Public preview: Managed private endpoint for Azure Managed Grafana

0
186
The next decade in enterprise backup

Source is Azure Business News

With this new feature, a customer can keep resources Grafana needs to access within their private networks.

Managed private endpoint allows a customer to connect their Azure Managed Grafana workspace to Azure data sources without traversing public networks. It works with any Azure data service that accepts inbound private link networking. With managed private endpoint, a customer can keep their data stores on private IP addresses and configure their Managed Grafana Firewall instance to connect only to those addresses. This private access is easy to set up and adds another layer of protection against data exfiltration.

Managed Grafana’s managed private endpoint is now available in public preview. Azure data sources that have been tested to work with this new feature include:

  • Azure Monitor private link scope (for example, Log Analytics workspace)
  • Azure Monitor Managed Service for Prometheus
  • Azure Data Explorer
  • Azure Cosmos DB for Mongo DB
  • Azure SQL server

Learn More: https://learn.microsoft.com/en-us/azure/managed-grafana/how-to-connect-to-data-source-privately

For customers who also want to keep their Managed Grafana workspaces private, in addition to data sources, they can set up private links between their virtual networks and Grafana instances: https://learn.microsoft.com/en-us/azure/managed-grafana/how-to-set-up-private-access

Source is Azure Business News

Vorig artikelPublic Preview: Azure Monitor Logs improved table-level RBAC
Volgend artikelPublic preview: Azure Monitor application insights configurable Real User Monitoring for Java