Skip to content

Commit 6c3df08

Browse files
committed
Updated content based on user feedback
1 parent 9ae888a commit 6c3df08

File tree

4 files changed

+15
-19
lines changed

4 files changed

+15
-19
lines changed

articles/managed-grafana/how-to-data-source-plugins-managed-identity.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: How to configure data sources for Azure Managed Grafana Preview with Managed Identity
2+
title: How to configure data sources for Azure Managed Grafana Preview
33
description: In this how-to guide, discover how you can configure data sources for Azure Managed Grafana using Managed Identity.
44
author: maud-lv
55
ms.author: malev
@@ -8,7 +8,7 @@ ms.topic: how-to
88
ms.date: 3/31/2022
99
---
1010

11-
# How to configure data sources for Azure Managed Grafana Preview with Managed Identity
11+
# How to configure data sources for Azure Managed Grafana Preview
1212

1313
## Prerequisites
1414

@@ -66,15 +66,8 @@ The Azure Monitor data source is automatically added to all new Managed Grafana
6666

6767
Authentication and authorization are subsequently made through the provided managed identity. With Managed Identity, you can assign permissions for your Managed Grafana workspace to access Azure Monitor data without having to manually manage service principals in Azure Active Directory (Azure AD).
6868

69-
## Manually assign permissions for Managed Grafana to access data in Azure
70-
71-
Azure Managed Grafana automatically configures the **Monitoring Reader** role for accessing all the Azure Monitor data and Log Analytics resources in your subscription. To change this:
72-
73-
1. Go to the Log Analytics resource that contains the monitoring data you want to visualize.
74-
1. Select **Access Control (IAM)**.
75-
1. Search for your Managed Grafana workspace and change the permission.
76-
7769
## Next steps
7870

7971
> [!div class="nextstepaction"]
72+
> [Modify access permissions to Azure Monitor](./how-to-permissions.md)
8073
> [Share an Azure Managed Grafana workspace](./how-to-share-grafana-workspace.md)

articles/managed-grafana/how-to-permissions.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
---
2-
title: How to configure permissions for Azure Managed Grafana
3-
description: Learn how to manually configure access permissions with roles for your Azure Managed Grafana Preview workspace
2+
title: How to modify access permissions to Azure Monitor
3+
description: Learn how to manually set up permissions that allow your Azure Managed Grafana Preview workspace to access a data source
44
author: maud-lv
55
ms.author: malev
66
ms.service: managed-grafana
77
ms.topic: how-to
88
ms.date: 3/31/2022
99
---
1010

11-
# How to configure permissions for Azure Managed Grafana Preview
11+
# How to modify access permissions to Azure Monitor
1212

1313
By default, when a Grafana workspace is created, Azure Managed Grafana grants it the Monitoring Reader role for all Azure Monitor data and Log Analytics resources within a subscription.
1414

@@ -26,9 +26,9 @@ In this article, you'll learn how to manually edit permissions for a specific re
2626

2727
Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.com/) with your Azure account.
2828

29-
## Assign permissions for an Azure Managed Grafana workspace to access data in Azure
29+
## Edit Azure Monitor permissions for an Azure Managed Grafana workspace
3030

31-
To edit permissions for a specific resource, follow these steps:
31+
To change permissions for a specific resource, follow these steps:
3232

3333
1. Open a resource that contains the monitoring data you want to retrieve. In this example, we're configuring an Application Insights resource.
3434
1. Select **Access Control (IAM)**.

articles/managed-grafana/how-to-share-grafana-workspace.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,10 @@ Azure Managed Grafana supports the Admin, Viewer and Editor roles:
2727

2828
The Admin role is automatically assigned to the creator of a Grafana workspace. More details on Admin, Editor, and Viewer roles can be found at [Grafana organization roles](https://grafana.com/docs/grafana/latest/permissions/organization_roles/#compare-roles).
2929

30-
Grafana user roles and assignments are fully integrated with the Azure Active Directory. You can manage these permissions from the Azure portal or the command line. This section explains how to assign users to the Viewer or Editor role in the Azure portal.
30+
Grafana user roles and assignments are fully integrated with the Azure Active Directory (AAD). You can add any AAD user or security group to a Grafana role and grant them access permissions associated with that role. You can manage these permissions from the Azure portal or the command line. This section explains how to assign users to the Viewer or Editor role in the Azure portal.
31+
32+
> [!NOTE]
33+
> Azure Managed Grafana doesn't support personal [Microsoft accounts](https://account.microsoft.com) (a.k.a., MSA) currently.
3134
3235
## Sign in to Azure
3336

articles/managed-grafana/toc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,10 +12,10 @@ items:
1212
href: quickstart-managed-grafana-portal.md
1313
- name: How-to guides
1414
items:
15-
- name: Configure Permissions for Managed Grafana
16-
href: how-to-permissions.md
17-
- name: Configure data source plugins with Managed Identity
15+
- name: Configure data source plugins
1816
href: how-to-data-source-plugins-managed-identity.md
17+
- name: Modify access permissions to Azure Monitor
18+
href: how-to-permissions.md
1919
- name: Share your Managed Grafana workspace
2020
href: how-to-share-grafana-workspace.md
2121
- name: Call Grafana APIs programmatically

0 commit comments

Comments
 (0)