Edit

Azure Monitor pipeline TLS configuration

Use this article to choose how to secure TCP-based ingestion for Azure Monitor pipeline. The pipeline supports TLS and mutual TLS (mTLS) for TCP-based receivers through two certificate management approaches:

  • Default TLS: Automated certificate management with zero-downtime rotation, managed by the Certificate Manager extension
  • Bring Your Own Certificates (BYOC): Customer-managed certificates and keys that users create with their own PKI for the Azure Monitor pipeline receiver TLS endpoint to use

Choose one of the following approaches:

  • Use automated certificate management with zero-downtime rotation.
  • Provide your own server certificate and key.
  • Provide your own CA for client certificate validation.

Use the following sections to choose the approach that fits your deployment.

Prerequisites

See the prerequisites in Configure Azure Monitor pipeline for details on the requirements for enabling and configuring the Azure Monitor pipeline.
Additionally, add the following to your cluster:

  • Access to kubectl and the Azure CLI for the Arc-enabled cluster context.

TLS modes

The Azure Monitor pipeline supports three TLS configuration modes:

tlsConfigurations value Description
"mode": "mutualTls" Full mTLS with both server and client certificate authentication (default)
"mode": "serverOnly" TLS encryption without client certificate validation
"mode": "disabled" Plain text communication

After you assign a name to a tlsConfiguration, any TCP-based receiver in the pipeline configuration can reference it. If you don't specify a TLS configuration for a receiver, the receiver defaults to mutualTls mode.

Option 1: Default TLS (automated certificate management)

Use this option when you want the Certificate Manager extension to manage certificate issuance and rotation for you.

For more information about how to set up automated certificate management, see TLS configuration - Using automated certificate management.

Option 2: BYOC (Bring Your Own Certificates)

Use this option when you need to use your own certificates or integrate with your existing PKI. By using BYOC, you can:

  • Replace the default collector server certificate with your own
  • Provide your own CA for client certificate validation
  • Integrate with Azure Key Vault for certificate storage

For more information about how this works and how to set up, see TLS configuration - Using your own certificate management.

Option 3: Disable TLS and mTLS

Disable TLS and mTLS only if your environment doesn't require encrypted ingestion or if you're trying to test your workflow before locking it down securely.

  1. Disable the configuration by using the following settings.
  2. You must have the CME extension and gateway installed, even for non-TLS ingestion from your resources. Review prerequisites for detailed guidance.

Disable TLS

"tlsConfigurations": [
    {
        "name": "tls-disabled",
        "mode": "disabled"
    }
],
"receivers": [
    {
        "type": "Syslog",
        "name": "receiverSyslog",
        "tlsConfiguration": "tls-disabled",
          ....
    }
]