You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-permissions.md
+33-3Lines changed: 33 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ By default, when a Grafana instance is created, Azure Managed Grafana grants it
15
15
16
16
This means that the new Grafana instance can access and search all monitoring data in the subscription. It can view the Azure Monitor metrics and logs from all resources, and any logs stored in Log Analytics workspaces in the subscription.
17
17
18
-
In this article, you'll learn how to manually grant permission for Azure Managed Grafana to access an Azure resource using a managed identity.
18
+
In this article, learn how to manually grant permission for Azure Managed Grafana to access an Azure resource using a managed identity.
19
19
20
20
## Prerequisites
21
21
@@ -29,7 +29,9 @@ Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.
29
29
30
30
## Edit Azure Monitor permissions
31
31
32
-
To change permissions for a specific resource, follow these steps:
32
+
To edit permissions for a specific resource, follow these steps.
33
+
34
+
### [Portal](#tab/azure-portal)
33
35
34
36
1. Open a resource that contains the monitoring data you want to retrieve. In this example, we're configuring an Application Insights resource.
35
37
1. Select **Access Control (IAM)**.
@@ -52,10 +54,38 @@ To change permissions for a specific resource, follow these steps:
52
54
53
55
:::image type="content" source="media/permissions/permissions-managed-identities.png" alt-text="Screenshot of the Azure platform selecting the instance.":::
54
56
55
-
1.Click**Next**, then **Review + assign** to confirm the assignment of the new permission.
57
+
1.Select**Next**, then **Review + assign** to confirm the assignment of the new permission.
56
58
57
59
For more information about how to use Managed Grafana with Azure Monitor, go to [Monitor your Azure services in Grafana](../azure-monitor/visualize/grafana-plugin.md).
58
60
61
+
### [Azure CLI](#tab/azure-cli)
62
+
63
+
Assign a role assignment using the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command.
64
+
65
+
In the code below, replace the following placeholders:
66
+
67
+
-`<assignee>`: enter the assignee's object ID. For a managed identity, enter the managed identity's ID.
68
+
-`<roleNameOrId>`: enter the role's name or ID. For Monitoring Reader, enter `Monitoring Reader` or `43d0d8ad-25c7-4714-9337-8ba259a9fe05`.
69
+
-`<scope>`: enter the full ID of the resource Azure Managed Grafana needs access to.
70
+
71
+
```azurecli
72
+
az role assignment create --assignee "<assignee>" \
73
+
--role "<roleNameOrId>" \
74
+
--scope "<scope>"
75
+
```
76
+
77
+
Example: assigning permission for an Azure Managed Grafana instance to access an Application Insights resource using a managed identity.
78
+
79
+
```azurecli
80
+
az role assignment create --assignee "/subscriptions/abcdef01-2345-6789-0abc-def012345678/resourcegroups/my-rg/providers/Microsoft.Dashboard/grafana/mygrafanaworkspace" \
For more information about assigning Azure roles using the Azure CLI, refer to the [Role based access control documentation](../role-based-access-control/role-assignments-cli.md).
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-share-grafana-workspace.md
+40-8Lines changed: 40 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,7 +11,7 @@ ms.date: 3/08/2023
11
11
12
12
# How to share access to Azure Managed Grafana
13
13
14
-
A DevOps team may build dashboards to monitor and diagnose an application or infrastructure that it manages. Likewise, a support team may use a Grafana monitoring solution for troubleshooting customer issues. In these scenarios, multiple users will be accessing one Grafana instance.
14
+
A DevOps team may build dashboards to monitor and diagnose an application or infrastructure that it manages. Likewise, a support team may use a Grafana monitoring solution for troubleshooting customer issues. In these scenarios, multiple users are accessing one Grafana instance.
15
15
16
16
Azure Managed Grafana enables such collaboration by allowing you to set custom permissions on an instance that you own. This article explains what permissions are supported and how to grant permissions to share an Azure Managed Grafana instance with your stakeholders.
