* Set every page to have defaults of 'Enterprise' and 'Open source' labels Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set administration pages to have of 'Cloud', 'Enterprise', and 'Open source' labels Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set administration/enterprise-licensing pages to have 'Enterprise' labels Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set administration/organization-management pages to have 'Enterprise' and 'Open source' labels Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set administration/provisioning pages to have 'Enterprise' and 'Open source' labels Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set administration/recorded-queries pages to have labels cloud,enterprise * Set administration/roles-and-permissions/access-control pages to have labels cloud,enterprise Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set administration/stats-and-license pages to have labels cloud,enterprise * Set alerting pages to have labels cloud,enterprise,oss * Set breaking-changes pages to have labels cloud,enterprise,oss * Set dashboards pages to have labels cloud,enterprise,oss * Set datasources pages to have labels cloud,enterprise,oss * Set explore pages to have labels cloud,enterprise,oss * Set fundamentals pages to have labels cloud,enterprise,oss * Set introduction/grafana-cloud pages to have labels cloud Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Fix introduction pages products Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set panels-visualizations pages to have labels cloud,enterprise,oss * Set release-notes pages to have labels cloud,enterprise,oss * Set search pages to have labels cloud,enterprise,oss * Set setup-grafana/configure-security/audit-grafana pages to have labels cloud,enterprise Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set setup-grafana/configure-security/configure-authentication pages to have labels cloud,enterprise,oss * Set setup-grafana/configure-security/configure-authentication/enhanced-ldap pages to have labels cloud,enterprise * Set setup-grafana/configure-security/configure-authentication/saml pages to have labels cloud,enterprise * Set setup-grafana/configure-security/configure-database-encryption/encrypt-secrets-using-hashicorp-key-vault pages to have labels cloud,enterprise * Set setup-grafana/configure-security/configure-request-security pages to have labels cloud,enterprise,oss Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set setup-grafana/configure-security/configure-team-sync pages to have labels cloud,enterprise Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set setup-grafana/configure-security/export-logs pages to have labels cloud,enterprise Signed-off-by: Jack Baldry <jack.baldry@grafana.com> * Set troubleshooting pages to have labels cloud,enterprise,oss * Set whatsnew pages to have labels cloud,enterprise,oss * Apply updated labels from review Co-authored-by: brendamuir <100768211+brendamuir@users.noreply.github.com> Co-authored-by: Isabel <76437239+imatwawana@users.noreply.github.com> --------- Signed-off-by: Jack Baldry <jack.baldry@grafana.com> Co-authored-by: brendamuir <100768211+brendamuir@users.noreply.github.com> Co-authored-by: Isabel <76437239+imatwawana@users.noreply.github.com>
17 KiB
aliases | description | keywords | labels | menuTitle | title | weight | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Guide for configuring the Grafana Docker image |
|
|
Configure a Docker image | Configure a Grafana Docker image | 1800 |
Configure a Grafana Docker image
This topic explains how to run Grafana on Docker in complex environments that require you to:
- Use different images
- Change logging levels
- Define secrets on the Cloud
- Configure plugins
Note: The examples in this topic use the Grafana Enterprise Docker image. You can use the Grafana Open Source edition by changing the Docker image to
grafana/grafana-oss
.
Supported Docker image variants
You can install and run Grafana using the following official Docker images.
-
Grafana Enterprise:
grafana/grafana-enterprise
-
Grafana Open Source:
grafana/grafana-oss
Each edition is available in two variants: Alpine and Ubuntu.
Alpine image (recommended)
Alpine Linux is a Linux distribution not affiliated with any commercial entity. It is a versatile operating system that caters to users who prioritize security, efficiency, and user-friendliness. Alpine Linux is much smaller than other distribution base images, allowing for slimmer and more secure images to be created.
By default, the images are built using the widely used Alpine Linux project base image, which can be found in the Alpine docker repo. If you prioritize security and want to minimize the size of your image, it is recommended that you use the Alpine variant. However, it's important to note that the Alpine variant uses musl libc instead of glibc and others. As a result, some software might encounter problems depending on their libc requirements. Nonetheless, most software should not experience any issues, so the Alpine variant is generally reliable.
Ubuntu image
The Ubuntu-based Grafana Enterprise and OSS images are built using the Ubuntu base image, which can be found in the Ubuntu docker repo. An Ubuntu-based image can be a good option for users who prefer an Ubuntu-based image or require certain tools unavailable on Alpine.
