Skip to content

Commit f34e095

Browse files
authored
Merge pull request #208699 from maud-lv/release-ga-auth
Add set up authentication and permission article
2 parents 1e73b03 + 125ef43 commit f34e095

12 files changed

+217
-8
lines changed

articles/managed-grafana/how-to-authentication-permissions.md

Lines changed: 192 additions & 0 deletions
Large diffs are not rendered by default.

articles/managed-grafana/how-to-data-source-plugins-managed-identity.md

Lines changed: 19 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You can find all available Grafana data sources by going to your resource and se
5656
5757
For more information about data sources, go to [Data sources](https://grafana.com/docs/grafana/latest/datasources/) on the Grafana Labs website.
5858

59-
## Default configuration for Azure Monitor
59+
## Configuration for Azure Monitor
6060

6161
The Azure Monitor data source is automatically added to all new Managed Grafana resources. To review or modify its configuration, follow these steps in your Managed Grafana endpoint:
6262

@@ -65,16 +65,30 @@ The Azure Monitor data source is automatically added to all new Managed Grafana
6565
:::image type="content" source="media/data-sources/configuration.png" alt-text="Screenshot of the Add data sources page.":::
6666

6767
1. Azure Monitor is listed as a built-in data source for your Managed Grafana instance. Select **Azure Monitor**.
68-
1. In **Settings**, authenticate through **Managed Identity** and select your subscription from the dropdown list or enter your **App Registration** details
68+
1. In the **Settings** tab, authenticate through **Managed Identity** and select your subscription from the dropdown list or enter your **App Registration** details
6969

7070
:::image type="content" source="media/data-sources/configure-Azure-Monitor.png" alt-text="Screenshot of the Azure Monitor page in data sources.":::
7171

7272
Authentication and authorization are then made through the provided managed identity. With Managed Identity, you can assign permissions for your Managed Grafana instance to access Azure Monitor data without having to manually manage service principals in Azure Active Directory (Azure AD).
7373

74-
## Next steps
74+
## Configuration for Azure Data Explorer
7575

76-
> [!div class="nextstepaction"]
77-
> [Modify access permissions to Azure Monitor](./how-to-permissions.md)
76+
Azure Managed Grafana can also access data sources using a service principal set up in Azure Active Directory (Azure AD).
77+
78+
1. From the left menu, select **Configuration** > **Data sources**.
79+
80+
:::image type="content" source="media/data-sources/configuration.png" alt-text="Screenshot of the Add data sources page.":::
81+
82+
1. **Azure Data Explorer Datasource** is listed as a built-in data source for your Managed Grafana instance. Select this data source.
83+
1. In the **Settings** tab, fill out the form under **Connection Details**, and optionally also edit the **Query Optimizations**, **Database schema settings**, and **Tracking** sections.
84+
85+
:::image type="content" source="media/data-sources/data-explorer-connection-settings.jpg" alt-text="Screenshot of the Connection details section for Data Explorer in data sources.":::
86+
87+
To complete this process, you need to have an Azure AD service principal and connect Azure AD with an Azure Data Explorer User. For more information, go to [Configuring the datasource in Grafana](https://github.com/grafana/azure-data-explorer-datasource#configuring-the-datasource-in-grafana).
88+
89+
1. Select **Save & test** to validate the connection. "Success" is displayed on screen and confirms that Azure Managed Grafana is able to fetch the data source through the provided connection details, using the service principal in Azure AD.
90+
91+
## Next steps
7892

7993
> [!div class="nextstepaction"]
8094
> [Share an Azure Managed Grafana instance](./how-to-share-grafana-workspace.md)

articles/managed-grafana/how-to-permissions.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ By default, when a Grafana instance is created, Azure Managed Grafana grants it
1414

1515
This means that the new Grafana instance can access and search all monitoring data in the subscription, including viewing the Azure Monitor metrics and logs from all resources, and any logs stored in Log Analytics workspaces in the subscription.
1616

17-
In this article, you'll learn how to manually edit permissions for a specific resource.
17+
In this article, you'll learn how to manually grant permission for Azure Managed Grafana to access an Azure resource using a managed identity.
1818

1919
## Prerequisites
2020

@@ -59,4 +59,4 @@ For more information about how to use Managed Grafana with Azure Monitor, go to
5959
## Next steps
6060

6161
> [!div class="nextstepaction"]
62-
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)
62+
> [How to configure data sources for Azure Managed Grafana](./how-to-data-source-plugins-managed-identity.md)

articles/managed-grafana/index.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,6 @@ landingContent:
1919
links:
2020
- text: What is Azure Managed Grafana?
2121
url: overview.md
22-
2322
- title: Create an instance
2423
linkLists:
2524
- linkListType: get-started
@@ -40,6 +39,8 @@ landingContent:
4039
url: how-to-enable-zone-redundancy.md
4140
- text: Create and manage API keys
4241
url: how-to-create-api-keys.md
42+
- text: Set up authentication and permissions
43+
url: how-to-authentication-permissions.md
4344
- title: Manage Azure Managed Grafana
4445
linkLists:
4546
- linkListType: how-to-guide
62.6 KB
Loading
50.1 KB
Loading
60.1 KB
Loading
54.3 KB
Loading
117 KB
Loading
28 KB
Loading

0 commit comments

Comments
 (0)