Menu
Enterprise Open source RSS

Configure Grafana

You can use Grafana Cloud to avoid installing, maintaining, and scaling your own instance of Grafana. Create a free account to get started, which includes free forever access to 10k metrics, 50GB logs, 50GB traces, 500VUh k6 testing & more.

Grafana has default and custom configuration files. You can customize your Grafana instance by modifying the custom configuration file or by using environment variables. To see the list of settings for a Grafana instance, refer to View server settings.

Note

After you add custom options, uncomment the relevant sections of the configuration file. Restart Grafana for your changes to take effect.

Configuration file location

The default settings for a Grafana instance are stored in the $WORKING_DIR/conf/defaults.ini file. Do not change this file.

Depending on your OS, your custom configuration file is either the $WORKING_DIR/conf/custom.ini file or the /usr/local/etc/grafana/grafana.ini file. The custom configuration file path can be overridden using the --config parameter.

Linux

If you installed Grafana using the deb or rpm packages, then your configuration file is located at /etc/grafana/grafana.ini and a separate custom.ini is not used. This path is specified in the Grafana init.d script using --config file parameter.

Docker

Refer to Configure a Grafana Docker image for information about environmental variables, persistent storage, and building custom Docker images.

Windows

On Windows, the sample.ini file is located in the same directory as defaults.ini file. It contains all the settings commented out. Copy sample.ini and name it custom.ini.

macOS

By default, the configuration file is located at /opt/homebrew/etc/grafana/grafana.ini or /usr/local/etc/grafana/grafana.ini. For a Grafana instance installed using Homebrew, edit the grafana.ini file directly. Otherwise, add a configuration file named custom.ini to the conf folder to override the settings defined in conf/defaults.ini.

Remove comments in the .ini files

Grafana uses semicolons (the ; char) to comment out lines in a .ini file. You must uncomment each line in the custom.ini or the grafana.ini file that you are modify by removing ; from the beginning of that line. Otherwise your changes will be ignored.

For example:

# The HTTP port  to use
;http_port = 3000

Override configuration with environment variables

Do not use environment variables to add new configuration settings. Instead, use environmental variables to override existing options.

To override an option:

bash
GF_<SectionName>_<KeyName>

Where the section name is the text within the brackets. Everything should be uppercase, . and - should be replaced by _. For example, if you have these configuration settings:

bash
# default section
instance_name = ${HOSTNAME}

[security]
admin_user = admin

[auth.google]
client_secret = 0ldS3cretKey

[plugin.grafana-image-renderer]
rendering_ignore_https_errors = true

[feature_toggles]
enable = newNavigation

You can override variables on Linux machines with:

bash
export GF_DEFAULT_INSTANCE_NAME=my-instance
export GF_SECURITY_ADMIN_USER=owner
export GF_AUTH_GOOGLE_CLIENT_SECRET=newS3cretKey
export GF_PLUGIN_GRAFANA_IMAGE_RENDERER_RENDERING_IGNORE_HTTPS_ERRORS=true
export GF_FEATURE_TOGGLES_ENABLE=newNavigation

Variable expansion

Note

Only available in Grafana 7.1+.

If any of your options contains the expression $__<provider>{<argument>} or ${<environment variable>}, then they will be processed by Grafana’s variable expander. The expander runs the provider with the provided argument to get the final value of the option.

There are three providers: env, file, and vault.

Env provider

The env provider can be used to expand an environment variable. If you set an option to $__env{PORT} the PORT environment variable will be used in its place. For environment variables you can also use the short-hand syntax ${PORT}. Grafana’s log directory would be set to the grafana directory in the directory behind the LOGDIR environment variable in the following example.

ini
[paths]
logs = $__env{LOGDIR}/grafana

File provider

file reads a file from the filesystem. It trims whitespace from the beginning and the end of files. The database password in the following example would be replaced by the content of the /etc/secrets/gf_sql_password file:

ini
[database]
password = $__file{/etc/secrets/gf_sql_password}

Vault provider

The vault provider allows you to manage your secrets with Hashicorp Vault.

Vault provider is only available in Grafana Enterprise v7.1+. For more information, refer to Vault integration in Grafana Enterprise.


app_mode

Options are production and development. Default is production. Do not change this option unless you are working on Grafana development.

instance_name

Set the name of the grafana-server instance. Used in logging, internal metrics, and clustering info. Defaults to: ${HOSTNAME}, which will be replaced with environment variable HOSTNAME, if that is empty or does not exist Grafana will try to use system calls to get the machine name.


