You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/containers/container-insights-enable-aks.md
+32-1Lines changed: 32 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -385,8 +385,10 @@ AKS clusters with system-assigned identity must first disable monitoring and the
385
385
```
386
386
387
387
## Private link
388
+
Use one of the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace by using [Azure Private Link](../logs/private-link-security.md).
388
389
389
-
To enable network isolation by connecting your cluster to the Log Analytics workspace by using [Azure Private Link](../logs/private-link-security.md), your cluster must be using managed identity authentication with Azure Monitor Agent.
390
+
### Managed identity authentication
391
+
Use the following procedure if your cluster is using managed identity authentication with Azure Monitor Agent.
390
392
391
393
1. Follow the steps in [Enable network isolation for the Azure Monitor agent](../agents/azure-monitor-agent-data-collection-endpoint.md) to create a data collection endpoint and add it to your Azure Monitor private link service.
392
394
@@ -415,6 +417,35 @@ To enable network isolation by connecting your cluster to the Log Analytics work
415
417
416
418
1. Enable monitoring with the managed identity authentication option by using the steps in [Migrate to managed identity authentication](#migrate-to-managed-identity-authentication).
417
419
420
+
### Legacy authentication
421
+
Use the following procedure if you're not using managed identity authentication. This requires a [private AKS cluster](../../aks/private-clusters.md).
422
+
423
+
1. Create a private AKS cluster.
424
+
425
+
```cli
426
+
az group create --resource-group private-cluster-test-rg --location westus2
3. Configure private link by following the instructions at [Configure your private link](../logs/private-link-configure.md). Set ingestion access to public and then set to private after the private endpoint is created but before monitoring is enabled. The private link resource region must be same as AKS cluster region.
440
+
441
+
442
+
4. Enable monitoring for the AKS cluster.
443
+
444
+
```cli
445
+
az aks enable-addons -a monitoring --resource-group private-cluster-test-rg --name private-cluster-test-2 --workspace-resource-id "/subscriptions/<INSERT SUBSCRIPTION ID>/resourceGroups/private-cluster-test-rg/providers/Microsoft.OperationalInsights/workspaces/private-link-la-workspace"
446
+
```
447
+
448
+
418
449
## Limitations
419
450
420
451
- Enabling managed identity authentication (preview) isn't currently supported by using Terraform or Azure Policy.
0 commit comments