Skip to content

Commit f3edec1

Browse files
committed
fixed issue from prereview
1 parent 3f7f3e9 commit f3edec1

11 files changed

+43
-33
lines changed

articles/azure-monitor/platform/private-link-security.md

Lines changed: 32 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -28,18 +28,18 @@ For more information, see [Key Benefits of Private Link](../../private-link/pri
2828

2929
Azure Monitor Private Link Scope is a grouping resource to connect one or more private endpoints (and therefore the virtual networks they are contained in) to one or more Azure Monitor resources. These resources include Log Analytics workspaces and Application Insights components.
3030

31-
![Diagram of resource topology](./media/private-link-security/1-private-link-topology.png)
31+
![Diagram of resource topology](./media/private-link-security/private-link-topology-1.png)
3232

3333
> [!NOTE]
3434
> A single Azure Monitor resource can belong to multiple AMPLSs, but you cannot connect a single VNet to more than one AMPLS.
3535
36-
## Planning AMPLS based on your network needs
36+
## Planning AMPLS based on your network
3737

3838
Before setting up your AMPLS resources, consider your network isolation requirements. Evaluate your virtual networks' access to public internet, and the access restrictions of each of your Azure Monitor resources (that is, Application Insights components and Log Analytics workspaces).
3939

40-
### Evaluate which Virtual Networks should connect to a Private Link
40+
### Evaluate which virtual networks should connect to a Private Link
4141

42-
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet needs connect to these resources over a Private Link, and through an AMPLS.
42+
Start by evaluating which of your virtual networks (VNets) have restricted access to the internet. VNets that have free internet may not require a Private Link to access your Azure Monitor resources. The monitoring resources your VNets connect to may restrict incoming traffic and require a Private Link connection (either for log ingestion or query). In such cases, even a VNet that has access to the public internet needs to connect to these resources over a Private Link, and through an AMPLS.
4343

4444
### Evaluate which Azure Monitor resources should have a Private Link
4545

@@ -48,18 +48,18 @@ Review each of your Azure Monitor resources:
4848
- Should the resource allow ingestion of logs from resources located on specific VNets only?
4949
- Should the resource be queried only by clients located on specific VNETs?
5050

51-
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#Configuring Log Analytics workspaces) workspaces and [Configuring Application Insights components](#Configuring Application Insights components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
51+
If the answer to any of these questions is yes, set the restrictions as explained in [Configuring Log Analytics](#configuring-log-analytics-workspaces) workspaces and [Configuring Application Insights components](#Configuring Application Insights components) and associate these resources to a single or several AMPLS(s). Virtual networks that should access these monitoring resources need to have a Private Endpoint that connects to the relevant AMPLS.
5252
Remember – you can connect the same workspaces or application to multiple AMPLS, to allow them to be reached by different networks.
5353

54-
### Group together Monitoring resources by network accessibility
54+
### Group together monitoring resources by network accessibility
5555

5656
Since each VNet can connect to only one AMPLS resource, you must group together monitoring resources that should be accessible to the same networks. The simplest way to manage this grouping is to create one AMPLS per VNet, and select the resources to connect to that network. However, to reduce resources and improve manageability, you may want to reuse an AMPLS across networks.
5757

5858
For example, if your internal virtual networks VNet1 and VNet2 should connect to workspaces Workspace1 and Workspace2 and Application Insights component Application Insights 3, associate all three resources to the same AMPLS. If VNet3 should only access Workspace1, create another AMPLS resource, associate Workspace1 to it, and connect VNet3 as shown in the following diagrams:
5959

60-
![Diagram of AMPLS A topology](./media/private-link-security/1a-ampls-topology-a.png)
60+
![Diagram of AMPLS A topology](./media/private-link-security/ampls-topology-a-1.png)
6161

62-
![Diagram of AMPLS B topology](./media/private-link-security/1b-ampls-topology-b.png)
62+
![Diagram of AMPLS B topology](./media/private-link-security/ampls-topology-b-1.png)
6363

