Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Note for single account deployments: AWS Managed Grafana requires either AWS SSO or a SAML provider to sign in. If you're not using an AWS Organization with SSO enabled, you'll need a SAML provider to continue.

AWS Managed Prometheus

Flightdeck can forward time series data from its federated Prometheus instance to an AWS Managed Prometheus instance for long-term storage. This instance can also be used as a data source for AWS Managed Grafana.

...

Apply prometheus-workspace module from Flightdeck in the Operations account.

Update your production workload platform configuration to use the Prometheus workspace:

...

Apply the workload platform module to start writing to the Prometheus workspace.

AWS Managed Grafana

AWS provides managed Grafana instances, but there is currently no support for deploying Grafana using Terraform or Cloudformation, so you need to create the workspace through the AWS Console.

Creating the Workspace

In the Operations account:

  • Create a workspace named "Flightdeck'.

  • Enable SSO or SAML.

  • Use service-managed permissions.

  • Enable Managed Service for Prometheus and CloudWatch.

  • Enable Amazon SNS.

  • Set yourself as an admin of the workspace.

  • Add an SSO group to the workspace.

Setting up Dashboards

  • From the Grafana workspace in the AWS Management Console, sign into the managed Grafana instance.

  • Under Settings, select API Keys.

  • Create a new Admin API key named "Terraform" that expires after 30 days.

  • Copy the API key.

...