-
Grafana Enterprise:
grafana/grafana-enterprise:<version>-ubuntu
-
Grafana Open Source:
grafana/grafana-oss:<version>-ubuntu
Run a specific version of Grafana
You can also run a specific version of Grafana or a beta version based on the main branch of the grafana/grafana GitHub repository.
Note: If you use a Linux operating system such as Debian or Ubuntu and encounter permission errors when running Docker commands, you might need to prefix the command with
sudo
or add your user to thedocker
group. The official Docker documentation provides instructions on how to run Docker without a non-root user.
To run a specific version of Grafana, add it in the command section:
docker run -d -p 3000:3000 --name grafana grafana/grafana-enterprise:<version number>
Example:
The following command runs the Grafana Enterprise container and specifies version 9.4.7. If you want to run a different version, modify the version number section.
docker run -d -p 3000:3000 --name grafana grafana/grafana-enterprise:9.4.7
Run the Grafana main branch
After every successful build of the main branch, two tags, grafana/grafana-oss:main
and grafana/grafana-oss:main-ubuntu
, are updated. Additionally, two new tags are created: grafana/grafana-oss-dev:<version><build ID>-pre
and grafana/grafana-oss-dev:<version><build ID>-pre-ubuntu
, where version
is the next version of Grafana and build ID
is the ID of the corresponding CI build. These tags provide access to the most recent Grafana main builds. For more information, refer to grafana/grafana-oss-dev.
To ensure stability and consistency, we strongly recommend using the grafana/grafana-oss-dev:<version><build ID>-pre
tag when running the Grafana main branch in a production environment. This tag ensures that you are using a specific version of Grafana instead of the most recent commit, which could potentially introduce bugs or issues. It also avoids polluting the tag namespace for the main Grafana images with thousands of pre-release tags.
For a list of available tags, refer to grafana/grafana-oss and grafana/grafana-oss-dev.
Default paths
Grafana comes with default configuration parameters that remain the same among versions regardless of the operating system or the environment (for example, virtual machine, Docker, Kubernetes, etc.). You can refer to the [Configure Grafana]({{< relref "./configure-grafana" >}}) documentation to view all the default configuration settings.
The following configurations are set by default when you start the Grafana Docker container. When running in Docker you cannot change the configurations by editing the conf/grafana.ini
file. Instead, you can modify the configuration using [environment variables]({{< relref "./configure-grafana#override-configuration-with-environment-variables" >}}).
Setting | Default value |
---|---|
GF_PATHS_CONFIG | /etc/grafana/grafana.ini |
GF_PATHS_DATA | /var/lib/grafana |
GF_PATHS_HOME | /usr/share/grafana |
GF_PATHS_LOGS | /var/log/grafana |
GF_PATHS_PLUGINS | /var/lib/grafana/plugins |
GF_PATHS_PROVISIONING | /etc/grafana/provisioning |
Install plugins in the Docker container
You can install publicly available plugins and plugins that are private or used internally in an organization. For plugin installation instructions, refer to [Install plugins in the Docker container]({{< relref "./installation/docker#install-plugins-in-the-docker-container" >}}).
Install plugins from other sources
To install plugins from other sources, you must define the custom URL and specify it immediately before the plugin name in the GF_INSTALL_PLUGINS
environment variable: GF_INSTALL_PLUGINS=<url to plugin zip>;<plugin name>
.
Example:
The following command runs Grafana Enterprise on port 3000 in detached mode and installs the custom plugin, which is specified as a URL parameter in the GF_INSTALL_PLUGINS
environment variable.
docker run -d -p 3000:3000 --name=grafana \
-e "GF_INSTALL_PLUGINS=http://plugin-domain.com/my-custom-plugin.zip;custom-plugin,grafana-clock-panel" \
grafana/grafana-enterprise
Build a custom Grafana Docker image
In the Grafana GitHub repository, the packaging/docker/custom/
folder includes a Dockerfile
that you can use to build a custom Grafana image. The Dockerfile
accepts GRAFANA_VERSION
, GF_INSTALL_PLUGINS
, and GF_INSTALL_IMAGE_RENDERER_PLUGIN
as build arguments.
The GRAFANA_VERSION
build argument must be a valid grafana/grafana
Docker image tag. By default, Grafana builds an Alpine-based image. To build an Ubuntu-based image, append -ubuntu
to the GRAFANA_VERSION
build argument.
