Hi Venkatesh D
The issue arises when Azure Managed Grafana cannot access Azure Managed Prometheus through a private endpoint due to TLS certificate validation failures. This typically occurs when both services are configured with private endpoints and public access is disabled.
Root Cause:
Azure Managed Grafana attempts to connect to Azure Managed Prometheus using the private DNS name > https://<your-prometheus-name>.privatelink.monitor.azure.com
. However, the TLS certificate presented by Azure Managed Prometheus is valid only for its public FQDN > *.eastus2.prometheus.monitor.azure.com
. This mismatch leads to certificate validation errors.
To fix:
To resolve this issue, configure Grafana to use the public FQDN of Azure Managed Prometheus while ensuring that this FQDN resolves to the private IP address via your private DNS zone.
Update Grafana Data Source:
In Azure Managed Grafana, navigate to > Configuration > Data Sources > Prometheus
Set the URL to the public FQDN of your Azure Monitor workspaces Prometheus endpoint,
Like this: https://<your-monitor-workspace-name>.eastus2.prometheus.monitor.azure.com
Ensure that the "Skip TLS verification" option is not enabled.
Configure Private DNS zone creates or update a private DNS zone to resolve the public FQDN <your-monitor-workspace-name>.eastus2.prometheus.monitor.azure.com
to the private IP address of the Azure Managed Prometheus endpoint.
Link this private DNS zone to the virtual network where Azure Managed Grafana resides.
Verify connectivity that the DNS resolution is correctly mapping the public FQDN to the private IP address.
Test the connection in Grafana to confirm that the data source is now accessible.
Additional Considerations:
Disabling TLS verification is not recommended in production environments as it compromises security. and using the private FQDN privatelink.monitor.azure.com directly in Grafana will result in TLS certificate mismatches, as the certificate is valid only for the public FQDN.
Confirm that the managed identity associated with your Azure Managed Grafana workspace has the necessary permissions like Monitoring Data Reader role to access the Azure Monitor workspace.
Doc's:
https://learn.microsoft.com/en-us/azure/managed-grafana/how-to-connect-azure-monitor-workspace
https://learn.microsoft.com/en-us/azure/private-link/troubleshoot-private-endpoint-connectivity
By configuring Grafana to use the public FQDN for Azure Managed Prometheus and ensuring that this FQDN resolves to the private IP via your private DNS zone, you can maintain secure, private connectivity without encountering TLS certificate issues.
Please let us know if you feel the answer has not resolved your issue, and we will take further steps to address your concern.
-Thank you.
I hope this has been helpful! If above is unclear and/or you are unsure about something add a comment below.
Please click the answer as original posters help the community find answers faster by identifying the correct answer.