[paths]

data

Path to where Grafana stores the sqlite3 database (if used), file-based sessions (if used), and other data. This path is usually specified via command line in the init.d script or the systemd service file.

macOS: The default SQLite database is located at /usr/local/var/lib/grafana

temp_data_lifetime

How long temporary images in data directory should be kept. Defaults to: 24h. Supported modifiers: h (hours), m (minutes), for example: 168h, 30m, 10h30m. Use 0 to never clean up temporary files.

logs

Path to where Grafana stores logs. This path is usually specified via command line in the init.d script or the systemd service file. You can override it in the configuration file or in the default environment variable file. However, please note that by overriding this the default log path will be used temporarily until Grafana has fully initialized/started.

Override log path using the command line argument cfg:default.paths.logs:

bash
./grafana-server --config /custom/config.ini --homepath /custom/homepath cfg:default.paths.logs=/custom/path

macOS: By default, the log file should be located at /usr/local/var/log/grafana/grafana.log.

plugins

Directory where Grafana automatically scans and looks for plugins. For information about manually or automatically installing plugins, refer to Install Grafana plugins.

macOS: By default, the Mac plugin location is: /usr/local/var/lib/grafana/plugins.

provisioning

Folder that contains provisioning config files that Grafana will apply on startup. Dashboards will be reloaded when the json files changes.


[server]

protocol

http,https,h2 or socket

min_tls_version

The TLS Handshake requires a minimum TLS version. The available options are TLS1.2 and TLS1.3. If you do not specify a version, the system uses TLS1.2.

http_addr

The host for the server to listen on. If your machine has more than one network interface, you can use this setting to expose the Grafana service on only one network interface and not have it available on others, such as the loopback interface. An empty value is equivalent to setting the value to 0.0.0.0, which means the Grafana service binds to all interfaces.

In environments where network address translation (NAT) is used, ensure you use the network interface address and not a final public address; otherwise, you might see errors such as bind: cannot assign requested address in the logs.

http_port

The port to bind to, defaults to 3000. To use port 80 you need to either give the Grafana binary permission for example:

bash
$ sudo setcap 'cap_net_bind_service=+ep' /usr/sbin/grafana-server

Or redirect port 80 to the Grafana port using:

bash
$ sudo iptables -t nat -A PREROUTING -p tcp --dport 80 -j REDIRECT --to-port 3000

Another way is to put a web server like Nginx or Apache in front of Grafana and have them proxy requests to Grafana.

domain

This setting is only used in as a part of the root_url setting (see below). Important if you use GitHub or Google OAuth.

enforce_domain

Redirect to correct domain if the host header does not match the domain. Prevents DNS rebinding attacks. Default is false.

root_url

This is the full URL used to access Grafana from a web browser. This is important if you use Google or GitHub OAuth authentication (for the callback URL to be correct).

Note

This setting is also important if you have a reverse proxy in front of Grafana that exposes it through a subpath. In that case add the subpath to the end of this URL setting.

serve_from_sub_path

Serve Grafana from subpath specified in root_url setting. By default it is set to false for compatibility reasons.

By enabling this setting and using a subpath in root_url above, e.g.root_url = http://localhost:3000/grafana, Grafana is accessible on http://localhost:3000/grafana. If accessed without subpath Grafana will redirect to an URL with the subpath.

router_logging

Set to true for Grafana to log all HTTP requests (not just errors). These are logged as Info level events to the Grafana log.

static_root_path

The path to the directory where the front end files (HTML, JS, and CSS files). Defaults to public which is why the Grafana binary needs to be executed with working directory set to the installation path.

enable_gzip

Set this option to true to enable HTTP compression, this can improve transfer speed and bandwidth utilization. It is recommended that most users set it to true. By default it is set to false for compatibility reasons.

cert_file

Path to the certificate file (if protocol is set to https or h2).

cert_key

Path to the certificate key file (if protocol is set to https or h2).

certs_watch_interval

Controls whether cert_key and cert_file are periodically watched for changes. Disabled, by default. When enabled, cert_key and cert_file are watched for changes. If there is change, the new certificates are loaded automatically.