Example:
The following example shows you how to build and run a custom Grafana Docker image based on the latest official Ubuntu-based Grafana Docker image:
# go to the custom directory
cd packaging/docker/custom
# run the docker build command to build the image
docker build \
--build-arg "GRAFANA_VERSION=latest-ubuntu" \
-t grafana-custom .
# run the custom grafana container using docker run command
docker run -d -p 3000:3000 --name=grafana grafana-custom
Build Grafana with the Image Renderer plugin pre-installed
Note: This feature is experimental.
Currently, the Grafana Image Renderer plugin requires dependencies that are not available in the Grafana Docker image (see GitHub Issue#301 for more details). However, you can create a customized Docker image using the GF_INSTALL_IMAGE_RENDERER_PLUGIN
build argument as a solution. This will install the necessary dependencies for the Grafana Image Renderer plugin to run.
Example:
The following example shows how to build a customized Grafana Docker image that includes the Image Renderer plugin.
# go to the folder
cd packaging/docker/custom
# running the build command
docker build \
--build-arg "GRAFANA_VERSION=latest" \
--build-arg "GF_INSTALL_IMAGE_RENDERER_PLUGIN=true" \
-t grafana-custom .
# running the docker run command
docker run -d -p 3000:3000 --name=grafana grafana-custom
Build a Grafana Docker image with pre-installed plugins
If you run multiple Grafana installations with the same plugins, you can save time by building a customized image that includes plugins available on the Grafana Plugin download page. When you build a customized image, Grafana doesn't have to install the plugins each time it starts, making the startup process more efficient.
Note: To specify the version of a plugin, you can use the
GF_INSTALL_PLUGINS
build argument and add the version number. The latest version is used if you don't specify a version number. For example, you can use--build-arg "GF_INSTALL_PLUGINS=grafana-clock-panel 1.0.1,grafana-simple-json-datasource 1.3.5"
to specify the versions of two plugins.
Example:
The following example shows how to build and run a custom Grafana Docker image with pre-installed plugins.
# go to the custom directory
cd packaging/docker/custom
# running the build command
# include the plugins you want e.g. clock planel etc
docker build \
--build-arg "GRAFANA_VERSION=latest" \
--build-arg "GF_INSTALL_PLUGINS=grafana-clock-panel,grafana-simple-json-datasource" \
-t grafana-custom .
# running the custom Grafana container using the docker run command
docker run -d -p 3000:3000 --name=grafana grafana-custom
Build a Grafana Docker image with pre-installed plugins from other sources
You can create a Docker image containing a plugin that is exclusive to your organization, even if it is not accessible to the public. Simply use the GF_INSTALL_PLUGINS
build argument to specify the plugin's URL and installation folder name, such as GF_INSTALL_PLUGINS=<url to plugin zip>;<plugin install folder name>
.
The following example demonstrates creating a customized Grafana Docker image that includes a custom plugin from a URL link, the clock panel plugin, and the simple-json-datasource plugin. You can define these plugins in the build argument using the Grafana Plugin environment variable.
# go to the folder
cd packaging/docker/custom
# running the build command
docker build \
--build-arg "GRAFANA_VERSION=latest" \
--build-arg "GF_INSTALL_PLUGINS=http://plugin-domain.com/my-custom-plugin.zip;my-custom-plugin,grafana-clock-panel,grafana-simple-json-datasource" \
-t grafana-custom .
# running the docker run command
docker run -d -p 3000:3000 --name=grafana grafana-custom
Logging
By default, Docker container logs are directed to STDOUT
, a common practice in the Docker community. You can change this by setting a different [log mode]({{< relref "./configure-grafana#mode" >}}) such as console
, file
, or syslog
. You can use one or more modes by separating them with spaces, for example, console file
. By default, both console
and file
modes are enabled.
Example:
The following example runs Grafana using the console file
log mode that is set in the GF_LOG_MODE
environment variable.
# Run Grafana while logging to both standard out
# and /var/log/grafana/grafana.log
docker run -p 3000:3000 -e "GF_LOG_MODE=console file" grafana/grafana-enterprise
Configure Grafana with Docker Secrets
You can input confidential data like login credentials and secrets into Grafana using configuration files. This method works well with Docker Secrets, as the secrets are automatically mapped to the /run/secrets/
location within the container.