6464
## Example connection of Azure Monitor to Private Link
6565

@@ -72,22 +72,23 @@ Let's start by creating an Azure Monitor Private Link Scope resource.
7272
5. Click **Review + Create**.
7373
6. Let the validation pass, and then click **Create**.
7474

75-
## Connecting Azure Monitor resources
75+
## Connect Azure Monitor resources
7676

7777
You can connect your AMPLS first to private endpoints and then to Azure Monitor resources or vice versa, but the connection process goes faster if you start with your Azure Monitor resources. Here's how we connect Azure Monitor Log Analytics workspaces and Application Insights components to an AMPLS
7878

7979
1. In your Azure Monitor Private Link scope, click on **Azure Monitor Resources** in the left-hand menu. Click the **Add** button.
8080
2. Add the workspace or component. Clicking the Add button brings up a dialog where you can select Azure Monitor resources. You can browse through your subscriptions and resource groups, or you can type in their name to filter down to them. Select the workspace or component and click **Apply** to add them to your scope.
8181

82-
![Screenshot of select a scope UX](./media/private-link-security/2-ampls-select.png)
82+
![Screenshot of select a scope UX](./media/private-link-security/ampls-select-2.png)
8383

84-
### Connecting to a Private Endpoint
84+
### Connect to a private endpoint
8585

86-
Now that we have resources connected to our AMPLS, let's create a private endpoint to connect our network. You can do this in the Private Link center [link to go here], or inside your Azure Monitor Private Link Scope, as done in this example.
86+
Now that you have resources connected to your AMPLS, create a private endpoint to connect our network. You can do this task in the Private Link center TODO(link to go here), or inside your Azure Monitor Private Link Scope, as done in this example.
87+
----------------TODO missing link above ---------------
8788

88-
1. In your scope resource, click on **Private Endpoint connections** in the left hand resource menu Click on **Private Endpoint** to start the endpoint create process. You can also approve connections that were started in the Private Link center here by selecting them and clicking **Approve**.
89+
1. In your scope resource, click on **Private Endpoint connections** in the left-hand resource menu. Click on **Private Endpoint** to start the endpoint create process. You can also approve connections that were started in the Private Link center here by selecting them and clicking **Approve**.
8990

90-
![Screenshot of Private Endpoint Connections UX](./media/private-link-security/3-ampls-select-pe-connect.png)
91+
![Screenshot of Private Endpoint Connections UX](./media/private-link-security/ampls-select-private-endpoint-connect-3.png)
9192

9293
2. Pick the subscription, resource group, and name of the endpoint, and the region it should live in. This needs to be the same region as the virtual network you will connect it to.
9394

@@ -102,7 +103,7 @@ Now that we have resources connected to our AMPLS, let's create a private endpoi
102103
c. From the **resource** drop-down, choose your Private Link scope you created earlier.
103104

104105
d. Click **Next: Configuration >**.
105-
![Screenshot of select Create Private Endpoint](./media/private-link-security/4-ampls-select-pe-create.png)
106+
![Screenshot of select Create Private Endpoint](./media/private-link-security/ampls-select-private-endpoint-create-4.png)
106107

107108
5. On the configuration pane,
108109

@@ -116,15 +117,15 @@ Now that we have resources connected to our AMPLS, let's create a private endpoi
116117

117118
e. Click **Create**.
118119

119-
![Screenshot of select Create Private Endpoint2](./media/private-link-security/5-ampls-select-pe-create-2.png)
120+
![Screenshot of select Create Private Endpoint2](./media/private-link-security/ampls-select-private-endpoint-create-5.png)
120121

121122
You have now created a new private endpoint that is connected to this Azure Monitor Private Link scope.
122123

123-
## Configuring Log Analytics workspaces
124+
## Configure Log Analytics
124125

125126
In the Azure portal in your Azure Monitor Log Analytics workspace resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
126127

127-
![LA Network Isolation](./media/private-link-security/6-ampls-lan-network-isolation.png)
128+
![LA Network Isolation](./media/private-link-security/ampls-log-analytics-lan-network-isolation-6.png)
128129