Warning

After the new certificates are loaded, connections with old certificates will not work. You must reload the connections to the old certs for them to work.

socket_gid

GID where the socket should be set when protocol=socket. Make sure that the target group is in the group of Grafana process and that Grafana process is the file owner before you change this setting. It is recommended to set the gid as http server user gid. Not set when the value is -1.

socket_mode

Mode where the socket should be set when protocol=socket. Make sure that Grafana process is the file owner before you change this setting.

socket

Path where the socket should be created when protocol=socket. Make sure Grafana has appropriate permissions for that path before you change this setting.

cdn_url

Note

Available in Grafana v7.4 and later versions.

Specify a full HTTP URL address to the root of your Grafana CDN assets. Grafana will add edition and version paths.

For example, given a cdn url like https://cdn.myserver.com grafana will try to load a javascript file from http://cdn.myserver.com/grafana-oss/7.4.0/public/build/app.<hash>.js.

read_timeout

Sets the maximum time using a duration format (5s/5m/5ms) before timing out read of an incoming request and closing idle connections. 0 means there is no timeout for reading the request.


[server.custom_response_headers]

This setting enables you to specify additional headers that the server adds to HTTP(S) responses.

exampleHeader1 = exampleValue1
exampleHeader2 = exampleValue2

[database]

Grafana needs a database to store users and dashboards (and other things). By default it is configured to use sqlite3 which is an embedded database (included in the main Grafana binary).

type

Either mysql, postgres or sqlite3, it’s your choice.

host

Only applicable to MySQL or Postgres. Includes IP or hostname and port or in case of Unix sockets the path to it. For example, for MySQL running on the same host as Grafana: host = 127.0.0.1:3306 or with Unix sockets: host = /var/run/mysqld/mysqld.sock

name

The name of the Grafana database. Leave it set to grafana or some other name.

user

The database user (not applicable for sqlite3).

password

The database user’s password (not applicable for sqlite3). If the password contains # or ; you have to wrap it with triple quotes. For example """#password;"""

url

Use either URL or the other fields below to configure the database Example: mysql://user:secret@host:port/database

max_idle_conn

The maximum number of connections in the idle connection pool.

max_open_conn

The maximum number of open connections to the database. For MYSQL, configure this setting on both Grafana and the database. For more information, refer to sysvar_max_connections.

conn_max_lifetime

Sets the maximum amount of time a connection may be reused. The default is 14400 (which means 14400 seconds or 4 hours). For MySQL, this setting should be shorter than the wait_timeout variable.

migration_locking

Set to false to disable database locking during the migrations. Default is true.

locking_attempt_timeout_sec

For “mysql” and “postgres” only. Specify the time (in seconds) to wait before failing to lock the database for the migrations. Default is 0.

log_queries

Set to true to log the sql calls and execution times.

ssl_mode

For Postgres, use use any valid libpq sslmode, e.g.disable, require, verify-full, etc. For MySQL, use either true, false, or skip-verify.

ssl_sni

For Postgres, set to 0 to disable Server Name Indication. This is enabled by default on SSL-enabled connections.

isolation_level

Only the MySQL driver supports isolation levels in Grafana. In case the value is empty, the driver’s default isolation level is applied. Available options are “READ-UNCOMMITTED”, “READ-COMMITTED”, “REPEATABLE-READ” or “SERIALIZABLE”.

ca_cert_path

The path to the CA certificate to use. On many Linux systems, certs can be found in /etc/ssl/certs.

client_key_path

The path to the client key. Only if server requires client authentication.

client_cert_path

The path to the client cert. Only if server requires client authentication.

server_cert_name

The common name field of the certificate used by the mysql or postgres server. Not necessary if ssl_mode is set to skip-verify.

path

Only applicable for sqlite3 database. The file path where the database will be stored.

cache_mode

For “sqlite3” only. Shared cache setting used for connecting to the database. (private, shared) Defaults to private.

wal

For “sqlite3” only. Setting to enable/disable Write-Ahead Logging. The default value is false (disabled).

query_retries

This setting applies to sqlite only and controls the number of times the system retries a query when the database is locked. The default value is 0 (disabled).

transaction_retries

This setting applies to sqlite only and controls the number of times the system retries a transaction when the database is locked. The default value is 5.

instrument_queries

Set to true to add metrics and tracing for database queries. The default value is false.


