You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Get started using Azure Managed Grafana by creating an Azure Managed Grafana workspace using the Azure CLI.
17
17
18
18
>[!NOTE]
19
-
> Azure Managed Grafana has [two pricing plans](overview.md#service-tiers). This guides takes you through creating a new workspace in the Standard plan. To generate a workspace in the Essential (preview) plan, [use the Azure portal](quickstart-managed-grafana-portal.md).
19
+
> Azure Managed Grafana has [two pricing plans](overview.md#service-tiers). This guides takes you through creating a new workspace in the Standard plan. To create a workspace in the Essential (preview) plan, [use the Azure portal](quickstart-managed-grafana-portal.md).
20
20
21
21
## Prerequisites
22
22
23
23
- An Azure account for work or school with an active subscription. [Create an account for free](https://azure.microsoft.com/free).
24
+
- Minimum required role to create a workspace: resource group Contributor.
25
+
- Minimum required role to access a workspace: resource group Owner.
24
26
25
-
- Minimum required role to create an instance: resource group Contributor.
26
-
27
-
- Minimum required role to access an instance: resource group Owner.
28
27
>[!NOTE]
29
-
> If you don't meet this requirement, once you've created a new Azure Managed Grafana instance, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role on the instance.
28
+
> If you don't meet this requirement:
29
+
> - once you've created a new Azure Managed Grafana workspace, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role
30
+
> - or consider creating the workspace using the **Creator can admin (Preview)** feature available from the Azure portal. [Refer to this quickstart for more information](quickstart-managed-grafana-portal.md).
Copy file name to clipboardExpand all lines: articles/managed-grafana/quickstart-managed-grafana-portal.md
+11-10Lines changed: 11 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ ms.service: azure-managed-grafana
7
7
ms.topic: quickstart
8
8
author: maud-lv
9
9
ms.author: malev
10
-
ms.date: 04/25/2024
10
+
ms.date: 02/19/2025
11
11
---
12
12
13
13
# Quickstart: Create an Azure Managed Grafana workspace using the Azure portal
@@ -17,10 +17,7 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
17
17
## Prerequisites
18
18
19
19
- An Azure account for work or school and an active subscription. [Create an account for free](https://azure.microsoft.com/free).
20
-
- Minimum required role to create an instance: resource group Contributor.
21
-
- Minimum required role to access an instance: resource group Owner.
22
-
>[!NOTE]
23
-
> If you don't meet this requirement, once you've created a new Azure Managed Grafana instance, ask a User Access Administrator, subscription Owner or resource group Owner to grant you a Grafana Admin, Grafana Editor or Grafana Viewer role on the instance.
20
+
- Minimum required role to create a workspace: resource group Contributor.
24
21
25
22
## Create an Azure Managed Grafana workspace
26
23
@@ -48,21 +45,25 @@ In this quickstart, you get started with Azure Managed Grafana by creating an Az
48
45
- If you've opted for the Standard plan, optionally enable the **Deterministic outbound IP** feature, which is set to **Disable** by default.
49
46
50
47
1. Select **Next : Permission >** to control access rights for your Grafana instance and data sources:
51
-
1. **System assigned managed identity** is set to **On**.
48
+
- **System assigned managed identity** is set to **On**.
52
49
53
50
>[!NOTE]
54
51
>You can use a user-assigned managed identity instead of the default system-assigned managed identity once the Azure Managed Grafana resource is deployed. To learn more, go to [Set up Azure Managed Grafana authentication and permissions (preview)](how-to-authentication-permissions.md).
55
52
56
-
1. The box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default.
53
+
- If you're a subscription Owner or a User Access Administrator:
54
+
- the box **Add role assignment to this identity with 'Monitoring Reader' role on target subscription** is checked by default. This role assignment allows Azure Managed Grafana to access and display monitoring data from various Azure services.
55
+
- the box **Include myself** under **Grafana administrator role** is checked. This option grants you the Grafana administrator role, and lets you manage access rights. Optionally select **Add** to share this right with team members.
56
+
- If you're not a subscription Owner or a User Access Administrator, you can either:
57
+
- ask a subscription Owner or a User Access Administrator to assign you the Grafana Admin role
58
+
- or enable **Creator can admin (Preview)**. This option available in preview grants you the Grafana admin access required to access and managed the Grafana resource.
57
59
58
-
1. The box **Include myself** under **Grafana administrator role** is checked. This option grants you the Grafana administrator role, and lets you manage access rights. You can give this right to more members by selecting **Add**. If this option grays out for you, ask someone with the Owner role on the subscription to assign you the Grafana Admin role.
60
+
>[!NOTE]
61
+
> The **Creator can admin (Preview)** feature can only be enabled when creating the workspace. It can be disabled from the **Configuration** menu if the workspace creator doesn't need this level of access anymore. Once disabled, it cannot be enabled again. If the access has been disabled and the user needs to access this Grafana instance again, consider [granting them another Grafana role](how-to-manage-access-permissions-users-identities.md).
59
62
60
63
1. Optionally select **Next : Tags** and add tags to categorize resources.
61
64
62
65
1. Select **Next : Review + create >**. After validation runs, select **Create**. Your Azure Managed Grafana resource is deploying.
63
66
64
-
:::image type="content" source="media/quickstart-portal/create-form-validation.png" alt-text="Screenshot of the Azure portal. Create workspace form. Validation.":::
65
-
66
67
## Access your Azure Managed Grafana instance
67
68
68
69
1. Once the deployment is complete, select **Go to resource** to open your resource.
0 commit comments