Grafana is a component in StreamNative Platform. It provides observability for StreamNative Platform. Grafana provides dashboards including brokers, bookies, zookeeper, proxy, topic, messages, and so on.
By default, Grafana is enabled with StreamNative Platform. To disable it, you can set monitoring.grafana: false
in the values.yaml
YAML file.
You can configure the requested and limited CPU and memory resources for the Grafana service in the values.yaml
YAML file. Then, you can use the helm upgrade
command to restart the StreamNative Platform to make updates effective. For more information about CPU and memory resources, see CPU and memory resources.
StreamNative Platform supports exposing the Grafana service using the LoadBalancer, NodePort, or Istio.
To expose the Grafana service using the LoadBalancer or NodePort, follow these steps.
Enable Grafana and configure the external domain in the values.yaml
YAML file.
In Nginx Ingress mode, if ingress.control_center.tls.enabled
is set to false
(default setting), external_domain_scheme
should be http://
. Otherwise, it should be https://
.
Execute the following command to get the external IP address of the Grafana service.
Visit http://EXTERNAL_IP/grafana
in your browser and then you can log in to Grafana.
To expose the Grafana service using the LoadBalancer or NodePort, follow these steps.
Enable Grafana and configure the external domain in the values.yaml
YAML file.
In Nginx Ingress mode, if ingress.control_center.tls.enabled
is set to false
(default setting), external_domain_scheme
should be http://
. Otherwise, it should be https://
.
Execute the following command to get the external IP address of the Grafana service.
Visit http://EXTERNAL_IP/grafana
in your browser and then you can log in to Grafana.
When Istio is enabled, you can expose the Grafana service using Istio. For details about how to expose the Grafana service using Istio, see access Grafana.
After getting the external IP address of the Grafana service, you can access it using one of the following methods.
Basic authentication is enabled by default and works with the built-in Grafana user-password authentication system.
To access the Grafana service by using the username and password, you can specify the user
and password
properties for the Grafana service in the values.yaml
YAML file as follows. By default, both the username and password are pulsar
.
Make sure to change the password after you log in to the Grafana Dashboard.
The Azure AD authentication allows you to use an Azure Active Directory (Azure AD) tenant as an identity provider for Grafana. You can use Azure AD Application Roles to assign users and groups to Grafana roles from the Azure Portal.
To enable Azure AD OAuth2 authentication for Grafana, follow these steps.
Create an Azure AD OAuth client ID and an Azure AD OAuth client Secret. For details, see Create the Azure AD application.
Enable Azure AD OAuth2 authentication by setting the grafana.azureAuthEnabled
to true
and providing the Azure AD OAuth client ID and the Azure AD OAuth client Secret in the values.yaml
YAML file as follows.
Execute the helm upgrade
command to update the resource
Grafana is a component in StreamNative Platform. It provides observability for StreamNative Platform. Grafana provides dashboards including brokers, bookies, zookeeper, proxy, topic, messages, and so on.
By default, Grafana is enabled with StreamNative Platform. To disable it, you can set monitoring.grafana: false
in the values.yaml
YAML file.
You can configure the requested and limited CPU and memory resources for the Grafana service in the values.yaml
YAML file. Then, you can use the helm upgrade
command to restart the StreamNative Platform to make updates effective. For more information about CPU and memory resources, see CPU and memory resources.
StreamNative Platform supports exposing the Grafana service using the LoadBalancer, NodePort, or Istio.
To expose the Grafana service using the LoadBalancer or NodePort, follow these steps.
Enable Grafana and configure the external domain in the values.yaml
YAML file.
In Nginx Ingress mode, if ingress.control_center.tls.enabled
is set to false
(default setting), external_domain_scheme
should be http://
. Otherwise, it should be https://
.
Execute the following command to get the external IP address of the Grafana service.
Visit http://EXTERNAL_IP/grafana
in your browser and then you can log in to Grafana.
To expose the Grafana service using the LoadBalancer or NodePort, follow these steps.
Enable Grafana and configure the external domain in the values.yaml
YAML file.
In Nginx Ingress mode, if ingress.control_center.tls.enabled
is set to false
(default setting), external_domain_scheme
should be http://
. Otherwise, it should be https://
.
Execute the following command to get the external IP address of the Grafana service.
Visit http://EXTERNAL_IP/grafana
in your browser and then you can log in to Grafana.
When Istio is enabled, you can expose the Grafana service using Istio. For details about how to expose the Grafana service using Istio, see access Grafana.
After getting the external IP address of the Grafana service, you can access it using one of the following methods.
Basic authentication is enabled by default and works with the built-in Grafana user-password authentication system.
To access the Grafana service by using the username and password, you can specify the user
and password
properties for the Grafana service in the values.yaml
YAML file as follows. By default, both the username and password are pulsar
.
Make sure to change the password after you log in to the Grafana Dashboard.
The Azure AD authentication allows you to use an Azure Active Directory (Azure AD) tenant as an identity provider for Grafana. You can use Azure AD Application Roles to assign users and groups to Grafana roles from the Azure Portal.
To enable Azure AD OAuth2 authentication for Grafana, follow these steps.
Create an Azure AD OAuth client ID and an Azure AD OAuth client Secret. For details, see Create the Azure AD application.
Enable Azure AD OAuth2 authentication by setting the grafana.azureAuthEnabled
to true
and providing the Azure AD OAuth client ID and the Azure AD OAuth client Secret in the values.yaml
YAML file as follows.
Execute the helm upgrade
command to update the resource