You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
out_azure_logs_ingestion: add support for Managed Identities
This change updates the documentation to document support for Managed
Identities authentication. It tries to align with the documentation
style and content for the similar feature for the out_azure_kusto
plugin.
Signed-off-by: Stefano Boriero <[email protected]>
-[Send data to Azure Monitor Logs with Logs ingestion API (setup DCE, DCR and Log Analytics)](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/tutorial-logs-ingestion-portal)
23
23
24
+
## Authentication Methods
25
+
26
+
Fluent-Bit can use various authentication methods to send records to Azure Log Analytics:
27
+
28
+
### Service Principal Authentication (Default)
29
+
30
+
For service principal authentication, you'll need to create an Azure AD application:
31
+
32
+
-[Register an Application](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app#register-an-application)
33
+
-[Add a client secret](https://docs.microsoft.com/en-us/azure/active-directory/develop/quickstart-register-app#add-a-client-secret)
34
+
-[Authorize the app in your database](https://docs.microsoft.com/en-us/azure/data-explorer/kusto/management/access-control/principals-and-identity-providers#azure-ad-tenants)
35
+
36
+
Configure Fluent Bit with your application's `tenant_id`, `client_id`, and `client_secret`.
37
+
38
+
### Managed Identity Authentication
39
+
40
+
When running on Azure services that support Managed Identities (such as Azure VMs, AKS, or App Service):
41
+
42
+
1.[Assign the managed identity appropriate permissions to your Kusto database](https://learn.microsoft.com/en-us/azure/data-explorer/configure-managed-identities-cluster)
43
+
2. Configure Fluent Bit with `auth_type` set to `managed_identity`
44
+
3. For system-assigned identity, set `client_id` to `system`
45
+
4. For user-assigned identity, set `client_id` to the managed identity's client ID (GUID)
|`tenant_id`| The tenant ID of the Azure Active Directory (AAD) application. |_none_|
29
-
|`client_id`| The client ID of the AAD application. |_none_|
52
+
|`client_id`|_Required for service_principal and managed_identity auth_ - The client ID of the AAD registered application. When using managed identity authentication, set this to 'system' for system-assigned identity or provide the managed identity's client ID. |_none_|
30
53
|`client_secret`| The client secret of the AAD application ([App Secret](https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal#option-2-create-a-new-application-secret)). |_none_|
54
+
| auth_type | Authentication type to use. Supported values: `service_principal` (default) or `managed_identity`.
31
55
|`dce_url`| Data Collection Endpoint(DCE) URL. |_none_|
32
56
|`dcr_id`| Data Collection Rule (DCR) [immutable ID](https://learn.microsoft.com/en-us/azure/azure-monitor/logs/tutorial-logs-ingestion-portal#collect-information-from-the-dcr). |_none_|
33
57
|`table_name`| The name of the custom log table (include the `_CL` suffix as well if applicable) |_none_|
0 commit comments