You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/private-link-security.md
+32-28Lines changed: 32 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,18 +28,18 @@ For more information, see [Key Benefits of Private Link](../../private-link/pri
28
28
29
29
Azure Monitor Private Link Scope is a grouping resource to connect one or more private endpoints (and therefore the virtual networks they are contained in) to one or more Azure Monitor resources. These resources include Log Analytics workspaces and Application Insights components.
30
30
31
-

31
+

32
32
33
33
> [!NOTE]
34
34
> A single Azure Monitor resource can belong to multiple AMPLSs, but you cannot connect a single VNet to more than one AMPLS.
35
35
36
-
## Planning AMPLS based on your network needs
36
+
## Planning AMPLS based on your network
37
37
38
38
Before setting up your AMPLS resources, consider your network isolation requirements. Evaluate your virtual networks' access to public internet, and the access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
39
39
40
-
### Evaluate which Virtual Networks should connect to a Private Link
40
+
### Evaluate which virtual networks should connect to a Private Link
41
41
42
-
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet needs connect to these resources over a Private Link, and through an AMPLS.
42
+
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet needs to connect to these resources over a Private Link, and through an AMPLS.
43
43
44
44
### Evaluate which Azure Monitor resources should have a Private Link
45
45
@@ -48,18 +48,18 @@ Review each of your Azure Monitor resources:
48
48
- Should the resource allow ingestion of logs from resources located on specific VNets only?
49
49
- Should the resource be queried only by clients located on specific VNETs?
50
50
51
-
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#Configuring Log Analytics workspaces) workspaces and [Configuring Application Insights components](#Configuring Application Insights components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
51
+
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configuring-log-analytics-workspaces) workspaces and [Configuring Application Insights components](#Configuring Application Insights components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
52
52
Remember – you can connect the same workspaces or application to multiple AMPLS, to allow them to be reached by different networks.
53
53
54
-
### Group together Monitoring resources by network accessibility
54
+
### Group together monitoring resources by network accessibility
55
55
56
56
Since each VNet can connect to only one AMPLS resource, you must group together monitoring resources that should be accessible to the same networks. The simplest way to manage this grouping is to create one AMPLS per VNet, and select the resources to connect to that network. However, to reduce resources and improve manageability, you may want to reuse an AMPLS across networks.
57
57
58
58
For example, if your internal virtual networks VNet1 and VNet2 should connect to workspaces Workspace1 and Workspace2 and Application Insights component Application Insights 3, associate all three resources to the same AMPLS. If VNet3 should only access Workspace1, create another AMPLS resource, associate Workspace1 to it, and connect VNet3 as shown in the following diagrams:
59
59
60
-

60
+

61
61
62
-

62
+

63
63
64
64
## Example connection of Azure Monitor to Private Link
65
65
@@ -72,22 +72,23 @@ Let's start by creating an Azure Monitor Private Link Scope resource.
72
72
5. Click **Review + Create**.
73
73
6. Let the validation pass, and then click **Create**.
74
74
75
-
## Connecting Azure Monitor resources
75
+
## Connect Azure Monitor resources
76
76
77
77
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process goes faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
78
78
79
79
1. In your Azure Monitor Private Link scope, click on **Azure Monitor Resources** in the left-hand menu. Click the **Add** button.
80
80
2. Add the workspace or component. Clicking the Add button brings up a dialog where you can select Azure Monitor resources. You can browse through your subscriptions and resource groups, or you can type in their name to filter down to them. Select the workspace or component and click **Apply** to add them to your scope.
81
81
82
-

82
+

83
83
84
-
### Connecting to a Private Endpoint
84
+
### Connect to a private endpoint
85
85
86
-
Now that we have resources connected to our AMPLS, let's create a private endpoint to connect our network. You can do this in the Private Link center [link to go here], or inside your Azure Monitor Private Link Scope, as done in this example.
86
+
Now that you have resources connected to your AMPLS, create a private endpoint to connect our network. You can do this task in the Private Link center TODO(link to go here), or inside your Azure Monitor Private Link Scope, as done in this example.
87
+
----------------TODO missing link above ---------------
87
88
88
-
1. In your scope resource, click on **Private Endpoint connections** in the lefthand resource menu Click on **Private Endpoint** to start the endpoint create process. You can also approve connections that were started in the Private Link center here by selecting them and clicking **Approve**.
89
+
1. In your scope resource, click on **Private Endpoint connections** in the left-hand resource menu. Click on **Private Endpoint** to start the endpoint create process. You can also approve connections that were started in the Private Link center here by selecting them and clicking **Approve**.
89
90
90
-

91
+

91
92
92
93
2. Pick the subscription, resource group, and name of the endpoint, and the region it should live in. This needs to be the same region as the virtual network you will connect it to.
93
94
@@ -102,7 +103,7 @@ Now that we have resources connected to our AMPLS, let's create a private endpoi
102
103
c. From the **resource** drop-down, choose your Private Link scope you created earlier.
103
104
104
105
d. Click **Next: Configuration >**.
105
-

106
+

106
107
107
108
5. On the configuration pane,
108
109
@@ -116,15 +117,15 @@ Now that we have resources connected to our AMPLS, let's create a private endpoi
116
117
117
118
e. Click **Create**.
118
119
119
-

120
+

120
121
121
122
You have now created a new private endpoint that is connected to this Azure Monitor Private Link scope.
122
123
123
-
## Configuring Log Analytics workspaces
124
+
## Configure Log Analytics
124
125
125
126
In the Azure portal in your Azure Monitor Log Analytics workspace resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
First, you can connect this Log Analytics resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this workspace. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connecting-azure-monitor-resources).
130
131
@@ -134,15 +135,15 @@ If you set **Allow public network access for ingestion** to **No**, then machine
134
135
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
135
136
136
137
> [!NOTE]
137
-
> Logs and metrics uploaded to a workspace via Diagnostic Settings(diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
138
+
> Logs and metrics uploaded to a workspace via [Diagnostic Settings](diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
138
139
139
-
## Configuring Application Insights components
140
+
## Configure Application Insights
140
141
141
142
In the Azure portal in your Azure Monitor Application Insights Component resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
142
143
143
144
**---------- TODO ------------- get screenshot----**
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connecting-azure-monitor-resources).
148
149
@@ -155,7 +156,9 @@ Restricting access in this manner only applies to data in the workspace. Configu
155
156
156
157
Storage accounts are used in the ingestion process of several data types of logs. By default, service-managed storage accounts are used. However, you can now use your own storage accounts and gain control over the access rights, keys, content, encryption, and retention of your logs during ingestion.
157
158
158
-
## Which data types are ingested over a storage account?
159
+
## Data types sent to storage accounts
160
+
161
+
The following data types are ingested into a storage account.
159
162
160
163
- Custom logs
161
164
- IIS logs
@@ -167,13 +170,13 @@ Storage accounts are used in the ingestion process of several data types of logs
167
170
168
171
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
169
172
170
-
## Restrictions and Limitations with Azure Monitor Private Link
173
+
## Restrictions and limitations with Azure Monitor Private Link
171
174
172
-
### Log Analytics Windows Agent
175
+
### Log Analytics Windows agent
173
176
174
177
Your must use the Log Analytics agent version 18.20.18038.0 or later.
175
178
176
-
### Log Analytics Linux Agent
179
+
### Log Analytics Linux agent
177
180
178
181
Your must use agent version 1.12.25 or later. If you cannot, run the following commands on your VM.
0 commit comments