This section describes the prerequisites that you must perform before you configure an Azure instance with the KM.
Before configuring a policy to start monitoring your Azure environment, perform the following in your Azure portal. The values that you copy to a text file are required to configure an infrastructure policy to monitor your Azure portal.
| |
---|
Copy Tenant ID to a text file | - From Azure portal menu, click Azure Active Directory.
- From the Tenant information tile, copy the Tenant ID value.
|
| Create an application through which KM gets access to your Azure environment for monitoring. After creating the application, create a secret key for it. Copy the Application ID and Secret Key of the application that you created and save it to a text file. After creating the application, assign the following API Permissions to the application: - Azure Service Management: Access Azure Service Management as organization users
- Azure Active Directory Graph: Sign in and read user profile
- Go to App registrations > New registration.
- In the Name field, enter a name of the application.
- For example, BMCApplication.
- In the Supported account types field, ensure that Accounts in this organizational directory only option is selected.
- In the Redirect URI field, select Web and enter the redirect URL.
For example, https://BMCApplication. - Click Register.
- On the application details page that is shown, copy value of the Application (client) ID field.
- Go to Certificates & Secrets > Client secrets > New client secret.
- In the Description field, enter a key description.
- In the Expires field, select the duration of the key and click Add.
- In the Client secret section, copy the value of the client secret that you added.
- To assign API permissions
- Go to API permissions > Add a permission > Azure Service Management.
- Click Delegated permissions and select the Access Azure Service Management as organization users permission.
- Click Add permissions.
- Click Add a permission > Azure Active Directory Graph.
- Click Delegated permissions and select the Sign in and read user profile permission.
- Click Add permissions.
|
Assign a role to the username with which you want the KM to connect to your Azure environment | - Go to Home > Subscription.
- Click the subscription that you want to monitor.
- Click Access Control (IAM) > Add > Add Role Assignment.
- From the Role list, select Reader.
- In the Assign access to list, ensure that User, group, or service principal is selected.
- In the Select list, select the application that you created and click Save.
- To add permission for the Storage Account Contributor role, click Add > Add role assignment.
You need to assign this permission only if you want to monitor virtual machines and storage account services. - From the Role list, select Storage Account Contributor.
- In the Assign access to list, ensure that User, group, or service principal is selected.
- In the Select list, select the application that you created and click Save.
|