- Mar 18, 2023
-
-
Evangelos Foutras authored
Also stop using oauth_auto_login and switch to provider specific auto_login option.
-
- Feb 11, 2023
-
-
Evangelos Foutras authored
-
- Dec 04, 2022
-
-
Evangelos Foutras authored
-
- Nov 12, 2022
-
-
Evangelos Foutras authored
From [1]: "By default, the new Quarkus distribution removes /auth from the context-path." [1] https://www.keycloak.org/migration/migrating-to-quarkus
-
- Nov 06, 2022
-
-
Evangelos Foutras authored
-
- Oct 24, 2022
-
-
Evangelos Foutras authored
Using an inline statement eats the blank line after it; to overcome this switch to an inline expression, which also happens to be easier to read.
-
Evangelos Foutras authored
- enable_gzip: grafana listens on localhost, nginx handles compression - admin_user: initial admin creation is disabled in our config - strict_transport_security: the same header is set by nginx - strict_transport_security_max_age_seconds: unused without the above
-
Evangelos Foutras authored
-
- Oct 22, 2022
-
-
Kristian Klausen authored
Symlinking home.json to archive.json causes a duplicate, as both dashboards have the same uid, and Grafana won't keep the dashboards updated when there are duplicates[1]. Instead just change default_home_dashboard_path to point to the archive.json dashboard. [1] "dashboards provisioning provider has no database write permissions because of duplicates"
-
- Sep 21, 2022
-
-
Evangelos Foutras authored
-
- Sep 14, 2022
-
-
Evangelos Foutras authored
-
- Aug 18, 2022
-
-
Evangelos Foutras authored
-
- Aug 16, 2022
-
-
Jelle van der Waa authored
-
- Aug 12, 2022
-
-
Evangelos Foutras authored
-
- Jul 02, 2022
-
-
Evangelos Foutras authored
-
- Jun 04, 2022
-
-
Evangelos Foutras authored
-
- Apr 11, 2022
-
-
Evangelos Foutras authored
-
- Mar 12, 2022
-
-
Evangelos Foutras authored
-
- Feb 20, 2022
-
-
Kristian Klausen authored
We don't have any state for dashboards.archlinux.org we want to persist, so to avoid any stale data in the database, start with a new empty in-memory database every time Grafana starts.
-
- Feb 15, 2022
-
-
Kristian Klausen authored
Without this fix all the Prometheus dashboards failed loading data with: "Error updating options: origin not allowed". [1] https://github.com/grafana/grafana/issues/45117#issuecomment-1033842787
-
- Jan 11, 2022
-
-
Levente Polyak authored
-
Levente Polyak authored
-
Levente Polyak authored
-
- Oct 16, 2021
-
-
Kristian Klausen authored
Grafana v8.2.0 added support for Prometheus's Alertmanager[1] which can be used with the Unified Alerting added in v8.0.0[2]. [1] https://github.com/grafana/grafana/releases/tag/v8.2.0 [2] https://grafana.com/blog/2021/06/08/grafana-8.0-unified-grafana-and-prometheus-alerts-live-streaming-new-visualizations-and-more/
-
Kristian Klausen authored
Mostly changes from Grafana v8.0[1]. [1] https://grafana.com/docs/grafana/latest/whatsnew/whats-new-in-v8-0/
-
- Jul 08, 2021
-
-
Kristian Klausen authored
-
- Jul 06, 2021
-
-
Kristian Klausen authored
-
This reverts commit 649568e7 ("Restrict Grafana access to Arch Linux Staff group on Keycloak (fixes #151)").
-
- Jun 08, 2021
-
-
Jelle van der Waa authored
-
- Jun 06, 2021
-
-
X-Forwarded-For is defined as X-Forwarded-For: <client>, <proxy1>, <proxy2>, and it was set to $proxy_add_x_forwarded_for which is basically $http_x_forwarded_for,$remote_addr and headers from the client can't be trusted! Fix #292
-
Kristian Klausen authored
-
- May 13, 2021
-
-
Kristian Klausen authored
-
- Apr 08, 2021
-
-
A extra access_log entry was added with the following commands: $ cd roles $ grep -lr access_log | xargs -P 1 -n 1 sed -i '/access_log/ s/\(.*\)\( \)\(\(reduced\|main\);$\)/\1 \3\n\1.json json_\3/'
-
Fix #263
-
- Sep 09, 2020
-
-
-
Configure Grafana to use Keycloak OpenID Connect for authentication. For now only DevOps is configured as admin and Arch Staff as general Viewer roles.
-
To show the session IP address in /profile in Grafana the X-Forwarded-For header has to be set.
-
- Mar 28, 2020
-
-
Jelle van der Waa authored
-
- Sep 05, 2019
-
-
Jan Alexander Steffens (heftig) authored