[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-04。"],[[["\u003cp\u003eThis page provides instructions on how to access system monitoring and data observability dashboards to query, visualize, and receive alerts on metrics, logs, and traces.\u003c/p\u003e\n"],["\u003cp\u003ePlatform Admins (PA) can access operational logs and metrics by requesting the \u003ccode\u003eorganization-grafana-viewer\u003c/code\u003e role from their Organization IAM Admin in the \u003ccode\u003eplatform-obs\u003c/code\u003e project.\u003c/p\u003e\n"],["\u003cp\u003eApplication Operators (AO) can view project logs and metrics by having their Project IAM Admin grant them the \u003ccode\u003eproject-grafana-viewer\u003c/code\u003e role in their project namespace.\u003c/p\u003e\n"],["\u003cp\u003eAccess to dashboards is managed through role-based access control, and it can be granted via \u003ccode\u003ekubectl\u003c/code\u003e commands, or through the GDC console.\u003c/p\u003e\n"],["\u003cp\u003eBoth roles (\u003ccode\u003eorganization-grafana-viewer\u003c/code\u003e and \u003ccode\u003eproject-grafana-viewer\u003c/code\u003e) enable users to sign in, query, and visualize logs and metrics safely on the UI of the system monitoring instance.\u003c/p\u003e\n"]]],[],null,["# Get access to dashboards\n\nThis page helps you access dashboards for system monitoring and data observability. Dashboards let you query, visualize, and receive alerts on your metrics, logs, and traces.\n\nView operational logs and metrics for Platform Admins (PA)\n----------------------------------------------------------\n\nTo sign in, query, and visualize logs and metrics on the UI of the system monitoring instance for data observability, ask your Organization IAM Admin to grant you the Organization Grafana Viewer (`organization-grafana-viewer`) role in the `platform-obs` project. The\nOrganization IAM Admin can assign and remove the Organization Grafana Viewer role. This role-based access control process lets you access data visualizations safely on dashboards of the system monitoring instance of your project. For more information about role assignments, see [Predefined role descriptions](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/role-descriptions).\n\nThe Organization IAM Admin can grant you access by creating a role binding: \n\n kubectl --kubeconfig \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e create rolebinding pa-grafana-viewer-binding -n platform-obs --user=\u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e --clusterrole=organization-grafana-viewer\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e: The path of the kubeconfig file for the admin cluster.\n- \u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e: The account name of the user that requires the role binding.\n\nFor information about setting role bindings from the GDC console, see\n[Grant access to resources](/distributed-cloud/hosted/docs/latest/appliance/platform/pa-user/iam/set-up-role-bindings#set-up-role-bindings).\n\nView project logs and metrics for Application Operators (AO)\n------------------------------------------------------------\n\nTo sign in, query, and visualize logs and metrics on the UI of the system monitoring instance for data observability, ask your Project IAM Admin to grant you the Project Grafana Viewer (`project-grafana-viewer`) role in your project namespace. The Project IAM Admin can assign and remove the Project Grafana Viewer in the scope of a specified project. This role-based access control process lets you access data visualizations safely on dashboards of the system monitoring instance of your project.\n\nThe Project IAM Admin can grant you access by creating a role binding: \n\n kubectl --kubeconfig \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e create rolebinding project-grafana-viewer-binding -n \u003cvar translate=\"no\"\u003ePROJECT_NAMESPACE\u003c/var\u003e --user=\u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e --role=project-grafana-viewer\n\nReplace the following:\n\n- \u003cvar translate=\"no\"\u003eADMIN_KUBECONFIG\u003c/var\u003e: The path of the kubeconfig file for the admin cluster.\n- \u003cvar translate=\"no\"\u003ePROJECT_NAMESPACE\u003c/var\u003e: The namespace of your project.\n- \u003cvar translate=\"no\"\u003eUSER_NAME\u003c/var\u003e: The account name of the user that requires the role binding."]]