managed-private-endpoint/new-mpe-details-private-link.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Private link services.png":::
77+
:::image type="content" source="media/managed-private-endpoint/new-details-private-link.png" alt-text="Screenshot of the Azure portal new managed private endpoint details for Private link services.":::
7878

7979
> [!TIP]
8080
> The *Domain name* field is optional. If you specify a domain name, Azure Managed Grafana will ensure that this domain name will be resolved to the managed private endpoint's private IP inside this Grafana's service managed network. You can use this domain name in your Grafana data source's URL configuration instead of the private IP address. You will be required to use the domain name if you enabled TLS or Server Name Indication (SNI) for your self-hosted data store.

0 commit comments

Comments
 (0)