All Products
Search
Document Center

Application Real-Time Monitoring Service:Configure a private endpoint for a Grafana workspace

Last Updated:Mar 11, 2026

A private endpoint lets a Grafana workspace access data sources and domain names inside a virtual private cloud (VPC) that is not reachable over the public internet. It installs a network interface controller (NIC) inside the VPC so the workspace can reach VPC-internal resources directly.

How it works

After you enable a private endpoint, Managed Service for Grafana installs a private NIC in the VPC and vSwitch that you specify. The workspace receives a private domain name that resolves to an IP address within that VPC. All traffic between the Grafana workspace and VPC-internal data sources flows through this private NIC instead of the public internet.

A security group controls which resources the workspace can reach through the private NIC. You manage these rules in the Elastic Compute Service (ECS) console, the same way you manage any other security group in your VPC.

Prerequisites

Before you begin, ensure that you have:

  • Managed Service for Grafana Pro or Advanced Edition activated

  • A Grafana workspace created after August 31, 2023

  • A VPC in the same region as the Grafana workspace

Private endpoints are available only for workspaces created after August 31, 2023.

Enable a private endpoint

  1. Log on to the ARMS console. In the left-side navigation pane, choose Managed Service for Grafana > Workspace Management.

  2. On the Workspace Management page, click the ID of the workspace that you want to configure.

  3. In the left-side navigation pane, click Whitelists and Security Groups.

  4. On the Private IP Address Whitelist tab, click Enable Private Endpoint.

  5. In the dialog box that appears, configure the following parameters:

    ParameterDescription
    VPCThe VPC where your data sources reside. The Grafana workspace connects to this VPC through the private NIC.
    vSwitchThe vSwitch (subnet) within the selected VPC. The private NIC is created in this vSwitch and receives a private IP address from its CIDR block.
    Security GroupThe security group that controls inbound and outbound traffic for the private NIC. Make sure the security group rules allow traffic to your target data sources.
  6. Click Activate.

Verify the private endpoint

After activation, the Private IP Address Whitelist tab displays the following information:

FieldDescription
VPCThe VPC that the private NIC is installed in
vSwitchThe vSwitch that the private NIC belongs to
Security groupThe security group attached to the private NIC
Private domain nameThe domain name that resolves to the private IP address inside the VPC
Security group policyThe current security group rule summary
Private IP Address Whitelist tab showing VPC, vSwitch, security group, private domain name, and security group policy

The private domain name also appears on the Basic Information page of the workspace.

Basic Information page showing the private domain name
Use the private domain name when you configure data sources in Grafana. Avoid hardcoding the private IP address, because the address may change if you disable and re-enable the private endpoint.

Configure security group rules

To adjust which resources the Grafana workspace can access through the private endpoint:

  1. On the Private IP Address Whitelist tab, click Configure Security Group Rules in the upper-right corner.

  2. Configure the rules in the ECS console as prompted.

Make sure the security group rules allow traffic from the Grafana workspace to the ports and IP addresses of your target data sources.

Disable the private endpoint

To remove the private NIC and stop the private domain name from resolving:

  1. On the Private IP Address Whitelist tab, click Disable Private Endpoint.

  2. In the confirmation dialog box, click OK.

Important

Disabling the private endpoint removes the private NIC and stops the private domain name from resolving. The Grafana workspace loses access to any VPC-internal data sources that depend on this connection.