An Azure service that is used to collect, analyze, and act on telemetry data from Azure and on-premises environments.
Thanks for the update, you don’t need to put the Azure Monitor Agent (AMA) itself behind a fancy load-balancer AMA will automatically talk to Azure’s highly available ingestion endpoints and fail over if one goes unhealthy. Your HA concern is really at the syslog-aggregator tier, not the agent.
Here’s what you can do for "ZPA LSS > 2 Syslog servers > Sentinel":
- Deploy two syslog aggregator servers (rsyslog/syslog-ng), install AMA on each, and point both at your Log Analytics workspace.
- Front those two servers with a VIP/LB or virtual IP: • If ZPA LSS sends logs over UDP, you can safely use a round-robin LB. UDP is connectionless, so you won’t break sessions. • If it uses TCP or any persistent session, use either: – An active-passive design (e.g. keepalived + VRRP), or – A layer-4 LB with session-affinity (“sticky”) so you don’t tear down open connections.
- On the backend, each AMA instance will independently forward to Azure and handle its own retries/fail-over against Azure ingestion endpoints—you don’t need an active-passive pair just for the agent.
Reference: