Skip to content

Commit fac5723

Browse files
Merge pull request #279195 from EdB-MSFT/update-private-endpoints
Update private endpoints
2 parents da822b0 + 85d9641 commit fac5723

File tree

1 file changed

+10
-7
lines changed

1 file changed

+10
-7
lines changed

articles/azure-monitor/essentials/azure-monitor-workspace-private-endpoint.md

Lines changed: 10 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ author: EdB-MSFT
55
ms.author: edbaynash
66
ms.reviewer: tbd
77
ms.topic: conceptual
8-
ms.date: 05/03/2023
8+
ms.date: 06/25/2024
99
---
1010

1111
# Use private endpoints for Managed Prometheus and Azure Monitor workspace
1212

1313
Use [private endpoints](../../private-link/private-endpoint-overview.md) for Managed Prometheus and your Azure Monitor workspace to allow clients on a virtual network (VNet) to securely query data over a [Private Link](../../private-link/private-link-overview.md). The private endpoint uses a separate IP address within the VNet address space of your Azure Monitor workspace resource. Network traffic between the clients on the VNet and the workspace resource traverses the VNet and a private link on the Microsoft backbone network, eliminating exposure from the public internet.
1414

1515
> [!NOTE]
16-
> If you are using Azure Managed Grafana to query your data, please configure a [Managed Private Endpoint](https://aka.ms/ags/mpe) to ensure the queries from Managed Grafana into your Azure Monitor workspace use the Microsoft backbone network without going through the internet.
16+
> If you are using Azure Managed Grafana to query your data, configure a [Managed Private Endpoint](https://aka.ms/ags/mpe) to ensure the queries from Managed Grafana into your Azure Monitor workspace use the Microsoft backbone network without going through the internet.
1717
1818

1919
Using private endpoints for your workspace enables you to:
@@ -22,7 +22,7 @@ Using private endpoints for your workspace enables you to:
2222
- Increase security for the VNet, by enabling you to block exfiltration of data from the VNet.
2323
- Securely connect to workspaces from on-premises networks that connect to the VNet using [VPN](../../vpn-gateway/vpn-gateway-about-vpngateways.md) or [ExpressRoutes](../../expressroute/expressroute-locations.md) with private-peering.
2424

25-
## Conceptual overview
25+
## Conceptual overview
2626

2727
:::image type="content" source="./media/azure-monitor-workspace-private-endpoint/azure-monitor-workspace-private-endpoints-overview.png" alt-text="A diagram showing an overview of private endpoints for Azure Monitor workspace." lightbox="./media/azure-monitor-workspace-private-endpoint/azure-monitor-workspace-private-endpoints-overview.png" :::
2828

@@ -44,8 +44,11 @@ Azure Monitor workspace owners can manage consent requests and the private endpo
4444

4545
To create a private endpoint by using the Azure portal, PowerShell, or the Azure CLI, see the following articles. The articles feature an Azure web app as the target service, but the steps to create a private link are the same for an Azure Monitor workspace.
4646

47-
When you create a private endpoint, select the **Resource type** `Microsoft.Monitor/accounts` and specify the Azure Monitor workspace to which it connects. Select `prometheusMetrics` as the Target sub-resource.
47+
When you create a private endpoint, make the following selections from the dropdown lists on the basic tab:
48+
- **Resource type** - Select `Microsoft.Monitor/accounts`. Specify the Azure Monitor workspace to which it connects.
49+
- **Target sub-resource** - Select `prometheusMetrics` .
4850

51+
Create a private endpoint using the following articles:
4952
- [Create a private endpoint using Azure portal](../../private-link/create-private-endpoint-portal.md#create-a-private-endpoint)
5053

5154
- [Create a private endpoint using Azure CLI](../../private-link/create-private-endpoint-cli.md#create-a-private-endpoint)
@@ -68,7 +71,7 @@ When you create a private endpoint, the DNS CNAME resource record for the worksp
6871

6972
When you resolve the query endpoint URL from outside the VNet with the private endpoint, it resolves to the public endpoint of the workspace. When resolved from the VNet hosting the private endpoint, the query endpoint URL resolves to the private endpoint's IP address.
7073

71-
For the example below we're using `k8s02-workspace` located in the East US region. The resource name is not guaranteed to be unique, which requires us to add a few characters after the name to make the URL path unique; for example, `k8s02-workspace-<key>`. This unique query endpoint is shown on the Azure Monitor workspace Overview page.
74+
For the example below we're using `k8s02-workspace` located in the East US region. The resource name isn't guaranteed to be unique, which requires us to add a few characters after the name to make the URL path unique; for example, `k8s02-workspace-<key>`. This unique query endpoint is shown on the Azure Monitor workspace Overview page.
7275

7376
:::image type="content" source="./media/azure-monitor-workspace-private-endpoint/azure-monitor-workspace-overview.png" alt-text="A screenshot showing an Azure Monitor workspace overview page." lightbox="./media/azure-monitor-workspace-private-endpoint/azure-monitor-workspace-overview.png":::
7477

@@ -82,7 +85,7 @@ The DNS resource records for the Azure Monitor workspace when resolved from outs
8285

8386
As previously mentioned, you can deny or control access for clients outside the VNet through the public endpoint using the '*Public Access*' tab on the Networking page of your workspace.
8487

85-
The DNS resource records for 'k8s02-workspace', when resolved by a client in the VNet hosting the private endpoint, are:
88+
The DNS resource records for 'k8s02-workspace' when resolved by a client in the VNet hosting the private endpoint, are:
8689

8790
| Name | Type | Value |
8891
| :--- | :---: | :--- |
@@ -117,7 +120,7 @@ Keep in mind the following known issues about private endpoints for Azure Monito
117120

118121
### Workspace query access constraints for clients in VNets with private endpoints
119122

120-
Clients in VNets with existing private endpoints face constraints when accessing other Azure Monitor workspaces that have private endpoints. For example, suppose a VNet N1 has a private endpoint for a workspace A1. If workspace A2 has a private endpoint in a VNet N2, then clients in VNet N1 must also query workspace data in account A2 using a private endpoint. If workspace A2 does not have any private endpoints configured, then clients in VNet N1 can query data from that workspace without a private endpoint.
123+
Clients in VNets with existing private endpoints face constraints when accessing other Azure Monitor workspaces that have private endpoints. For example, suppose a VNet N1 has a private endpoint for a workspace A1. If workspace A2 has a private endpoint in a VNet N2, then clients in VNet N1 must also query workspace data in account A2 using a private endpoint. If workspace A2 doesn't have any private endpoints configured, then clients in VNet N1 can query data from that workspace without a private endpoint.
121124

122125
This constraint is a result of the DNS changes made when workspace A2 creates a private endpoint.
123126

0 commit comments

Comments
 (0)