129130
First, you can connect this Log Analytics resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this workspace. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connecting-azure-monitor-resources).
130131

@@ -134,15 +135,15 @@ If you set **Allow public network access for ingestion** to **No**, then machine
134135
Restricting access in this manner only applies to data in the workspace. Configuration changes, including turning these access settings on or off, are managed by Azure Resource Manager. You should restrict access to Resource Manager using the appropriate roles, permissions, network controls, and auditing. For more information, see [Azure Monitor Roles, Permissions, and Security](roles-permissions-security.md).
135136

136137
> [!NOTE]
137-
> Logs and metrics uploaded to a workspace via Diagnostic Settings (diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
138+
> Logs and metrics uploaded to a workspace via [Diagnostic Settings](diagnostic-settings.md) go over a secure private Microsoft channel, and are not controlled by these settings.
138139
139-
## Configuring Application Insights components
140+
## Configure Application Insights
140141

141142
In the Azure portal in your Azure Monitor Application Insights Component resource is a menu item Network Isolation on the left-hand side. You can control two different states from this menu.
142143

143144
**---------- TODO ------------- get screenshot----**
144145

145-
<!-- ![AI Network Isolation](./media/private-link-security/6-ampls-ai-network-isolation.png) -->
146+
<!-- ![AI Network Isolation](./media/private-link-security/ampls-application-insights-network-isolation.png) -->
146147

147148
First, you can connect this Application Insights resource to Azure Monitor Private Link scopes that you have access to. Click **Add** and select the Azure Monitor Private Link Scope. Click **Apply** to connect it. All connected scopes show up in this screen. Making this connection allows network traffic in the connected virtual networks to reach this component. Making the connection has the same effect as connecting it from the scope as we did in [Connecting Azure Monitor resources](#connecting-azure-monitor-resources).
148149

@@ -155,7 +156,9 @@ Restricting access in this manner only applies to data in the workspace. Configu
155156

156157
Storage accounts are used in the ingestion process of several data types of logs. By default, service-managed storage accounts are used. However, you can now use your own storage accounts and gain control over the access rights, keys, content, encryption, and retention of your logs during ingestion.
157158

158-
## Which data types are ingested over a storage account?
159+
## Data types sent to storage accounts
160+
161+
The following data types are ingested into a storage account.
159162

160163
- Custom logs
161164
- IIS logs
@@ -167,13 +170,13 @@ Storage accounts are used in the ingestion process of several data types of logs
167170

168171
For more information on bringing your own storage account, see [Customer-owned storage accounts for log ingestion](private-storage.md)
169172

170-
## Restrictions and Limitations with Azure Monitor Private Link
173+
## Restrictions and limitations with Azure Monitor Private Link
171174

172-
### Log Analytics Windows Agent
175+
### Log Analytics Windows agent
173176

174177
Your must use the Log Analytics agent version 18.20.18038.0 or later.
175178

176-
### Log Analytics Linux Agent
179+
### Log Analytics Linux agent
177180

178181
Your must use agent version 1.12.25 or later. If you cannot, run the following commands on your VM.
179182

@@ -186,12 +189,13 @@ $ sudo /opt/microsoft/omsagent/bin/omsadmin.sh -w <workspace id> -s <workspace k
186189

187190
Querying the Azure Resource Manager API does not work unless you add the Service Tag **AzureResourceManager** to your firewall.
188191

189-
### AI SDK Downloads from CDN
192+
### Application Insights SDK downloads from a content delivery network
190193

191194
You should bundle the JavaScript code in your script, so that the browser does not attempt to download code from a CDN.
192195
An example is provided on [GitHub](https://github.com/microsoft/ApplicationInsights-JS#npm-setup-ignore-if-using-snippet-setup)
193196

194-
### LA Solution download
197+
### Log Analytics solution download
198+
199+
**-------------TODO -------------**
195200

196-
-------------TODO -------------
197201
Please put xxx in your allow list. FQD?

0 commit comments

Comments
 (0)