Skip to content

Commit 97c8f78

Browse files
committed
SFI-fixes
1 parent e06eef6 commit 97c8f78

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed
Loading
1.03 KB
Loading
Loading

articles/azure-monitor/essentials/prometheus-self-managed-grafana-azure-active-directory.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,12 +4,12 @@ description: How to configure Azure Monitor managed service for Prometheus as da
44
author: EdB-MSFT
55
ms.topic: conceptual
66
ms.author: edbaynash
7-
ms.date: 05/31/2024
7+
ms.date: 08/11/2024
88
---
99

1010
# Configure self-managed Grafana to use Azure Monitor managed service for Prometheus with Microsoft Entra ID.
1111

12-
[Azure Monitor managed service for Prometheus](prometheus-metrics-overview.md) allows you to collect and analyze metrics at scale using a [Prometheus](https://aka.ms/azureprometheus-promio)-compatible monitoring solution. The most common way to analyze and present Prometheus data is with a Grafana dashboard. This article explains how to configure Prometheus as a data source for [self-hosted Grafana](https://grafana.com/) using Microsoft Entra ID.
12+
[Azure Monitor managed service for Prometheus](prometheus-metrics-overview.md) allows you to collect and analyze metrics at scale using a [Prometheus](https://aka.ms/azureprometheus-promio)-compatible monitoring solution. The most common way to analyze and present Prometheus data is with a Grafana dashboard. This article explains how to configure Prometheus as a data source for [self-hosted Grafana](https://grafana.com/) using Microsoft Entra ID.
1313

1414
For information on using Grafana with managed system identity, see [Configure Grafana using managed system identity](./prometheus-grafana.md).
1515
<a name='azure-active-directory-authentication'></a>
@@ -30,7 +30,7 @@ To set up Microsoft Entra authentication, follow the steps below:
3030
1. On the Register an application page, enter a **Name** for the application.
3131
1. Select **Register**.
3232
1. Note the **Application (client) ID** and **Directory(Tenant) ID**. They're used in the Grafana authentication settings.
33-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/app-registration-overview.png" alt-text="A screenshot showing the App registration overview page.":::
33+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/app-registration-overview.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/app-registration-overview.png" alt-text="A screenshot showing the App registration overview page.":::
3434
1. On the app's overview page, select **Certificates and Secrets**.
3535
1. In the client secrets tab, select **New client secret**.
3636
1. Enter a **Description**.
@@ -39,13 +39,13 @@ To set up Microsoft Entra authentication, follow the steps below:
3939
> Create a process to renew the secret and update your Grafana data source settings before the secret expires.
4040
> Once the secret expires Grafana will lose the ability to query data from your Azure Monitor workspace.
4141
42-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/add-a-client-secret.png" alt-text="A screenshot showing the Add client secret page.":::
42+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/add-a-client-secret.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/add-a-client-secret.png" alt-text="A screenshot showing the Add client secret page.":::
4343

4444
1. Copy and save the client secret **Value**.
4545
> [!NOTE]
4646
> Client secret values can only be viewed immediately after creation. Be sure to save the secret before leaving the page.
4747
48-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/client-secret.png" alt-text="A screenshot showing the client secret page with generated secret value.":::
48+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/client-secret.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/client-secret.png" alt-text="A screenshot showing the client secret page with generated secret value.":::
4949

5050
### Allow your app access to your workspace
5151

@@ -55,20 +55,20 @@ Allow your app to query data from your Azure Monitor workspace.
5555

5656
1. On the Overview page, take note of your **Query endpoint**. The query endpoint is used when setting up your Grafana data source.
5757
1. Select **Access control (IAM)**.
58-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/workspace-overview.png" alt-text="A screenshot showing the Azure Monitor workspace overview page":::
58+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/workspace-overview.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/workspace-overview.png" alt-text="A screenshot showing the Azure Monitor workspace overview page.":::
5959

6060
1. Select **Add**, then **Add role assignment** from the **Access Control (IAM)** page.
6161

6262
1. On the **Add role Assignment** page, search for **Monitoring**.
6363
1. Select **Monitoring data reader**, then select the **Members** tab.
6464

65-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/add-role-assignment.png" alt-text="A screenshot showing the Add role assignment page":::
65+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/add-role-assignment.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/add-role-assignment.png" alt-text="A screenshot showing the Add role assignment page.":::
6666

6767
1. Select **Select members**.
6868
1. Search for the app that you registered in the [Register an app with Microsoft Entra ID](#register-an-app-with-azure-active-directory) section and select it.
6969
1. Click **Select**.
7070
1. Select **Review + assign**.
71-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/select-members.png" alt-text="A screenshot showing the Add role assignment, select members page.":::
71+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/select-members.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/select-members.png" alt-text="A screenshot showing the Add role assignment, select members page.":::
7272

7373
You've created your App registration and have assigned it access to query data from your Azure Monitor workspace. The next step is setting up your Prometheus data source in Grafana.
7474

@@ -113,7 +113,7 @@ Grafana now supports connecting to Azure Monitor managed Prometheus using the [P
113113
1. In the Azure Authentication section, select **App Registration** from the **Authentication** dropdown.
114114
1. Enter the **Direct(tenant) ID**, **Application (client) ID**, and the **Client secret** from the [Register an app with Microsoft Entra ID](#register-an-app-with-azure-active-directory) section.
115115
1. Select **Save & test**
116-
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/configure-grafana.png" alt-text="A screenshot showing the Grafana settings page for adding a data source.":::
116+
:::image type="content" source="./media/prometheus-self-managed-grafana-azure-active-directory/configure-grafana.png" lightbox="./media/prometheus-self-managed-grafana-azure-active-directory/configure-grafana.png" alt-text="A screenshot showing the Grafana settings page for adding a data source.":::
117117
118118
## Frequently asked questions
119119

0 commit comments

Comments
 (0)