Tetap teratur dengan koleksi
Simpan dan kategorikan konten berdasarkan preferensi Anda.
Halaman ini membantu Anda mengakses dasbor untuk pemantauan sistem dan kemampuan observasi data. Dasbor memungkinkan Anda membuat kueri, memvisualisasikan, dan menerima pemberitahuan tentang metrik, log, dan rekaman aktivitas.
Melihat log dan metrik operasional untuk Admin Platform (PA)
Untuk login, membuat kueri, dan memvisualisasikan log dan metrik di UI instance pemantauan sistem untuk kemampuan pengamatan data, minta Admin IAM Organisasi Anda untuk memberi Anda peran Pelihat Grafana Organisasi (organization-grafana-viewer) di project platform-obs. Admin IAM Organisasi dapat menetapkan dan menghapus peran Pelihat Grafana Organisasi. Proses kontrol akses berbasis peran ini memungkinkan Anda mengakses visualisasi data dengan aman di dasbor instance pemantauan sistem project Anda. Untuk mengetahui informasi selengkapnya tentang penetapan peran, lihat Deskripsi peran bawaan.
Admin IAM Organisasi dapat memberi Anda akses dengan membuat binding peran:
ADMIN_KUBECONFIG: Jalur file kubeconfig untuk cluster admin.
USER_NAME: Nama akun pengguna yang memerlukan binding peran.
Untuk mengetahui informasi tentang cara menyetel binding peran dari konsol GDC, lihat
Memberikan akses ke resource.
Melihat log dan metrik project untuk Operator Aplikasi (AO)
Untuk login, membuat kueri, dan memvisualisasikan log dan metrik di UI instance pemantauan sistem untuk kemampuan pengamatan data, minta Admin IAM Project Anda untuk memberi Anda peran Project Grafana Viewer (project-grafana-viewer) di namespace project Anda. Admin IAM Project dapat menetapkan dan menghapus Project Grafana Viewer dalam cakupan project tertentu. Proses kontrol akses berbasis peran ini memungkinkan Anda mengakses visualisasi data dengan aman di dasbor instance pemantauan sistem project Anda.
Admin IAM Project dapat memberi Anda akses dengan membuat binding peran:
[[["Mudah dipahami","easyToUnderstand","thumb-up"],["Memecahkan masalah saya","solvedMyProblem","thumb-up"],["Lainnya","otherUp","thumb-up"]],[["Sulit dipahami","hardToUnderstand","thumb-down"],["Informasi atau kode contoh salah","incorrectInformationOrSampleCode","thumb-down"],["Informasi/contoh yang saya butuhkan tidak ada","missingTheInformationSamplesINeed","thumb-down"],["Masalah terjemahan","translationIssue","thumb-down"],["Lainnya","otherDown","thumb-down"]],["Terakhir diperbarui pada 2025-09-04 UTC."],[[["\u003cp\u003eThis page provides instructions on how to access system monitoring and data observability dashboards to query, visualize, and receive alerts on metrics, logs, and traces.\u003c/p\u003e\n"],["\u003cp\u003ePlatform Admins (PA) can access operational logs and metrics by requesting the \u003ccode\u003eorganization-grafana-viewer\u003c/code\u003e role from their Organization IAM Admin in the \u003ccode\u003eplatform-obs\u003c/code\u003e project.\u003c/p\u003e\n"],["\u003cp\u003eApplication Operators (AO) can view project logs and metrics by having their Project IAM Admin grant them the \u003ccode\u003eproject-grafana-viewer\u003c/code\u003e role in their project namespace.\u003c/p\u003e\n"],["\u003cp\u003eAccess to dashboards is managed through role-based access control, and it can be granted via \u003ccode\u003ekubectl\u003c/code\u003e commands, or through the GDC console.\u003c/p\u003e\n"],["\u003cp\u003eBoth roles (\u003ccode\u003eorganization-grafana-viewer\u003c/code\u003e and \u003ccode\u003eproject-grafana-viewer\u003c/code\u003e) enable users to sign in, query, and visualize logs and metrics safely on the UI of the system monitoring instance.\u003c/p\u003e\n"]]],[],null,["# Get access to dashboards\n\nThis page helps you access dashboards for system monitoring and data observability. Dashboards let you query, visualize, and receive alerts on your metrics, logs, and traces.\n\nView operational logs and metrics for Platform Admins (PA)\n----------------------------------------------------------\n\nTo sign in, query, and visualize logs and metrics on the UI of the system monitoring instance for data observability, ask your Organization IAM Admin to grant you the Organization Grafana Viewer (`organization-grafana-viewer`) role in the `platform-obs` project. The\nOrganization IAM Admin can assign and remove the Organization Grafana Viewer role. This role-based access control process lets you access data visualizations safely on dashboards of the system monitoring instance of your project. For more information about role assignments, see [Predefined role descriptions](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/role-descriptions).\n\nThe Organization IAM Admin can grant you access by creating a role binding: \n\n kubectl --kubeconfig \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e create rolebinding pa-grafana-viewer-binding -n platform-obs --user=\u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e --clusterrole=organization-grafana-viewer\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e: The path of the kubeconfig file for the admin cluster.\n- \u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e: The account name of the user that requires the role binding.\n\nFor information about setting role bindings from the GDC console, see\n[Grant access to resources](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/set-up-role-bindings#set-up-role-bindings).\n\nView project logs and metrics for Application Operators (AO)\n------------------------------------------------------------\n\nTo sign in, query, and visualize logs and metrics on the UI of the system monitoring instance for data observability, ask your Project IAM Admin to grant you the Project Grafana Viewer (`project-grafana-viewer`) role in your project namespace. The Project IAM Admin can assign and remove the Project Grafana Viewer in the scope of a specified project. This role-based access control process lets you access data visualizations safely on dashboards of the system monitoring instance of your project.\n\nThe Project IAM Admin can grant you access by creating a role binding: \n\n kubectl --kubeconfig \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e create rolebinding project-grafana-viewer-binding -n \u003cvar translate=\"no\"\u003ePROJECT_NAMESPACE\u003c/var\u003e --user=\u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e --role=project-grafana-viewer\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e: The path of the kubeconfig file for the admin cluster.\n- \u003cvar translate=\"no\"\u003ePROJECT_NAMESPACE\u003c/var\u003e: The namespace of your project.\n- \u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e: The account name of the user that requires the role binding."]]