You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/essentials/azure-monitor-workspace-private-endpoint.md
+10-7Lines changed: 10 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,15 +5,15 @@ author: EdB-MSFT
5
5
ms.author: edbaynash
6
6
ms.reviewer: tbd
7
7
ms.topic: conceptual
8
-
ms.date: 05/03/2023
8
+
ms.date: 06/25/2024
9
9
---
10
10
11
11
# Use private endpoints for Managed Prometheus and Azure Monitor workspace
12
12
13
13
Use [private endpoints](../../private-link/private-endpoint-overview.md) for Managed Prometheus and your Azure Monitor workspace to allow clients on a virtual network (VNet) to securely query data over a [Private Link](../../private-link/private-link-overview.md). The private endpoint uses a separate IP address within the VNet address space of your Azure Monitor workspace resource. Network traffic between the clients on the VNet and the workspace resource traverses the VNet and a private link on the Microsoft backbone network, eliminating exposure from the public internet.
14
14
15
15
> [!NOTE]
16
-
> If you are using Azure Managed Grafana to query your data, please configure a [Managed Private Endpoint](https://aka.ms/ags/mpe) to ensure the queries from Managed Grafana into your Azure Monitor workspace use the Microsoft backbone network without going through the internet.
16
+
> If you are using Azure Managed Grafana to query your data, configure a [Managed Private Endpoint](https://aka.ms/ags/mpe) to ensure the queries from Managed Grafana into your Azure Monitor workspace use the Microsoft backbone network without going through the internet.
17
17
18
18
19
19
Using private endpoints for your workspace enables you to:
@@ -22,7 +22,7 @@ Using private endpoints for your workspace enables you to:
22
22
- Increase security for the VNet, by enabling you to block exfiltration of data from the VNet.
23
23
- Securely connect to workspaces from on-premises networks that connect to the VNet using [VPN](../../vpn-gateway/vpn-gateway-about-vpngateways.md) or [ExpressRoutes](../../expressroute/expressroute-locations.md) with private-peering.
24
24
25
-
## Conceptual overview
25
+
## Conceptual overview
26
26
27
27
:::image type="content" source="./media/azure-monitor-workspace-private-endpoint/azure-monitor-workspace-private-endpoints-overview.png" alt-text="A diagram showing an overview of private endpoints for Azure Monitor workspace." lightbox="./media/azure-monitor-workspace-private-endpoint/azure-monitor-workspace-private-endpoints-overview.png" :::
28
28
@@ -44,8 +44,11 @@ Azure Monitor workspace owners can manage consent requests and the private endpo
44
44
45
45
To create a private endpoint by using the Azure portal, PowerShell, or the Azure CLI, see the following articles. The articles feature an Azure web app as the target service, but the steps to create a private link are the same for an Azure Monitor workspace.
46
46
47
-
When you create a private endpoint, select the **Resource type**`Microsoft.Monitor/accounts` and specify the Azure Monitor workspace to which it connects. Select `prometheusMetrics` as the Target sub-resource.
47
+
When you create a private endpoint, make the following selections from the dropdown lists on the basic tab:
48
+
-**Resource type** - Select `Microsoft.Monitor/accounts`. Specify the Azure Monitor workspace to which it connects.
Create a private endpoint using the following articles:
49
52
-[Create a private endpoint using Azure portal](../../private-link/create-private-endpoint-portal.md#create-a-private-endpoint)
50
53
51
54
-[Create a private endpoint using Azure CLI](../../private-link/create-private-endpoint-cli.md#create-a-private-endpoint)
@@ -68,7 +71,7 @@ When you create a private endpoint, the DNS CNAME resource record for the worksp
68
71
69
72
When you resolve the query endpoint URL from outside the VNet with the private endpoint, it resolves to the public endpoint of the workspace. When resolved from the VNet hosting the private endpoint, the query endpoint URL resolves to the private endpoint's IP address.
70
73
71
-
For the example below we're using `k8s02-workspace` located in the East US region. The resource name is not guaranteed to be unique, which requires us to add a few characters after the name to make the URL path unique; for example, `k8s02-workspace-<key>`. This unique query endpoint is shown on the Azure Monitor workspace Overview page.
74
+
For the example below we're using `k8s02-workspace` located in the East US region. The resource name isn't guaranteed to be unique, which requires us to add a few characters after the name to make the URL path unique; for example, `k8s02-workspace-<key>`. This unique query endpoint is shown on the Azure Monitor workspace Overview page.
@@ -82,7 +85,7 @@ The DNS resource records for the Azure Monitor workspace when resolved from outs
82
85
83
86
As previously mentioned, you can deny or control access for clients outside the VNet through the public endpoint using the '*Public Access*' tab on the Networking page of your workspace.
84
87
85
-
The DNS resource records for 'k8s02-workspace', when resolved by a client in the VNet hosting the private endpoint, are:
88
+
The DNS resource records for 'k8s02-workspace' when resolved by a client in the VNet hosting the private endpoint, are:
86
89
87
90
| Name | Type | Value |
88
91
| :--- | :---: | :--- |
@@ -117,7 +120,7 @@ Keep in mind the following known issues about private endpoints for Azure Monito
117
120
118
121
### Workspace query access constraints for clients in VNets with private endpoints
119
122
120
-
Clients in VNets with existing private endpoints face constraints when accessing other Azure Monitor workspaces that have private endpoints. For example, suppose a VNet N1 has a private endpoint for a workspace A1. If workspace A2 has a private endpoint in a VNet N2, then clients in VNet N1 must also query workspace data in account A2 using a private endpoint. If workspace A2 does not have any private endpoints configured, then clients in VNet N1 can query data from that workspace without a private endpoint.
123
+
Clients in VNets with existing private endpoints face constraints when accessing other Azure Monitor workspaces that have private endpoints. For example, suppose a VNet N1 has a private endpoint for a workspace A1. If workspace A2 has a private endpoint in a VNet N2, then clients in VNet N1 must also query workspace data in account A2 using a private endpoint. If workspace A2 doesn't have any private endpoints configured, then clients in VNet N1 can query data from that workspace without a private endpoint.
121
124
122
125
This constraint is a result of the DNS changes made when workspace A2 creates a private endpoint.
0 commit comments