Docs: Refactor data sources content (#57573)
* Docs: Revise data source index * Docs: Consolidate data source administration docs * Docs: Revise panels docs related to data sources * Docs: Revise Alertmanager data source * Docs: Reorganize AWS CloudWatch data source docs * Docs: Reorganize Azure Monitor data source docs * Docs: Move azuremonitor to azure-monitor * Docs: Revise Elasticsearch docs * Docs: Move Elasticsearch index into bundle * Docs: Revise GCM docs * Docs: Revise Graphite docs * Docs: Move Graphite index into bundle * Docs: Revise InfluxDB docs * Docs: Revise Jaeger docs * Docs: Move Jaeger index into bundle * Docs: Revise Loki docs * Docs: Move Loki index into bundle * Docs: Revise MS SQL docs * Docs: Move MS SQL index into bundle * Docs: Revise Prometheus docs * Docs: Move Prometheus index into bundle * Docs: Revise Tempo docs * Docs: Move Tempo index into bundle * Docs: Revise TestData DB docs * Docs: Move TestData DB index into bundle * Docs: Revise Zipkin docs * Docs: Move Zipkin index into bundle * Docs: Move other data sources' index pages into bundles * Docs: Revise frontmatter * Fixing hugo markdown errors * Docs: Add query editor and template var sections to overview doc * Docs: Remove CTAs across data source docs * Docs: Remove CTA * Docs: Remove CTA * Docs: Fix links, images, typos, and usage consistency. * Docs: Fix typos * Docs: Fix CI issues * Update docs/sources/datasources/_index.md Co-authored-by: Torkel Ödegaard <torkel@grafana.com> * Update docs/sources/datasources/_index.md Co-authored-by: Torkel Ödegaard <torkel@grafana.com> * Docs: Fix query editor links * Update docs/sources/panels-visualizations/_index.md Co-authored-by: Torkel Ödegaard <torkel@grafana.com> * Update docs/sources/panels-visualizations/_index.md Co-authored-by: Torkel Ödegaard <torkel@grafana.com> * Docs: Rebundle child pages per writers' toolkit * Docs: Fix prettier for CI * Docs: Fix relrefs from outside data sources docs * Docs: Fix broken relrefs within datasources * Docs: Fix relrefs to data sources docs * Fixed some more refs Co-authored-by: Torkel Ödegaard <torkel@grafana.com>
This commit is contained in:
committed by
GitHub
parent
22648d8581
commit
852d069a3c
@@ -0,0 +1,53 @@
|
||||
---
|
||||
aliases:
|
||||
- /docs/grafana/latest/datasources/google-cloud-monitoring/google-authentication/
|
||||
- /docs/grafana/next/datasources/cloudmonitoring/
|
||||
description: Google authentication
|
||||
keywords:
|
||||
- grafana
|
||||
- google
|
||||
- authentication
|
||||
title: Authentication
|
||||
weight: 5
|
||||
---
|
||||
|
||||
# Configure Google authentication
|
||||
|
||||
Requests from a Grafana plugin to Google are made on behalf of an Identity and Access Management (IAM) role or IAM user.
|
||||
The IAM user or IAM role must have the associated policies to perform certain API actions.
|
||||
Since these policies are specific to each data source, refer to the data source documentation for details.
|
||||
|
||||
All requests to Google APIs are performed on the server-side by the Grafana backend.
|
||||
You can authenticate a Grafana plugin to Google by uploading a Google JSON Web Token (JWT) file, or by automatically retrieving credentials from the Google metadata server.
|
||||
The latter option is available only when running Grafana on a GCE virtual machine.
|
||||
|
||||
## Use a Google Service Account key file
|
||||
|
||||
To authenticate the Grafana plugin with the Google API, create a Google Cloud Platform (GCP) Service Account for the Project you want to show data.
|
||||
|
||||
Each Grafana data source integrates with one GCP Project.
|
||||
To visualize data from multiple GCP Projects, create one data source per GCP Project.
|
||||
|
||||
### Create a GCP Service Account and key file
|
||||
|
||||
1. Navigate to the [APIs and Services Credentials page](https://console.cloud.google.com/apis/credentials).
|
||||
1. Click on the **Create credentials** dropdown and select the **Service account** option.
|
||||
1. In **Service account name**, enter a name for the account.
|
||||
1. From the **Role** dropdown, choose the roles required by the specific plugin.
|
||||
1. Click **Done**.
|
||||
1. Use the newly created account to [create a service account key](https://cloud.google.com/iam/docs/creating-managing-service-account-keys#iam-service-account-keys-create-console).
|
||||
A JSON key file is created and downloaded to your computer.
|
||||
1. Store the key file in a secure place, because it grants access to your Google data.
|
||||
1. In the Grafana data source configuration page, upload the key file.
|
||||
The file's contents are encrypted and saved in the Grafana database.
|
||||
Remember to save the file after uploading.
|
||||
|
||||
## Configure a GCE Default Service Account
|
||||
|
||||
When Grafana is running on a Google Compute Engine (GCE) virtual machine, Grafana can automatically retrieve default credentials from the metadata server. As a result, there is no need to generate a private key file for the service account. You also do not need to upload the file to Grafana. The following preconditions must be met before Grafana can retrieve default credentials.
|
||||
|
||||
- You must create a Service Account for use by the GCE virtual machine. For more information, refer to [Create new service account](https://cloud.google.com/compute/docs/access/create-enable-service-accounts-for-instances#createanewserviceaccount).
|
||||
- Verify that the GCE virtual machine instance is running as the service account that you created. For more information, refer to [setting up an instance to run as a service account](https://cloud.google.com/compute/docs/access/create-enable-service-accounts-for-instances#using).
|
||||
- Allow access to the specified API scope.
|
||||
|
||||
For more information about creating and enabling service accounts for GCE instances, refer to [enabling service accounts for instances in Google documentation](https://cloud.google.com/compute/docs/access/create-enable-service-accounts-for-instances).
|
||||
Reference in New Issue
Block a user