이 페이지에서는 시스템 모니터링 및 데이터 관측 가능성 대시보드에 액세스하는 방법을 설명합니다. 대시보드를 사용하면 측정항목, 로그, 트레이스를 쿼리하고 시각화하고 알림을 받을 수 있습니다.
플랫폼 관리자 (PA)의 운영 로그 및 측정항목 보기
데이터 관측 가능성을 위해 시스템 모니터링 인스턴스의 UI에서 로그와 측정항목을 로그인하고, 쿼리하고, 시각화하려면 조직 IAM 관리자에게 platform-obs 프로젝트에서 조직 Grafana 뷰어 (organization-grafana-viewer) 역할을 부여해 달라고 요청하세요. 조직 IAM 관리자는 조직 Grafana 뷰어 역할을 할당하고 삭제할 수 있습니다. 이 역할 기반 액세스 제어 프로세스를 사용하면 프로젝트의 시스템 모니터링 인스턴스 대시보드에서 데이터 시각화에 안전하게 액세스할 수 있습니다. 역할 할당에 대한 자세한 내용은 사전 정의된 역할 설명을 참고하세요.
데이터 관측 가능성을 위해 시스템 모니터링 인스턴스의 UI에서 로그와 측정항목을 로그인, 쿼리, 시각화하려면 프로젝트 IAM 관리자에게 프로젝트 네임스페이스에 대한 프로젝트 Grafana 뷰어 (project-grafana-viewer) 역할을 부여해 달라고 요청하세요. 프로젝트 IAM 관리자는 지정된 프로젝트 범위에서 프로젝트 Grafana 뷰어를 할당하고 삭제할 수 있습니다. 이 역할 기반 액세스 제어 프로세스를 사용하면 프로젝트의 시스템 모니터링 인스턴스 대시보드에서 데이터 시각화에 안전하게 액세스할 수 있습니다.
[[["이해하기 쉬움","easyToUnderstand","thumb-up"],["문제가 해결됨","solvedMyProblem","thumb-up"],["기타","otherUp","thumb-up"]],[["이해하기 어려움","hardToUnderstand","thumb-down"],["잘못된 정보 또는 샘플 코드","incorrectInformationOrSampleCode","thumb-down"],["필요한 정보/샘플이 없음","missingTheInformationSamplesINeed","thumb-down"],["번역 문제","translationIssue","thumb-down"],["기타","otherDown","thumb-down"]],["최종 업데이트: 2025-09-04(UTC)"],[[["\u003cp\u003eThis page provides instructions on how to access system monitoring and data observability dashboards to query, visualize, and receive alerts on metrics, logs, and traces.\u003c/p\u003e\n"],["\u003cp\u003ePlatform Admins (PA) can access operational logs and metrics by requesting the \u003ccode\u003eorganization-grafana-viewer\u003c/code\u003e role from their Organization IAM Admin in the \u003ccode\u003eplatform-obs\u003c/code\u003e project.\u003c/p\u003e\n"],["\u003cp\u003eApplication Operators (AO) can view project logs and metrics by having their Project IAM Admin grant them the \u003ccode\u003eproject-grafana-viewer\u003c/code\u003e role in their project namespace.\u003c/p\u003e\n"],["\u003cp\u003eAccess to dashboards is managed through role-based access control, and it can be granted via \u003ccode\u003ekubectl\u003c/code\u003e commands, or through the GDC console.\u003c/p\u003e\n"],["\u003cp\u003eBoth roles (\u003ccode\u003eorganization-grafana-viewer\u003c/code\u003e and \u003ccode\u003eproject-grafana-viewer\u003c/code\u003e) enable users to sign in, query, and visualize logs and metrics safely on the UI of the system monitoring instance.\u003c/p\u003e\n"]]],[],null,["# Get access to dashboards\n\nThis page helps you access dashboards for system monitoring and data observability. Dashboards let you query, visualize, and receive alerts on your metrics, logs, and traces.\n\nView operational logs and metrics for Platform Admins (PA)\n----------------------------------------------------------\n\nTo sign in, query, and visualize logs and metrics on the UI of the system monitoring instance for data observability, ask your Organization IAM Admin to grant you the Organization Grafana Viewer (`organization-grafana-viewer`) role in the `platform-obs` project. The\nOrganization IAM Admin can assign and remove the Organization Grafana Viewer role. This role-based access control process lets you access data visualizations safely on dashboards of the system monitoring instance of your project. For more information about role assignments, see [Predefined role descriptions](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/role-descriptions).\n\nThe Organization IAM Admin can grant you access by creating a role binding: \n\n kubectl --kubeconfig \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e create rolebinding pa-grafana-viewer-binding -n platform-obs --user=\u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e --clusterrole=organization-grafana-viewer\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e: The path of the kubeconfig file for the admin cluster.\n- \u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e: The account name of the user that requires the role binding.\n\nFor information about setting role bindings from the GDC console, see\n[Grant access to resources](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/set-up-role-bindings#set-up-role-bindings).\n\nView project logs and metrics for Application Operators (AO)\n------------------------------------------------------------\n\nTo sign in, query, and visualize logs and metrics on the UI of the system monitoring instance for data observability, ask your Project IAM Admin to grant you the Project Grafana Viewer (`project-grafana-viewer`) role in your project namespace. The Project IAM Admin can assign and remove the Project Grafana Viewer in the scope of a specified project. This role-based access control process lets you access data visualizations safely on dashboards of the system monitoring instance of your project.\n\nThe Project IAM Admin can grant you access by creating a role binding: \n\n kubectl --kubeconfig \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e create rolebinding project-grafana-viewer-binding -n \u003cvar translate=\"no\"\u003ePROJECT_NAMESPACE\u003c/var\u003e --user=\u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e --role=project-grafana-viewer\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e: The path of the kubeconfig file for the admin cluster.\n- \u003cvar translate=\"no\"\u003ePROJECT_NAMESPACE\u003c/var\u003e: The namespace of your project.\n- \u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e: The account name of the user that requires the role binding."]]