Skip to content

Commit fadaf7b

Browse files
committed
Container insights onboard private link update
1 parent 2312f21 commit fadaf7b

File tree

1 file changed

+32
-1
lines changed

1 file changed

+32
-1
lines changed

articles/azure-monitor/containers/container-insights-enable-aks.md

Lines changed: 32 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -385,8 +385,10 @@ AKS clusters with system-assigned identity must first disable monitoring and the
385385
```
386386
387387
## Private link
388+
Use one of the following procedures to enable network isolation by connecting your cluster to the Log Analytics workspace by using [Azure Private Link](../logs/private-link-security.md).
388389
389-
To enable network isolation by connecting your cluster to the Log Analytics workspace by using [Azure Private Link](../logs/private-link-security.md), your cluster must be using managed identity authentication with Azure Monitor Agent.
390+
### Managed identity authentication
391+
Use the following procedure if your cluster is using managed identity authentication with Azure Monitor Agent.
390392
391393
1. Follow the steps in [Enable network isolation for the Azure Monitor agent](../agents/azure-monitor-agent-data-collection-endpoint.md) to create a data collection endpoint and add it to your Azure Monitor private link service.
392394
@@ -415,6 +417,35 @@ To enable network isolation by connecting your cluster to the Log Analytics work
415417
416418
1. Enable monitoring with the managed identity authentication option by using the steps in [Migrate to managed identity authentication](#migrate-to-managed-identity-authentication).
417419
420+
### Legacy authentication
421+
Use the following procedure if you're not using managed identity authentication. This requires a [private AKS cluster](../../aks/private-clusters.md).
422+
423+
1. Create a private AKS cluster.
424+
425+
```cli
426+
az group create --resource-group private-cluster-test-rg --location westus2
427+
az network vnet create -g private-cluster-test-rg --location westus2 --name private-cluster-test-vnet-2 --address-prefixes 10.0.0.0/8
428+
az network vnet subnet create -g private-cluster-test-rg --vnet-name private-cluster-test-vnet-2 --name subnet-2 --address-prefixes 10.240.0.0/16
429+
az identity create -g private-cluster-test-rg -n cluster-identity
430+
az aks create --resource-group private-cluster-test-rg --name private-cluster-test-2 --load-balancer-sku standard --enable-private-cluster --network-plugin azure --vnet-subnet-id /subscriptions/3b875bf3-0eec-4d8c-bdee-25c7ccc1f130/resourceGroups/private-cluster-test-rg/providers/Microsoft.Network/virtualNetworks/private-cluster-test-vnet-2/subnets/subnet-2 --docker-bridge-address 172.17.0.1/16 --dns-service-ip 10.2.0.10 --service-cidr 10.2.0.0/24 --assign-identity /subscriptions/3b875bf3-0eec-4d8c-bdee-25c7ccc1f130/resourcegroups/private-cluster-test-rg/providers/Microsoft.ManagedIdentity/userAssignedIdentities/cluster-identity --node-count 1
431+
```
432+
433+
2. Create a Log Analytics workspace with public ingestion disabled.
434+
435+
```cli
436+
az monitor log-analytics workspace create --resource-group private-cluster-test-rg --workspace-name private-link-la-workspace --ingestion-access Disabled
437+
```
438+
439+
3. Configure private link by following the instructions at [Configure your private link](../logs/private-link-configure.md). Set ingestion access to public and then set to private after the private endpoint is created but before monitoring is enabled. The private link resource region must be same as AKS cluster region.
440+
441+
442+
4. Enable monitoring for the AKS cluster.
443+
444+
```cli
445+
az aks enable-addons -a monitoring --resource-group private-cluster-test-rg --name private-cluster-test-2 --workspace-resource-id "/subscriptions/<INSERT SUBSCRIPTION ID>/resourceGroups/private-cluster-test-rg/providers/Microsoft.OperationalInsights/workspaces/private-link-la-workspace"
446+
```
447+
448+
418449
## Limitations
419450
420451
- Enabling managed identity authentication (preview) isn't currently supported by using Terraform or Azure Policy.

0 commit comments

Comments
 (0)