You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-data-source-plugins-managed-identity.md
+19-5Lines changed: 19 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -56,7 +56,7 @@ You can find all available Grafana data sources by going to your resource and se
56
56
57
57
For more information about data sources, go to [Data sources](https://grafana.com/docs/grafana/latest/datasources/) on the Grafana Labs website.
58
58
59
-
## Default configuration for Azure Monitor
59
+
## Configuration for Azure Monitor
60
60
61
61
The Azure Monitor data source is automatically added to all new Managed Grafana resources. To review or modify its configuration, follow these steps in your Managed Grafana endpoint:
62
62
@@ -65,16 +65,30 @@ The Azure Monitor data source is automatically added to all new Managed Grafana
65
65
:::image type="content" source="media/data-sources/configuration.png" alt-text="Screenshot of the Add data sources page.":::
66
66
67
67
1. Azure Monitor is listed as a built-in data source for your Managed Grafana instance. Select **Azure Monitor**.
68
-
1. In **Settings**, authenticate through **Managed Identity** and select your subscription from the dropdown list or enter your **App Registration** details
68
+
1. In the **Settings** tab, authenticate through **Managed Identity** and select your subscription from the dropdown list or enter your **App Registration** details
69
69
70
70
:::image type="content" source="media/data-sources/configure-Azure-Monitor.png" alt-text="Screenshot of the Azure Monitor page in data sources.":::
71
71
72
72
Authentication and authorization are then made through the provided managed identity. With Managed Identity, you can assign permissions for your Managed Grafana instance to access Azure Monitor data without having to manually manage service principals in Azure Active Directory (Azure AD).
73
73
74
-
## Next steps
74
+
## Configuration for Azure Data Explorer
75
75
76
-
> [!div class="nextstepaction"]
77
-
> [Modify access permissions to Azure Monitor](./how-to-permissions.md)
76
+
Azure Managed Grafana can also access data sources using a service principal set up in Azure Active Directory (Azure AD).
77
+
78
+
1. From the left menu, select **Configuration** > **Data sources**.
79
+
80
+
:::image type="content" source="media/data-sources/configuration.png" alt-text="Screenshot of the Add data sources page.":::
81
+
82
+
1.**Azure Data Explorer Datasource** is listed as a built-in data source for your Managed Grafana instance. Select this data source.
83
+
1. In the **Settings** tab, fill out the form under **Connection Details**, and optionally also edit the **Query Optimizations**, **Database schema settings**, and **Tracking** sections.
84
+
85
+
:::image type="content" source="media/data-sources/data-explorer-connection-settings.jpg" alt-text="Screenshot of the Connection details section for Data Explorer in data sources.":::
86
+
87
+
To complete this process, you need to have an Azure AD service principal and connect Azure AD with an Azure Data Explorer User. For more information, go to [Configuring the datasource in Grafana](https://github.com/grafana/azure-data-explorer-datasource#configuring-the-datasource-in-grafana).
88
+
89
+
1. Select **Save & test** to validate the connection. "Success" is displayed on screen and confirms that Azure Managed Grafana is able to fetch the data source through the provided connection details, using the service principal in Azure AD.
90
+
91
+
## Next steps
78
92
79
93
> [!div class="nextstepaction"]
80
94
> [Share an Azure Managed Grafana instance](./how-to-share-grafana-workspace.md)
Copy file name to clipboardExpand all lines: articles/managed-grafana/how-to-permissions.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ By default, when a Grafana instance is created, Azure Managed Grafana grants it
14
14
15
15
This means that the new Grafana instance can access and search all monitoring data in the subscription, including viewing the Azure Monitor metrics and logs from all resources, and any logs stored in Log Analytics workspaces in the subscription.
16
16
17
-
In this article, you'll learn how to manually edit permissions for a specific resource.
17
+
In this article, you'll learn how to manually grant permission for Azure Managed Grafana to access an Azure resource using a managed identity.
18
18
19
19
## Prerequisites
20
20
@@ -59,4 +59,4 @@ For more information about how to use Managed Grafana with Azure Monitor, go to
59
59
## Next steps
60
60
61
61
> [!div class="nextstepaction"]
62
-
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)
62
+
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)
0 commit comments