However, if your Grafana instance is not hosted on Azure or does not have managed identity enabled, you will need to use App Registration with an Azure service principal to setup authentication. If you are hosting Grafana on your own Azure VM or Azure App Service with managed identity enabled, you may use this approach for authentication. Pick a name for the data source and choose between Managed Identity or App Registration for authentication.
Select Add data source, filter by name Azure and select the Azure Monitor data source. If you are using an instance that is not Azure Managed Grafana, you have to setup an Azure Monitor datasource. You can expand the resources that can be viewed by your Azure Managed Grafana workspace by configuring additional permissions to assign the included Managed Identity the Monitoring reader role on other subscriptions or resources. By default, the plugin is pre-configured with a Managed Identity that can query and visualize monitoring data from all resources in the subscription in which the Grafana workspace was deployed. Log in to Grafana using the endpoint URL of your Azure Managed Grafana workspace or your server's IP address.Ĭonfigure Azure Monitor data source pluginĪzure Managed Grafana includes an Azure Monitor datasource plugin.The Internet Explorer browser and older Microsoft Edge browsers are not compatible with Grafana, you must use a chromium-based browser including Microsoft Edge.
#Grafana annotations install#
To set up a local Grafana server, download and install Grafana in your local environment. Use this quickstart guide to create an Azure Managed Grafana workspace using the Azure portal.