[remote_cache]

Caches authentication details and session information in the configured database, Redis or Memcached. This setting does not configure Query Caching in Grafana Enterprise.

type

Either redis, memcached, or database. Defaults to database

connstr

The remote cache connection string. The format depends on the type of the remote cache. Options are database, redis, and memcache.

database

Leave empty when using database since it will use the primary database.

redis

Example connstr: addr=127.0.0.1:6379,pool_size=100,db=0,ssl=false

  • addr is the host : port of the redis server.
  • pool_size (optional) is the number of underlying connections that can be made to redis.
  • db (optional) is the number identifier of the redis database you want to use.
  • ssl (optional) is if SSL should be used to connect to redis server. The value may be true, false, or insecure. Setting the value to insecure skips verification of the certificate chain and hostname when making the connection.

memcache

Example connstr: 127.0.0.1:11211


[dataproxy]

logging

This enables data proxy logging, default is false.

timeout

How long the data proxy should wait before timing out. Default is 30 seconds.

This setting also applies to core backend HTTP data sources where query requests use an HTTP client with timeout set.

keep_alive_seconds

Interval between keep-alive probes. Default is 30 seconds. For more details check the Dialer.KeepAlive documentation.

tls_handshake_timeout_seconds

The length of time that Grafana will wait for a successful TLS handshake with the datasource. Default is 10 seconds. For more details check the Transport.TLSHandshakeTimeout documentation.

expect_continue_timeout_seconds

The length of time that Grafana will wait for a datasource’s first response headers after fully writing the request headers, if the request has an “Expect: 100-continue” header. A value of 0 will result in the body being sent immediately. Default is 1 second. For more details check the Transport.ExpectContinueTimeout documentation.

max_conns_per_host

Optionally limits the total number of connections per host, including connections in the dialing, active, and idle states. On limit violation, dials are blocked. A value of 0 means that there are no limits. Default is 0. For more details check the Transport.MaxConnsPerHost documentation.

max_idle_connections

The maximum number of idle connections that Grafana will maintain. Default is 100. For more details check the Transport.MaxIdleConns documentation.

idle_conn_timeout_seconds

The length of time that Grafana maintains idle connections before closing them. Default is 90 seconds. For more details check the Transport.IdleConnTimeout documentation.

send_user_header

If enabled and user is not anonymous, data proxy will add X-Grafana-User header with username into the request. Default is false.

response_limit

Limits the amount of bytes that will be read/accepted from responses of outgoing HTTP requests. Default is 0 which means disabled.

row_limit

Limits the number of rows that Grafana will process from SQL (relational) data sources. Default is 1000000.

user_agent

Sets a custom value for the User-Agent header for outgoing data proxy requests. If empty, the default value is Grafana/<BuildVersion> (for example Grafana/9.0.0).


[analytics]

enabled

This option is also known as usage analytics. When false, this option disables the writers that write to the Grafana database and the associated features, such as dashboard and data source insights, presence indicators, and advanced dashboard search. The default value is true.

reporting_enabled

When enabled Grafana will send anonymous usage statistics to stats.grafana.org. No IP addresses are being tracked, only simple counters to track running instances, versions, dashboard and error counts. It is very helpful to us, so please leave this enabled. Counters are sent every 24 hours. Default value is true.

check_for_updates

Set to false, disables checking for new versions of Grafana from Grafana’s GitHub repository. When enabled, the check for a new version runs every 10 minutes. It will notify, via the UI, when a new version is available. The check itself will not prompt any auto-updates of the Grafana software, nor will it send any sensitive information.

check_for_plugin_updates

Note

Available in Grafana v8.5.0 and later versions.

Set to false disables checking for new versions of installed plugins from https://grafana.com. When enabled, the check for a new plugin runs every 10 minutes. It will notify, via the UI, when a new plugin update exists. The check itself will not prompt any auto-updates of the plugin, nor will it send any sensitive information.

google_analytics_ua_id

If you want to track Grafana usage via Google analytics specify your Universal Analytics ID here. By default this feature is disabled.

google_analytics_4_id

If you want to track Grafana usage via Google Analytics 4 specify your GA4 ID here. By default this feature is disabled.

google_tag_manager_id

Google Tag Manager ID, only enabled if you enter an ID here.

rudderstack_write_key

If you want to track Grafana usage via Rudderstack specify your Rudderstack Write Key here. The rudderstack_data_plane_url must also be provided for this feature to be enabled. By default this feature is disabled.

rudderstack_data_plane_url

Rudderstack data plane url that will receive Rudderstack events. The rudderstack_write_key must also be provided for this feature to be enabled.

rudderstack_sdk_url

Optional. If tracking with Rudderstack is enabled, you can provide a custom URL to load the Rudderstack SDK.

