Skip to content

Commit 9c0b850

Browse files
authored
fixing custom notes
1 parent 426c95a commit 9c0b850

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

articles/managed-grafana/quickstart-managed-grafana-cli.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,7 +67,7 @@ Run the code below to create an Azure Managed Grafana workspace.
6767
Once the deployment is complete, you'll see a note in the output of the command line stating that the instance was successfully created, alongside with additional information about the deployment.
6868

6969
> [!NOTE]
70-
Azure Managed Grafana has a system-assigned managed identity enabled by default. You can use a user-assigned managed identity or a service principal instead. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
70+
>Azure Managed Grafana has a system-assigned managed identity enabled by default. You can use a user-assigned managed identity or a service principal instead. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
7171

7272
## Access your new Managed Grafana instance
7373

articles/managed-grafana/quickstart-managed-grafana-portal.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
5151
1. **System assigned managed identity** is set to **On**.
5252

5353
>[!NOTE]
54-
You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
54+
>You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
5555

5656
1. The box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default.
5757

articles/managed-grafana/troubleshoot-managed-grafana.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -153,7 +153,7 @@ Every Grafana instance comes pre-configured with an Azure Monitor data source. W
153153
1. If the data source uses an **App Registration** authentication:
154154
1. In your Grafana endpoint, go to **Configurations > Data Sources > Azure Monitor** and check if the information for **Directory (tenant) ID** and **Application (client) ID** is correct.
155155
1. Check if the service principal has the Monitoring Reader role assigned to the Managed Grafana instance. If not, add it from the Azure portal by opening your subscription in the Azure portal and going to **Access control (IAM)** > **Add** > **Add role assignment**.
156-
1. If needed, reapply the client secret
156+
1. If needed, reapply the client secret.
157157

158158
:::image type="content" source="media/troubleshoot/troubleshoot-azure-monitor-app-registration.png" alt-text="Screenshot of the Managed Grafana workspace: Check app registration authentication details.":::
159159

0 commit comments

Comments
 (0)