You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-grafana/faq.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ No. Azure Managed Grafana hosts a commercial version called [Grafana Enterprise]
19
19
> [!NOTE]
20
20
> [Grafana Enterprise plugins](https://grafana.com/grafana/plugins/?enterprise=1&orderBy=weight&direction=asc) aren't included in the base service. They're purchasable as a separately licensed [add-on option](./how-to-grafana-enterprise.md) for Azure Managed Grafana.
21
21
22
-
## Does Managed Grafana encrypt my data?
22
+
## Does Azure Managed Grafana encrypt my data?
23
23
24
24
Yes. Azure Managed Grafana always encrypts all data at rest and in transit. It supports [encryption at rest](./encryption.md) using Microsoft-managed keys. All network communication is over TLS 1.2. You can further restrict network traffic using a [private link](./how-to-set-up-private-access.md) for connecting to Grafana and [managed private endpoints](./how-to-connect-to-data-source-privately.md) for data sources.
25
25
@@ -33,7 +33,7 @@ No. Azure Managed Grafana uses its implementation for Microsoft Entra authentica
33
33
34
34
## Can I install more plugins?
35
35
36
-
No. Currently all Grafana plugins are preinstalled. Managed Grafana supports all popular plugins for Azure data sources.
36
+
No. Currently all Grafana plugins are preinstalled. Azure Managed Grafana supports all popular plugins for Azure data sources.
37
37
38
38
## In terms of pricing, what constitutes an active user in Azure Managed Grafana?
This article provides information on availability zone support, disaster recovery and availability of Azure Managed Grafana for instances in the Standard plan. The Essential plan (preview) doesn't offer the same reliability and isn't recommended for use in production.
14
+
This article provides information on availability zone support, disaster recovery and availability of Azure Managed Grafana for workspaces in the Standard plan. The Essential plan (preview) doesn't offer the same reliability and isn't recommended for use in production.
15
15
16
-
An Azure Managed Grafana instance in the Standard tier is hosted on a dedicated set of virtual machines (VMs). By default, two VMs are deployed to provide redundancy. Each VM runs a Grafana server. A network load balancer distributes browser requests amongst the Grafana servers. On the backend, the Grafana servers are connected to a common database that stores the configuration and other persistent data for an entire Managed Grafana instance.
16
+
An Azure Managed Grafana workspace in the Standard tier is hosted on a dedicated set of virtual machines (VMs). By default, two VMs are deployed to provide redundancy. Each VM runs a Grafana server. A network load balancer distributes browser requests amongst the Grafana servers. On the backend, the Grafana servers are connected to a common database that stores the configuration and other persistent data for an entire Azure Managed Grafana workspace.
17
17
18
-
:::image type="content" source="media/service-reliability/diagram.png" alt-text="Diagram of the Managed Grafana Standard tier instance setup.":::
18
+
:::image type="content" source="media/service-reliability/diagram.png" alt-text="Diagram of the Azure Managed Grafana Standard tier workspace setup.":::
19
19
20
-
The load balancer always keeps track of which Grafana servers are available. In a dual-server setup, if it detects that one server is down, the load balancer starts sending all requests to the remaining server. That server should be able to pick up the browser sessions previously served by the other one based on information saved in the shared database. In the meantime, the Managed Grafana service will work to repair the unhealthy server or bring up a new one.
20
+
The load balancer always keeps track of which Grafana servers are available. In a dual-server setup, if it detects that one server is down, the load balancer starts sending all requests to the remaining server. That server should be able to pick up the browser sessions previously served by the other one based on information saved in the shared database. In the meantime, the Azure Managed Grafana service will work to repair the unhealthy server or bring up a new one.
21
21
22
-
Microsoft is not providing or setting up disaster recovery for this service. In case of a region level outage, service will experience downtime and users can set up additional instances in other regions for disaster recovery purposes.
22
+
Microsoft is not providing or setting up disaster recovery for this service. In case of a region level outage, service will experience downtime and users can set up additional workspaces in other regions for disaster recovery purposes.
23
23
24
24
## Zone redundancy
25
25
26
-
The network load balancer, VMs and database that underpin a Managed Grafana instance are located in a region based on system resource availability, and could end up being in a same Azure datacenter.
26
+
The network load balancer, VMs and database that underpin an Azure Managed Grafana workspace are located in a region based on system resource availability, and could end up being in a same Azure datacenter.
