You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/openshift/howto-remotewrite-prometheus.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,8 +12,8 @@ Azure Red Hat OpenShift comes preinstalled with a default Prometheus server that
12
12
## Prerequisites
13
13
- Data for Azure Monitor managed service for Prometheus is stored in an [Azure Monitor workspace](../azure-monitor/essentials/azure-monitor-workspace-overview.md). You must [create a new workspace](../azure-monitor/essentials/azure-monitor-workspace-manage.md#create-an-azure-monitor-workspace) if you don't already have one.
14
14
15
-
## Create Azure Active Directory application
16
-
Follow the procedure at [Register an application with Azure AD and create a service principal](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal) to register an application for Prometheus remote-write and create a service principal.
15
+
## Create Microsoft Entra ID application
16
+
Follow the procedure at [Register an application with Microsoft Entra ID and create a service principal](../active-directory/develop/howto-create-service-principal-portal.md#register-an-application-with-azure-ad-and-create-a-service-principal) to register an application for Prometheus remote-write and create a service principal.
17
17
18
18
Copy the tenant ID and client ID of the created service principal
19
19
1. Browse to **Identity > Applications > App registrations**, then select your application.
@@ -22,7 +22,7 @@ Copy the tenant ID and client ID of the created service principal
22
22
23
23
Create a new client secret as described in [Create new client secret](../active-directory/develop/howto-create-service-principal-portal.md#option-3-create-a-new-client-secret) and copy the value of the created secret.
24
24
25
-
set the values of the collected tenant Id, client Id and client secret
25
+
set the values of the collected tenant ID, client ID and client secret
26
26
```
27
27
export TENANT_ID=<tenant-id>
28
28
export CLIENT_ID=<client-id>
@@ -40,14 +40,14 @@ The application requires the *Monitoring Metrics Publisher* role on the data col
40
40
41
41
4. Select **Monitoring Metrics Publisher** role and select **Next**.
42
42
43
-
5. Select **User, group, or service principal** and then select **Select members**. Select the application that you created and click**Select**.
43
+
5. Select **User, group, or service principal** and then select **Select members**. Select the application that you created and select**Select**.
44
44
45
45
6. Select **Review + assign** to complete the role assignment.
46
46
47
47
## Create secret in the ARO cluster
48
48
49
49
We're using the OAuth 2.0 authentication method from the [supported remote write authentication settings](https://docs.openshift.com/container-platform/4.11/monitoring/configuring-the-monitoring-stack.html#supported_remote_write_authentication_settings_configuring-the-monitoring-stack)
50
-
To facilitate this approach, create a secret with the client Id and client secret
50
+
To facilitate this approach, create a secret with the client ID and client secret
51
51
52
52
```
53
53
cat << EOF | oc apply -f -
@@ -66,7 +66,7 @@ EOF
66
66
67
67
To [configure](https://docs.openshift.com/container-platform/4.11/monitoring/configuring-the-monitoring-stack.html#configuring_remote_write_storage_configuring-the-monitoring-stack) remote write for default platform monitoring, we need to update the cluster-monitoring-config config map in the openshift-monitoring namespace
68
68
1. Replace the INGESTION-URL in the configuration with the **Metrics ingestion endpoint** from the **Overview** page for the Azure Monitor workspace
69
-
2. Replace the TENANT_ID in the configuration with the tenant Id of the service principal
69
+
2. Replace the TENANT_ID in the configuration with the tenant ID of the service principal
70
70
71
71
Edit the configmap
72
72
@@ -100,7 +100,7 @@ The captured metrics can be visualized using community Grafana dashboards or cre
100
100
101
101
1. Create an [Azure Managed Grafana workspace](../managed-grafana/quickstart-managed-grafana-portal.md)
102
102
2.[Link](../azure-monitor/essentials/azure-monitor-workspace-manage.md?tabs=azure-portal#link-a-grafana-workspace) the created Grafana workspace to the Azure Monitor workspace
103
-
3.[Import](../managed-grafana/how-to-create-dashboard.md?tabs=azure-portal#import-a-grafana-dashboard) the community Grafana Dashboard with id 3870 [OpenShift/K8 Cluster Overview](https://grafana.com/grafana/dashboards/3870-openshift-k8-cluster-overview/) into the Grafana workspace
103
+
3.[Import](../managed-grafana/how-to-create-dashboard.md?tabs=azure-portal#import-a-grafana-dashboard) the community Grafana Dashboard with ID 3870 [OpenShift/K8 Cluster Overview](https://grafana.com/grafana/dashboards/3870-openshift-k8-cluster-overview/) into the Grafana workspace
104
104
4. Specify the Azure Monitor Workspace as the datasource
105
105
5. Save the dashboard
106
106
6. Access the dashboard from **Home -> Dashboards**
0 commit comments