Azure portal access to app insights and log analytics workspace set to private

Matthew 0 Reputation points
2025-04-23T14:42:39.0266667+00:00

Hi,

I had a task to disable public access to log analytics workspace and app insights. I have read microsft documentation and I have made private endpoint and private link scope. Now I can access the app insights logs on machine on vnet which has private endpoint to private link scope but, what I want is to have access to those logs on my pc in azure portal which is obviously outside of the vnet. How to do this? I have tried network security perimeter with log analytics workspace as associated resource and adding ip to inbound rules but it does not help.

Azure Private Link
Azure Private Link
An Azure service that provides private connectivity from a virtual network to Azure platform as a service, customer-owned, or Microsoft partner services.
551 questions
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Vahid Ghafarpour 23,385 Reputation points Volunteer Moderator
    2025-04-23T16:07:29.56+00:00

    I'd set up a hybrid DNS setup that allows resolution of the private endpoint from your local machine (via VPN or ExpressRoute), that requires:

    VPN Gateway / ExpressRoute to your on-prem network

    DNS forwarders to Azure DNS to resolve private link zones

    0 comments No comments

  2. Sindhuja Dasari 1,520 Reputation points Microsoft External Staff Moderator
    2025-04-23T17:04:52.6633333+00:00

    Hello Matthew

    I understand that you need to disable public access to log analytics workspace and app insights. You are on the right track with private endpoints and Azure Monitor private link scope, so any access (including from the Azure portal on your PC) must go through a private path.

    Since your PC is outside the VNet, accessing logs using Azure portal is not possible as you disabled the public access.

    Here are few options to allow access:

    1.Use a VPN (Site-to-Site or Point-to-Site)

    Connecting your local machine to the Azure VNet via VPN will make it part of the virtual network:

    • Set up a Point-to-Site VPN on the Azure Virtual Network Gateway.

    • Connect from your PC using the VPN client.

    • Once connected, you’ll be able to access logs through the Azure Portal

    2.Access via Bastion

    Deploy a VM within the VNet (or a peered one) that can access the private endpoint.

    You can then:

    • Use Azure Bastion to securely RDP or SSH into the VM.

    • Open the Azure Portal from a browser on that VM, and access Log Analytics or Application Insights.

    Since the traffic originates from within the VNet, private endpoint access will work as expected.

    3.Temporarily Enable Public Access (IP-Restricted)

    If VPN or Bastion isn’t feasible and you need temporary access:

    • Go to the Log Analytics Workspace > Networking section.

    • Set Public Network Access to “Enabled from selected networks.”

    User's image

    • Add your PC’s public IP address to the firewall rule list. This allows you to access the workspace from your current machine, while still restricting exposure to known IPs.


    Please don’t forget to close the thread by clicking "Accept the answer" and "Yes" wherever the information provided helps you, as this can be beneficial to other community members.


Your answer

Answers can be marked as Accepted Answers by the question author, which helps users to know the answer solved the author's problem.