Visualization

The visualization feature enables you to visualize the data stored in Intelligent Data Store. Grafana is used as the visualization engine. This allows an enterprise to have their own dashboard thereby enabling them to manage the dashboards, users, and so on for each enterprise independently.

The following Grafana plugins are used to access the Intelligent Data Store APIs and render dashboards, respectively:

Accessing the Grafana Console

In the browser address bar, type the URL of the server to access the Grafana console: http(s)://hostname/grafana

where,

http or https is as the platform is configured.

hostname is the ingress name of Grafana as configured in cpro-grafana:ingress:hosts in the values.yaml file.

Logging in to Grafana

During Enterprise provisioning, IMPACT creates one user with Admin role privileges in Grafana for the provisioned Enterprise. You can login to Grafana using this user credentials and create more users with appropriate roles as necessary. Logging in to Grafana opens up the Grafana Home page.

Figure 1. Sample Grafana Home page
Note: Refer to the Grafana documentation https://grafana.com/docs/grafana/latest/ on how to create users and assign roles.

Configuring the Intelligent Data Store Data API access credentials

Intelligent Data Store Data APIs require authentication for access and this must be configured manually in the Grafana dashboards to access the Data APIs to fetch the data.

Perform the following steps to configure the Intelligent Data Store Data API access credentials:

  1. Login to Grafana with the user provisioned during enterprise creation.
  2. Navigate to Data Sources.
    Figure 2. Grafana Data Sources
  3. Click the name of the IDS DataSource to edit the Data Source.
    Figure 3. IDS DataSource
  4. Set the User name and Password of the IMPACT tenant under the Authentication section. This user should belong to the same enterprise and possess the IDS-User and IDS-RuleManage permissions.
    Figure 4. Setting up User Name and Password
    Note: During Data Source saving care must be taken to ensure that the credentials and permissions are valid.