Thank you for reaching out and for providing the details on your AKS on Azure Local deployment (AKS enabled by Azure Arc). I understand you're trying to enable Container Insights (container logging and events) following the documentation at the link you shared, but the extension isn't populating data in your Log Analytics workspace (LAW). You're also seeing a potential mismatch with managed identity requirements versus workload identity support on AKS Arc.
I'm happy to help resolve this. Container Insights is fully supported on AKS on Azure Local / AKS Arc clusters. The documentation you referenced appears to have been updated or moved (the original page now returns a 404). The current, official guidance is in the Azure Monitor documentation for Arc-enabled Kubernetes clusters, which explicitly includes AKS on Azure Local.
- The core issue: The azuremonitor-containers extension needs to be configured (or re-configured) with the correct Log Analytics workspace and managed identity authentication for the Azure Monitor agent (amalogs.useAADAuth=true).
- Key clarification on identity: The "managed identity" requirement in the documentation refers to agent authentication (how the Azure Monitor container agent sends data to Azure Monitor/Log Analytics). This is supported and is the default on AKS Arc (including Azure Local). It is not the same as workload identity, which is a separate preview feature used by your application pods to authenticate to Azure resources (e.g., Key Vault, storage). The two are independent.
- No action needed on workload identity for Container Insights.
Azure Portal steps :
The Azure portal provides a simple, guided way to enable or update monitoring and automatically handles the extension configuration.
- In the Azure portal, navigate to your AKS Arc cluster (under Arc-enabled Kubernetes or the AKS on Azure Local resource).
- In the left menu, select Monitor → Monitor Settings.
- Under configuration options:
- Select Container Logs and events (you can also enable Prometheus metrics at the same time if desired).
- Choose your existing Log Analytics workspace (or let it create the default one).
- (Optional) Use Advanced settings to select a logging profile (e.g., Logs and Events (Default) or Cost-optimized), set collection interval, or apply namespace filters.
- Click Configure.
This will deploy/update the azuremonitor-containers extension with the proper workspace and managed identity authentication.
Alternative: CLI
If you prefer the command line or need to script this:
# Replace with your values
az k8s-extension create \
--name azuremonitor-containers \
--cluster-name <your-cluster-name> \
--resource-group <your-resource-group> \
--cluster-type connectedClusters \
--extension-type Microsoft.AzureMonitor.Containers \
--configuration-settings logAnalyticsWorkspaceResourceID=<full-resource-id-of-your-law> \
--configuration-settings amalogs.useAADAuth=true
To get the full LAW resource ID: az monitor log-analytics workspace show --resource-group <rg> --workspace-name <workspace-name> --query id -o tsv
- If the extension already exists, you can first check its current settings with az k8s-extension show ... and then use az k8s-extension update (or delete/recreate if needed).
Verification Steps
After configuration:
- Run kubectl get pods -n azuremonitor-containers – you should see the ama-logs (and optionally ama-metrics) pods running.
- In the Azure portal, go to your cluster → Insights (or Monitor → Logs) and confirm data is flowing (Nodes, Workloads, Containers views).
- Query your LAW for recent container logs (e.g., ContainerLogV2 table).
https://learn.microsoft.com/en-us/azure/azure-monitor/containers/kubernetes-monitoring-enable-arc
This page covers AKS on Azure Local explicitly and includes the latest CLI examples, portal steps, and identity guidance.
If the extension still doesn't send data after these steps (e.g., due to network/firewall, proxy, or permission issues), please share:
- Output of az k8s-extension show --name azuremonitor-containers ...
- Any errors from the agent pods (kubectl logs ... -n azuremonitor-containers)
- Confirmation that the cluster meets the network requirements for Azure Arc + Azure Monitor.
We'll get this resolved quickly. Feel free to reply with any additional details or let me know if you'd like me to walk through the portal steps in more detail.
Thanks,
Himanshu