17
17
@@ -29,19 +29,17 @@ Azure Managed Grafana supports the Grafana Admin, Grafana Editor, and Grafana Vi
29
29
- The Grafana Editor role provides read-write access to the dashboards in the instance.
30
30
- The Grafana Viewer role provides read-only access to dashboards in the instance.
31
31
32
-
More details on Grafana roles can be found in the [Grafana documentation](https://grafana.com/docs/grafana/latest/permissions/organization_roles/#compare-roles) and in .
32
+
More details on Grafana roles can be found in the [Grafana documentation](https://grafana.com/docs/grafana/latest/permissions/organization_roles/#compare-roles).
33
33
34
-
Grafana user roles and assignments are fully [integrated within Azure Active Directory (Azure AD)](../role-based-access-control/built-in-roles.md#grafana-admin). You can add assign a Grafana role to any Azure AD user, group, service principal or managed identity, and grant them access permissions associated with that role. You can manage these permissions from the Azure portal or the command line. This section explains how to assign Grafana roles to users in the Azure portal.
34
+
Grafana user roles and assignments are fully [integrated within Azure Active Directory (Azure AD)](../role-based-access-control/built-in-roles.md#grafana-admin). You can assign a Grafana role to any Azure AD user, group, service principal or managed identity, and grant them access permissions associated with that role. You can manage these permissions from the Azure portal or the command line. This section explains how to assign Grafana roles to users in the Azure portal.
35
35
36
36
> [!NOTE]
37
37
> Azure Managed Grafana doesn't support personal Microsoft accounts (MSA) currently.
38
38
39
-
## Sign in to Azure
40
-
41
-
Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.com/) with your Azure account.
42
-
43
39
## Add a Grafana role assignment
44
40
41
+
### [Portal](#tab/azure-portal)
42
+
45
43
1. Open your Azure Managed Grafana instance.
46
44
1. Select **Access control (IAM)** in the left menu.
47
45
1. Select **Add role assignment**.
@@ -57,7 +55,41 @@ Sign in to the Azure portal at [https://portal.azure.com/](https://portal.azure.
57
55
1. Select **Next**, then **Review + assign** to complete the role assignment.
58
56
59
57
> [!NOTE]
60
-
> Dashboard and data source level sharing are done from within the Grafana application. For more details, refer to [Share a Grafana dashboard or panel](./how-to-share-dashboard.md). [Share a Grafana dashboard] and [Data source permissions](https://grafana.com/docs/grafana/latest/administration/data-source-management/#data-source-permissions).
58
+
> Dashboard and data source level sharing are done from within the Grafana application. For more information, refer to [Share a Grafana dashboard or panel](./how-to-share-dashboard.md). [Share a Grafana dashboard] and [Data source permissions](https://grafana.com/docs/grafana/latest/administration/data-source-management/#data-source-permissions).
59
+
60
+
### [Azure CLI](#tab/azure-cli)
61
+
62
+
Assign a role using the [az role assignment create](/cli/azure/role/assignment#az-role-assignment-create) command.
63
+
64
+
In the code below, replace the following placeholders:
65
+
66
+
-`<assignee>`:
67
+
- For an Azure AD user, enter their email address or the user object ID.
68
+
- For a group, enter the group object ID.
69
+
- For a service principal, enter the service principal object ID.
70
+
- For a managed identity, enter the object ID.
71
+
-`<roleNameOrId>`:
72
+
- For Grafana Admin, enter `Grafana Admin` or `22926164-76b3-42b3-bc55-97df8dab3e41`.
73
+
- For Grafana Editor, enter `Grafana Editor` or `a79a5197-3a5c-4973-a920-486035ffd60f`.
74
+
- For Grafana Viewer, enter `Grafana Viewer` or `60921a7e-fef1-4a43-9b16-a26c52ad4769`.
75
+
-`<scope>`: enter the full ID of the Azure Managed Grafana instance.
76
+
77
+
```azurecli
78
+
az role assignment create --assignee "<assignee>" \
For more information about assigning Azure roles using the Azure CLI, refer to the [Role based access control documentation](../role-based-access-control/role-assignments-cli.md).
0 commit comments