Managed Grafana - oWretch/policy GitHub Wiki

Policy Effects by Policy

Category Policy Platform Landing Zones Production Decommissioned Management Corp Connectivity Sandbox Identity
Managed Grafana Azure Managed Grafana workspaces should disable public network access
Disabling public network access improves security by ensuring that your Azure Managed Grafana workspace isn't exposed on the public internet. Creating private endpoints can limit exposure of your workspaces.
Deny
Disabled
Audit
Managed Grafana Configure Azure Managed Grafana workspaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Managed Grafana workspaces.
DeployIfNotExists
Disabled

Policy Parameters by Policy

Category Policy Platform Landing Zones Production Decommissioned Management Corp Connectivity Sandbox Identity
Managed Grafana Configure Azure Managed Grafana workspaces to use private DNS zones
Use private DNS zones to override the DNS resolution for a private endpoint. A private DNS zone links to your virtual network to resolve to Azure Managed Grafana workspaces.
azureManagedGrafanaWorkspacePrivateDnsZ... = --DNSZonePrefix--privatelink.grafana.az...
⚠️ **GitHub.com Fallback** ⚠️