27
27
28
28
### With zone redundancy enabled
29
29
30
30
When the zone redundancy option is enabled, VMs are spread across [availability zones](../reliability/availability-zones-overview.md). Other resources such as network load balancer and database are also configured for availability zones.
31
31
32
-
In a zone-wide outage, no user action is required. An impacted Managed Grafana instance will rebalance itself to take advantage of the healthy zone automatically. The Managed Grafana service will attempt to heal the affected instances during zone recovery.
32
+
In a zone-wide outage, no user action is required. An impacted Azure Managed Grafana workspace will rebalance itself to take advantage of the healthy zone automatically. The Azure Managed Grafana service will attempt to heal the affected workspaces during zone recovery.
33
33
34
34
> [!NOTE]
35
-
> Zone redundancy can only be enabled when creating the Azure Managed Grafana instance, and can't be modified subsequently. The zone redundancy option comes with an additional cost. Go to [Azure Managed Grafana pricing](https://azure.microsoft.com/pricing/details/managed-grafana/) for details.
35
+
> Zone redundancy can only be enabled when creating the Azure Managed Grafana workspace, and can't be modified subsequently. The zone redundancy option comes with an additional cost. Go to [Azure Managed Grafana pricing](https://azure.microsoft.com/pricing/details/managed-grafana/) for details.
36
36
37
37
### With zone redundancy disabled
38
38
@@ -48,7 +48,7 @@ Zone redundancy support is enabled in the following regions:
48
48
| South Central US ||| East Asia |
49
49
| West US 3 ||||
50
50
51
-
For a complete list of regions where Managed Grafana is available, see [Products available by region - Azure Managed Grafana](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=managed-grafana®ions=all)
51
+
For a complete list of regions where Azure Managed Grafana is available, see [Products available by region - Azure Managed Grafana](https://azure.microsoft.com/explore/global-infrastructure/products-by-region/?products=managed-grafana®ions=all)
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-api-calls.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,16 +24,16 @@ In this tutorial, you learn how to:
24
24
## Prerequisites
25
25
26
26
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free/).
27
-
- An Azure Managed Grafana workspace. [Create an Azure Managed Grafana instance](./quickstart-managed-grafana-portal.md).
28
-
- A Microsoft Entra application with a service principal. [Create a Microsoft Entra application and service principal](../active-directory/develop/howto-create-service-principal-portal.md). For simplicity, use an application located in the same Microsoft Entra tenant as your Azure Managed Grafana instance.
27
+
- An Azure Managed Grafana workspace. [Create an Azure Managed Grafana workspace](./quickstart-managed-grafana-portal.md).
28
+
- A Microsoft Entra application with a service principal. [Create a Microsoft Entra application and service principal](../active-directory/develop/howto-create-service-principal-portal.md). For simplicity, use an application located in the same Microsoft Entra tenant as your Azure Managed Grafana workspace.
29
29
30
30
## Sign in to Azure
31
31
32
32
Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.com/) with your Azure account.
33
33
34
34
## Assign an Azure Managed Grafana role to the service principal of your application
35
35
36
-
1. In the Azure portal, open your Managed Grafana instance.
36
+
1. In the Azure portal, open your Azure Managed Grafana workspace.
37
37
1. Select **Access control (IAM)** in the navigation menu.
38
38
1. Select **Add**, then **Add role assignment**.
39
39
1. Select the **Grafana Editor** role and then **Next**.
@@ -77,7 +77,7 @@ You now need to gather some information, which you'll use to get a Grafana API a
77
77
1. Find the Grafana endpoint URL:
78
78
79
79
1. In the Azure portal, enter *Azure Managed Grafana* in the **Search resources, services, and docs (G+ /)** bar.
80
-
1. Select **Azure Managed Grafana** and open your Managed Grafana workspace.
80
+
1. Select **Azure Managed Grafana** and open your Azure Managed Grafana workspace.
81
81
1. Select **Overview** from the left menu and save the **Endpoint** value.
82
82
83
83
:::image type="content" source="media/tutorial-api/endpoint-url.png" alt-text="Screenshot of the Azure platform. Endpoint displayed in the Overview page.":::
@@ -145,7 +145,7 @@ curl -X GET \
145
145
https://<grafana-url>/api/user
146
146
```
147
147
148
-
Replace `<access-token>` and `<grafana-url>` with the access token retrieved in the previous step and the endpoint URL of your Grafana instance. For example `https://my-grafana-abcd.cuse.grafana.azure.com`.
148
+
Replace `<access-token>` and `<grafana-url>` with the access token retrieved in the previous step and the endpoint URL of your Grafana workspace. For example `https://my-grafana-abcd.cuse.grafana.azure.com`.
