Skip to content

Commit ebbc909

Browse files
committed
Minor updates
1 parent 849ca90 commit ebbc909

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

articles/managed-grafana/how-to-connect-to-data-source-privately.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ You can create a managed private endpoint in your Managed Grafana workspace to c
6060

6161
## Create a managed private endpoint to Azure Private Link service
6262

63-
If you have a data source internal to your virtual network, such as an InfluxDB server hosted on an Azure virtual machine, you can connect your Managed Grafana workspace to it. You’ll first add a private link access to that resource using the Azure Private Link service. The exact steps required to set up a private link is dependent on the type of Azure resource. Refer to the documentation of the hosting service you have. For example, [this article](/aks/private-clusters.md#use-a-private-endpoint-connection) describes to configure a private link to an Azure Kubernetes Service cluster.
63+
If you have a data source internal to your virtual network, such as an InfluxDB server hosted on an Azure virtual machine, you can connect your Managed Grafana workspace to it. You’ll first add a private link access to that resource using the Azure Private Link service. The exact steps required to set up a private link is dependent on the type of Azure resource. Refer to the documentation of the hosting service you have. For example, [this article](../aks/private-clusters.md#use-a-private-endpoint-connection) describes to configure a private link to an Azure Kubernetes Service cluster.
6464

6565
Once you've set up the private link service, you can create a managed private endpoint in your Grafana workspace that connects to the new private link.
6666

@@ -69,12 +69,10 @@ Once you've set up the private link service, you can create a managed private en
6969

7070
:::image type="content" source="media/managed-private-endpoint/create-mpe.png" alt-text="Screenshot of the Azure portal create managed private endpoint." lightbox="media/managed-private-endpoint/create-mpe.png":::
7171

72-
3. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
73-
74-
:::image type="content" source="media/managed-private-endpoint/new-mpe-details.png" alt-text="Screenshot of the Azure portal new managed private endpoint details." lightbox="media/managed-private-endpoint/new-mpe-details.png":::
72+
1. In the *New managed private endpoint* pane, fill out required information for resource to connect to.
7573

76-
> [!TIP]
77-
> The *Private link service url* field is optional unless you need TLS. If you specify an URL, Managed Grafana will ensure that the host IP address for that URL matches the private endpoint's IP address. Due to security reasons, AMG have an allowed list of the URL.
74+
> [!TIP]
75+
> The *Private link service url* field is optional unless you need TLS. If you specify an URL, Managed Grafana will ensure that the host IP address for that URL matches the private endpoint's IP address. Due to security reasons, AMG have an allowed list of the URL.
7876

7977
1. Click **Create** to add the managed private endpoint resource.
8078
1. Contact the owner of target Azure Monitor workspace to approve the connection request.

0 commit comments

Comments
 (0)