Skip to content

Commit d747259

Browse files
committed
Add Data Explorer connection details
1 parent 8ecb194 commit d747259

File tree

5 files changed

+36
-8
lines changed

5 files changed

+36
-8
lines changed

articles/managed-grafana/how-to-authentication-permissions.md

Lines changed: 16 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ This command will prompt your web browser to launch and load an Azure sign-in pa
3636

3737
---
3838

39-
## Create a workspace and set up authentication and permissions
39+
## Set up authentication and permissions during the creation of the instance
4040

4141
Create a workspace with the Azure portal or the CLI.
4242

@@ -104,7 +104,7 @@ System-assigned managed identity is the default authentication method provided t
104104

105105
:::image type="content" source="media/authentication/create-form-validation.png" alt-text="Screenshot of the Azure portal. Create workspace form. Validation.":::
106106

107-
### [Azure CLI](#tab/azure-cli)
107+
### [Azure CLI](#tab/azure-cli)
108108

109109
Run the [az group create](/cli/azure/group#az-group-create) command below to create a resource group to organize the Azure resources needed. Skip this step if you already have a resource group you want to use.
110110

@@ -172,6 +172,20 @@ Once the deployment is complete, you'll see a note in the output of the command
172172

173173
---
174174

175+
## Update authentication and permissions
176+
177+
After your workspace has been created, you can still turn on or turn off system-assigned managed identity and update Azure role assignments for Azure Managed Grafana.
178+
179+
1. In the Azure portal, from the left menu, under **Settings**, select **Identity**.
180+
1. Set the status for System assigned to **Off**, to deactivate the system assigned managed identity, or set it to **On** to activate this authentication method.
181+
1. Under permissions, select **Azure role assignments** to set Azure roles.
182+
1. When done, select **Save**
183+
184+
:::image type="content" source="media/authentication/update-identity.png" alt-text="Screenshot of the Azure portal. Updating the system-assigned managed identity. Basics.":::
185+
186+
> [!NOTE]
187+
> Disabling a system-assigned managed identity is irreversible. If you re-enable the identity in the future, Azure will create a new identity.
188+
175189
## Next steps
176190

177191
> [!div class="nextstepaction"]

articles/managed-grafana/how-to-data-source-plugins-managed-identity.md

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can find all available Grafana data sources by going to your resource and se
5656
5757
For more information about data sources, go to [Data sources](https://grafana.com/docs/grafana/latest/datasources/) on the Grafana Labs website.
5858

59-
## Default configuration for Azure Monitor
59+
## Configuration for Azure Monitor
6060

6161
The Azure Monitor data source is automatically added to all new Managed Grafana resources. To review or modify its configuration, follow these steps in your Managed Grafana endpoint:
6262

@@ -65,16 +65,30 @@ The Azure Monitor data source is automatically added to all new Managed Grafana
6565
:::image type="content" source="media/data-sources/configuration.png" alt-text="Screenshot of the Add data sources page.":::
6666

6767
1. Azure Monitor is listed as a built-in data source for your Managed Grafana instance. Select **Azure Monitor**.
68-
1. In **Settings**, authenticate through **Managed Identity** and select your subscription from the dropdown list or enter your **App Registration** details
68+
1. In the **Settings** tab, authenticate through **Managed Identity** and select your subscription from the dropdown list or enter your **App Registration** details
6969

7070
:::image type="content" source="media/data-sources/configure-Azure-Monitor.png" alt-text="Screenshot of the Azure Monitor page in data sources.":::
7171

7272
Authentication and authorization are then made through the provided managed identity. With Managed Identity, you can assign permissions for your Managed Grafana instance to access Azure Monitor data without having to manually manage service principals in Azure Active Directory (Azure AD).
7373

74-
## Next steps
74+
## Configuration for Azure Data Explorer
7575

76-
> [!div class="nextstepaction"]
77-
> [Modify access permissions to Azure Monitor](./how-to-permissions.md)
76+
Azure Managed Grafana can also access data sources using a service principal set up in Azure Active Directory (Azure AD).
77+
78+
1. From the left menu, select **Configuration** > **Data sources**.
79+
80+
:::image type="content" source="media/data-sources/configuration.png" alt-text="Screenshot of the Add data sources page.":::
81+
82+
1. **Azure Data Explorer Datasource** is listed as a built-in data source for your Managed Grafana instance. Select this data source.
83+
1. In the **Settings** tab, fill out the form under **Connection Details**, and optionally also edit the **Query Optimizations**, **Database schema settings**, and **Tracking** sections.
84+
85+
:::image type="content" source="media/data-sources/data-explorer-connection-settings.jpg" alt-text="Screenshot of the Connection details section for Data Explorer in data sources.":::
86+
87+
To complete this process, you need to have an Azure AD service principal and connect Azure AD with an Azure Data Explorer User. For more information, go to [Configuring the datasource in Grafana](https://github.com/grafana/azure-data-explorer-datasource#configuring-the-datasource-in-grafana).
88+
89+
1. Select **Save & test** to validate the connection. "Success" is displayed on screen and confirms that Azure Managed Grafana is able to fetch the data source through the provided connection details, using the service principal in Azure AD.
90+
91+
## Next steps
7892

7993
> [!div class="nextstepaction"]
8094
> [Share an Azure Managed Grafana instance](./how-to-share-grafana-workspace.md)

articles/managed-grafana/how-to-permissions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -59,4 +59,4 @@ For more information about how to use Managed Grafana with Azure Monitor, go to
5959
## Next steps
6060

6161
> [!div class="nextstepaction"]
62-
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)
62+
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)
117 KB
Loading
28 KB
Loading

0 commit comments

Comments
 (0)