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-connect-azure-data-explorer.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ Azure Data Explorer is a logs & telemetry data exploration service. In this guid
18
18
19
19
## Prerequisites
20
20
21
-
*[An Azure Managed Grafana instance](./quickstart-managed-grafana-portal.md) in the Standard plan.
21
+
*[An Azure Managed Grafana workspace](./quickstart-managed-grafana-portal.md) in the Standard plan.
22
22
*[An Azure Data Explorer database](/azure/data-explorer/create-cluster-database)
23
23
24
24
::: zone pivot="aro-azureportal"
@@ -27,7 +27,7 @@ Azure Data Explorer is a logs & telemetry data exploration service. In this guid
27
27
28
28
Add an Azure Data Explorer data source to Grafana by following the steps below.
29
29
30
-
1. Open an Azure Managed Grafana instance in the Azure portal.
30
+
1. Open an Azure Managed Grafana workspace in the Azure portal.
31
31
1. In the **Overview** section, open the **Endpoint** URL.
32
32
1. In the Grafana portal, go to **Connections** > **Data sources** > **Add new data source**, then search and select **Azure Data Explorer Datasource**.
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-connect-to-data-source-privately.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: How to connect to a data source privately in Azure Managed Grafana
3
-
description: Learn how to connect an Azure Managed Grafana instance to a data source using Managed Private Endpoint
3
+
description: Learn how to connect an Azure Managed Grafana workspace to a data source using Managed Private Endpoint
4
4
ms.service: azure-managed-grafana
5
5
ms.topic: how-to
6
6
author: maud-lv
@@ -10,7 +10,7 @@ ms.date: 02/05/2024
10
10
11
11
# Connect to a data source privately
12
12
13
-
In this guide, you learn how to connect your Azure Managed Grafana instance to a data source using Managed Private Endpoint. Azure Managed Grafana’s managed private endpoints are endpoints created in a Managed Virtual Network that the Azure Managed Grafana service uses. They establish private links from that network to your Azure data sources. Azure Managed Grafana sets up and manages these private endpoints on your behalf. You can create managed private endpoints from your Azure Managed Grafana to access other Azure managed services (for example, Azure Monitor private link scope or Azure Monitor workspace) and your own self-hosted data sources (for example, connecting to your self-hosted Prometheus behind a private link service).
13
+
In this guide, you learn how to connect your Azure Managed Grafana workspace to a data source using Managed Private Endpoint. Azure Managed Grafana’s managed private endpoints are endpoints created in a Managed Virtual Network that the Azure Managed Grafana service uses. They establish private links from that network to your Azure data sources. Azure Managed Grafana sets up and manages these private endpoints on your behalf. You can create managed private endpoints from your Azure Managed Grafana to access other Azure managed services (for example, Azure Monitor private link scope or Azure Monitor workspace) and your own self-hosted data sources (for example, connecting to your self-hosted Prometheus behind a private link service).
14
14
15
15
When you use managed private endpoints, traffic between your Azure Managed Grafana and its data sources traverses exclusively over the Microsoft backbone network without going through the internet. Managed private endpoints protect against data exfiltration. A managed private endpoint uses a private IP address from your Managed Virtual Network to effectively bring your Azure Managed Grafana workspace into that network. Each managed private endpoint is mapped to a specific resource in Azure and not the entire service. Customers can limit connectivity to only resources approved by their organizations.
16
16
@@ -33,7 +33,7 @@ Managed private endpoints work with Azure services that support private link. Us
33
33
- Azure Data Explorer
34
34
- Azure Monitor private link scope (for example, Log Analytics workspace)
35
35
- Azure Monitor workspace, for Managed Service for Prometheus
36
-
- Azure SQL managed instance
36
+
- Azure SQL managed workspace
37
37
- Azure SQL server
38
38
- Private link services
39
39
- Azure Databricks
@@ -44,7 +44,7 @@ Managed private endpoints work with Azure services that support private link. Us
44
44
To follow the steps in this guide, you must have:
45
45
46
46
- An Azure account with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
47
-
- An Azure Managed Grafana instance in the Standard tier. If you don't have one yet, [create a new instance](quickstart-managed-grafana-portal.md).
47
+
- An Azure Managed Grafana workspace in the Standard tier. If you don't have one yet, [create a new instance](quickstart-managed-grafana-portal.md).
48
48
49
49
## Create a managed private endpoint for Azure Monitor workspace
0 commit comments