You can apply this technique to any configuration options in conf/grafana.ini
by setting GF_<SectionName>_<KeyName>__FILE
to the file path that contains the secret information. For more information about Docker secret command usage, refer to docker secret.
The following example demonstrates how to set the admin password:
- Admin password secret:
/run/secrets/admin_password
- Environment variable:
GF_SECURITY_ADMIN_PASSWORD__FILE=/run/secrets/admin_password
Configure Docker secrets credentials for AWS CloudWatch
Grafana ships with built-in support for the [Amazon CloudWatch datasource]({{< relref "../datasources/aws-cloudwatch" >}}). To configure the data source, you must provide information such as the AWS ID-Key, secret access key, region, and so on. You can use Docker secrets as a way to provide this information.
Example:
The example below shows how to use Grafana environment variables via Docker Secrets for the AWS ID-Key, secret access key, region, and profile.
The example uses the following values for the AWS Cloudwatch data source:
AWS_default_ACCESS_KEY_ID=aws01us02
AWS_default_SECRET_ACCESS_KEY=topsecret9b78c6
AWS_default_REGION=us-east-1
-
Create a Docker secret for each of the values noted above.
echo "aws01us02" | docker secret create aws_access_key_id -
echo "topsecret9b78c6" | docker secret create aws_secret_access_key -
echo "us-east-1" | docker secret create aws_region -
-
Run the following command to determine that the secrets were created.
$ docker secret ls
The output from the command should look similar to the following:
ID NAME DRIVER CREATED UPDATED i4g62kyuy80lnti5d05oqzgwh aws_access_key_id 5 minutes ago 5 minutes ago uegit5plcwodp57fxbqbnke7h aws_secret_access_key 3 minutes ago 3 minutes ago fxbqbnke7hplcwodp57fuegit aws_region About a minute ago About a minute ago
Where:
ID = the secret unique ID that will be use in the docker run command
NAME = the logical name defined for each secret
-
Add the secrets to the command line when you run Docker.
docker run -d -p 3000:3000 --name grafana \ -e "GF_DEFAULT_INSTANCE_NAME=my-grafana" \ -e "GF_AWS_PROFILES=default" \ -e "GF_AWS_default_ACCESS_KEY_ID__FILE=/run/secrets/aws_access_key_id" \ -e "GF_AWS_default_SECRET_ACCESS_KEY__FILE=/run/secrets/aws_secret_access_key" \ -e "GF_AWS_default_REGION__FILE=/run/secrets/aws_region" \ -v grafana-data:/var/lib/grafana \ grafana/grafana-enterprise
You can also specify multiple profiles to GF_AWS_PROFILES
(for example, GF_AWS_PROFILES=default another
).
The following list includes the supported environment variables:
GF_AWS_${profile}_ACCESS_KEY_ID
: AWS access key ID (required).GF_AWS_${profile}_SECRET_ACCESS_KEY
: AWS secret access key (required).GF_AWS_${profile}_REGION
: AWS region (optional).
Troubleshoot a Docker deployment
By default, the Grafana log level is set to INFO
, but you can increase the log level to DEBUG
mode when you want to reproduce a problem.
For more information about logging, refer to [logs]({{< relref "./configure-grafana#log" >}}).
Increase log level using the Docker run (CLI) command
To increase the log level to DEBUG
mode, add the environment variable GF_LOG_LEVEL
to the command line.
docker run -d -p 3000:3000 --name=grafana \
-e "GF_LOG_LEVEL=debug" \
grafana/grafana-enterprise
Increase log level using the Docker Compose
To increase the log level to DEBUG
mode, add the environment variable GF_LOG_LEVEL
to the docker-compose.yaml
file.
version: '3.8'
services:
grafana:
image: grafana/grafana-enterprise
container_name: grafana
restart: unless-stopped
environment:
# increases the log level from info to debug
- GF_LOG_LEVEL=debug
ports:
- '3000:3000'
volumes:
- 'grafana_storage:/var/lib/grafana'
volumes:
grafana_storage: {}
Validate Docker Compose YAML file
The chance of syntax errors appearing in a YAML file increases as the file becomes more complex. You can use the following command to check for syntax errors.
# go to your docker-compose.yaml directory
cd /path-to/docker-compose/file
# run the validation command
docker compose config
If there are errors in the YAML file, the command output highlights the lines that contain errors. If there are no errors in the YAML file, the output includes the content of the docker-compose.yaml
file in detailed YAML format.