DMZ Server wiht OMS agent -> OMS Gateway -> Log Analytics Workspace

Werner, David 116 Reputation points
2020-12-23T14:48:24.91+00:00

Hi,

I have a member server in a DMZ zone. MMA is installed. I would like to pass the data collected from the OMS agent to an OMS Gateway server and then to the Log Analytics Workspace.

On the DMZ zone member server:

  • Create Outbound firewall port 8080 open
  • Corporate Firewall allows traffic between member server and OMS Gateway
  • Configured the agent to use TLS 1.2
  • Configured .Net Framework to support secure cryptography
  • I copied the Workspace ID and Key from the Log Analytics Workspace.
  • Copy/paste ID and Key in the Log Analytics configuration
  • On the Proxy Settings tab, I added the Use a proxy server: <OMS Gateway IP address>:8080 The Azure Log Analytics (OMS) tab shows: The agent could not authenticate with the Microsoft Operations Management Suit service. Please check that the Workspace Key is correct"

OMS Gateway:

  • Checking the OMS Gateway Event log, I see an Information event: Client: <IP from DMZ member server>, Client ID: , Gateway: <OMS Gateway IP>

When I go to the Log Analytics Workspace, I do not see the agent from the DMZ server.

Question: Does my DMZ server first have to be able to reach the Log analytic Workspace before it can be able to pass its data collection to the OMS Gateway? This would require I open port 443.

Why isn't the DMZ server visible in the Analytics Workspace?

Any ideas or suggestions would be greatly appreciated.

David

Azure Monitor
Azure Monitor
An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.
3,364 questions
{count} votes

7 answers

Sort by: Most helpful
  1. David Werner 66 Reputation points
    2021-01-15T09:29:39.393+00:00

    After several tries of copy/paste the Workspace ID/Key, I was finally ableto connect to my Workspace.

    Solved it myself.

    david

    1 person found this answer helpful.
    0 comments No comments

  2. David Werner 66 Reputation points
    2020-12-28T09:04:06.367+00:00

    Hi Swathi,

    The DMZ server is running Windows Server 2012 R2 DataCenter.
    .Net Framework verison = 4.5.51641

    Since the server is in our DMZ zomne, it has no connection to the Internet. Therefore, it cannot reach the Log Analytics Workspace.
    As mentioned, when selecting the Microsoft Monitoring Agent | Azure Log analytics (OMS) tab, the Status Displays:

    "The agent could not authenticate with the Microsoft Operations Management Suit service. Please check that the Workspace Key is correct".

    On the Proxy Settings tab, I added the Use a proxy server: <OMS Gateway IP address>:8080

    I ask again: Does my DMZ server first have to be able to reach the Log analytic Workspace before it can be able to pass its data collection to the OMS Gateway?

    When I restart the Microsoft Monitoring Agent on the DMZ server, on the OMS Gateway, I see the following event in the OMS Gateway event log:

    Client: <DMZ Server IP>
    ClientID: 52fcd878-8398-47de-b16e-a101a0830622
    Gateway: <OMS Gateway IP>

    My Log analytics Workspace does not show the DMZ server.

    david

    0 comments No comments

  3. Swathi Dhanwada 18,781 Reputation points Microsoft Employee
    2020-12-31T17:55:00.89+00:00

    @David Werner Regarding your question, you needn't connect your DMZ server directly to Log Analytics workspace before sending data to Log analytics Gateway. Also kindly note, after successful connection to Log Analytics workspace via Log analytics Gateway, the DMZ server will be shown as connected in Azure Portal.

    I would recommend you to check below steps and if you are still facing issue, I would suggest you to raise Support Ticket with Azure Technical team by the following these steps for deeper analysis of the issue.

    • To identify if there are any connectivity issues by running the TestCloudConnectivity tool. The tool is installed by default with the agent in the folder %SystemRoot%\Program Files\Microsoft Monitoring Agent\Agent. From an elevated command prompt, navigate to the folder and run the tool. The tool returns the results and highlights where the test failed (for example, if it was related to a particular port/URL that was blocked).
    • Recheck if your workspace key has been regenerated recently.
    • It is required to install the Microsoft Monitoring Agent on the Log Analytics Gateway and configure it with the same log analytics workspace that you will configure on the data collection machine.
    0 comments No comments

  4. David Werner 66 Reputation points
    2021-01-04T08:49:56.717+00:00

    Hi Swathi,

    I ran TestCloudconnection.exe. Results are:

    Starting Azure Log Analytics connectivity test.

    Proxy Configuration: 10.139.40.24:8080

    Starting connectivity test for workspace id "710ebefe-d4d1-4d56-8654-0ff28f78b5ce".
    This test may take several minutes to complete if a firewall is blocking access.

    Making initial connection to 710ebefe-d4d1-4d56-8654-0ff28f78b5c.oms.opinsights.azure.com.
    This is to download the list of Azure resources neccesary for communication with this specific workspace.

    Connection was made to Azure for host list download. However, the Log Analytics service reported the error: "The workspace key was invalid."

    If I run TestCloudConnection.exe on a server which is NOT in the DMZ, it returns almost the same results. In addition, it returns:

    Successful Connections
    Firewall Rule: *.blob.core.windows.net
    aoiweu201510151571.blob.core.windows.net
    opinsightsweuomssa.blob.core.windows.net
    scadvisorcontent.blob.core.windows.net

    But, as you mentioned, when using an OMS Gateway, my DMZ server doesn't require direct access to the Log Analytics Workspace.

    Interesting that my DMZ server and non-DMZ server both have results "The workspace key was invalid.". And the non-DMZ can be seen on the Log analytics Workspace.

    My OMS Gateway does report in its event log the following:

    Client: <DMZ Server IP>
    ClientID: 52fcd878-8398-47de-b16e-a101a0830622
    Gateway: <OMS Gateway IP>

    Any other recommendations? Is there a way to turn on any additonal debugging to provide more information?

    david


  5. David Werner 66 Reputation points
    2021-01-04T14:04:07.907+00:00

    Hi Swathi,

    the non-DMZ servers shows:

    53284-non-dmz-mma.png

    The DMZ MMA s erver shows:
    53158-dmz-mma.png

    david

    0 comments No comments

Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.