Skip to content

Commit ba8eab9

Browse files
committed
Reflect changes in the PR
1 parent 79487de commit ba8eab9

File tree

2 files changed

+17
-17
lines changed

2 files changed

+17
-17
lines changed

articles/managed-grafana/quickstart-managed-grafana-cli.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -22,17 +22,14 @@ Get started using Azure Managed Grafana by creating an Azure Managed Grafana wor
2222

2323
- An Azure account for work or school with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
2424
- Minimum required role to create a workspace: resource group Contributor.
25-
- Minimum required role to access the Grafana UI: resource group Owner.
26-
- Minimum required role to create a workspace: resource group Contributor.
2725
- Minimum required role to access the Grafana UI: resource group Owner.
2826

2927
>[!NOTE]
30-
> If you don't meet this requirement, once you've created a new Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role on the workspace.
31-
> If you don't meet this requirement:
32-
> - once you've created a new Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role
33-
> - or consider creating the workspace using the **Creator can admin (Preview)** feature available from the Azure portal. [Refer to this quickstart for more information](quickstart-managed-grafana-portal.md).
28+
> If you're not a resource group Owner:
29+
> - once you've created the Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role
30+
> - or consider creating the workspace using the **Creator can admin (Preview)** feature available from the Azure portal as a temporary workaround. [Refer to this quickstart for more information](quickstart-managed-grafana-portal.md).
3431

35-
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
32+
[!INCLUDE [azure-cli-prepare-your-environment-no-header.md](~/reusable-content/azure-cli/azure-cli-prepare-your-environment-no-header.md)]
3633

3734
## Sign in to Azure
3835

articles/managed-grafana/quickstart-managed-grafana-portal.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -47,34 +47,37 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
4747
1. Select **Next : Permission >** to control access rights for your Grafana instance and data sources:
4848
- **System assigned managed identity** is set to **On**.
4949

50-
>[!NOTE]
51-
>You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
50+
> [!NOTE]
51+
> You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. For more information, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
5252

5353
- If you're a subscription Owner or a User Access Administrator:
54-
- the box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default. This role assignment allows Azure Managed Grafana to access and display monitoring data from the resources in your Azure subscription.
54+
- the box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default. This role assignment allows Azure Managed Grafana to access and display monitoring data from various Azure services.
5555
- the box **Include myself** under **Grafana administrator role** is checked. This option grants you the Grafana administrator role, and lets you manage access rights. Optionally select **Add** to share this right with team members.
5656
- If you're not a subscription Owner or a User Access Administrator, you can either:
5757
- ask a subscription Owner or a User Access Administrator to assign you the Grafana Admin role
58-
- or enable **Creator can admin (Preview)**. This option available in preview grants you the Grafana admin access required to access and managed the Grafana resource.
58+
- or enable **Creator can admin (Preview)** as a temporary workaround. This option available in preview grants you the required permissions to access and manage the Grafana resource.
5959

60-
>[!NOTE]
61-
> The **Creator can admin (Preview)** feature can only be enabled when creating the workspace. It can be disabled from the **Configuration** menu if the workspace creator doesn't need this level of access anymore. Once disabled, it cannot be enabled again. If the access has been disabled and the user needs to access this Grafana instance again, consider [granting them another Grafana role](how-to-manage-access-permissions-users-identities.md).
60+
> [!NOTE]
61+
> The **Creator can admin (Preview)** feature can only be enabled when creating the workspace. It can be disabled from the **Configuration** menu if the workspace creator doesn't need this level of access anymore. Once disabled, it cannot be enabled again. If this option is disabled and the user needs to access this Grafana instance again, they will need to [a Grafana role](how-to-manage-access-permissions-users-identities.md).
6262

6363
1. Optionally select **Next : Tags** and add tags to categorize resources.
6464

6565
1. Select **Next : Review + create >**. After validation runs, select **Create**. Your Azure Managed Grafana resource is deploying.
6666

67-
## Access your Azure Managed Grafana instance
67+
## Access your Azure Managed Grafana workspace
6868

6969
1. Once the deployment is complete, select **Go to resource** to open your resource.
7070

71-
1. In the **Overview** tab's Essentials section, select the **Endpoint** URL. Single sign-on via Microsoft Entra ID has been configured for you automatically. If prompted, enter your Azure account.
71+
1. In the **Overview** tab's Essentials section, select the **Endpoint** URL. Single sign-on via Microsoft Entra ID has been configured for you automatically. If prompted, enter your Azure account.
7272

7373
:::image type="content" source="media/quickstart-portal/grafana-overview.png" alt-text="Screenshot of the Azure portal. Endpoint URL display.":::
7474

75+
You can now start interacting with the Grafana application to configure data sources, create dashboards, reports and alerts. Suggested read: [Monitor Azure services and applications using Grafana](/azure/azure-monitor/visualize/grafana-plugin).
76+
7577
:::image type="content" source="media/quickstart-portal/grafana-ui.png" alt-text="Screenshot of an Azure Managed Grafana workspace.":::
7678

77-
You can now start interacting with the Grafana application to configure data sources, create dashboards, reports and alerts. Suggested read: [Monitor Azure services and applications using Grafana](/azure/azure-monitor/visualize/grafana-plugin).
79+
> [!IMPORTANT]
80+
> The **Creator can admin (Preview)** option is designed to be used for testing purposes. Whenever possible, we recommend assgining a [Grafana role](how-to-manage-access-permissions-users-identities.md) to all team members who need to access the Grafana portal and disabling the **Creator can edit** option.
7881

7982
## Clean up resources
8083

@@ -84,7 +87,7 @@ In the preceding steps, you created an Azure Managed Grafana workspace in a new
8487
1. In the **Overview** page, make sure that the listed resources are the ones you want to delete.
8588
1. Select **Delete**, type the name of your resource group in the text box, and then select **Delete**.
8689

87-
## Next steps
90+
## Next step
8891

8992
> [!div class="nextstepaction"]
9093
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)

0 commit comments

Comments
 (0)