rudderstack_config_url

Optional. If tracking with Rudderstack is enabled, you can provide a custom URL to load the Rudderstack config.

rudderstack_integrations_url

Optional. If tracking with Rudderstack is enabled, you can provide a custom URL to load the SDK for destinations running in device mode. This setting is only valid for Rudderstack version 1.1 and higher.

application_insights_connection_string

If you want to track Grafana usage via Azure Application Insights, then specify your Application Insights connection string. Since the connection string contains semicolons, you need to wrap it in backticks (`). By default, tracking usage is disabled.

application_insights_endpoint_url

Optionally, use this option to override the default endpoint address for Application Insights data collecting. For details, refer to the Azure documentation.


Set to false to remove all feedback links from the UI. Default is true.

[security]

disable_initial_admin_creation

Only available in Grafana v6.5+.

Disable creation of admin user on first start of Grafana. Default is false.

admin_user

The name of the default Grafana Admin user, who has full permissions. Default is admin.

admin_password

The password of the default Grafana Admin. Set once on first-run. Default is admin.

admin_email

The email of the default Grafana Admin, created on startup. Default is admin@localhost.

secret_key

Used for signing some data source settings like secrets and passwords, the encryption format used is AES-256 in CFB mode. Cannot be changed without requiring an update to data source settings to re-encode them.

disable_gravatar

Set to true to disable the use of Gravatar for user profile images. Default is false.

data_source_proxy_whitelist

Define a whitelist of allowed IP addresses or domains, with ports, to be used in data source URLs with the Grafana data source proxy. Format: ip_or_domain:port separated by spaces. PostgreSQL, MySQL, and MSSQL data sources do not use the proxy and are therefore unaffected by this setting.

disable_brute_force_login_protection

Set to true to disable brute force login protection. Default is false. An existing user’s account will be locked after 5 attempts in 5 minutes.

Set to true if you host Grafana behind HTTPS. Default is false.

Sets the SameSite cookie attribute and prevents the browser from sending this cookie along with cross-site requests. The main goal is to mitigate the risk of cross-origin information leakage. This setting also provides some protection against cross-site request forgery attacks (CSRF), read more about SameSite here. Valid values are lax, strict, none, and disabled. Default is lax. Using value disabled does not add any SameSite attribute to cookies.

allow_embedding

When false, the HTTP header X-Frame-Options: deny will be set in Grafana HTTP responses which will instruct browsers to not allow rendering Grafana in a <frame>, <iframe>, <embed> or <object>. The main goal is to mitigate the risk of Clickjacking. Default is false.

strict_transport_security

Set to true if you want to enable HTTP Strict-Transport-Security (HSTS) response header. Only use this when HTTPS is enabled in your configuration, or when there is another upstream system that ensures your application does HTTPS (like a frontend load balancer). HSTS tells browsers that the site should only be accessed using HTTPS.

strict_transport_security_max_age_seconds

Sets how long a browser should cache HSTS in seconds. Only applied if strict_transport_security is enabled. The default value is 86400.

strict_transport_security_preload

Set to true to enable HSTS preloading option. Only applied if strict_transport_security is enabled. The default value is false.

strict_transport_security_subdomains

Set to true to enable the HSTS includeSubDomains option. Only applied if strict_transport_security is enabled. The default value is false.

x_content_type_options

Set to false to disable the X-Content-Type-Options response header. The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised in the Content-Type headers should not be changed and be followed. The default value is true.

x_xss_protection

Set to false to disable the X-XSS-Protection header, which tells browsers to stop pages from loading when they detect reflected cross-site scripting (XSS) attacks. The default value is true.

content_security_policy

Set to true to add the Content-Security-Policy header to your requests. CSP allows to control resources that the user agent can load and helps prevent XSS attacks.

content_security_policy_template

Set the policy template that will be used when adding the Content-Security-Policy header to your requests. $NONCE in the template includes a random nonce.

content_security_policy_report_only

Set to true to add the Content-Security-Policy-Report-Only header to your requests. CSP in Report Only mode enables you to experiment with policies by monitoring their effects without enforcing them. You can enable both policies simultaneously.

content_security_policy_template

Set the policy template that will be used when adding the Content-Security-Policy-Report-Only header to your requests. $NONCE in the template includes a random nonce.

actions_allow_post_url

Sets API paths to be accessible between plugins using the POST verb. If the value is empty, you can only pass remote requests through the proxy. If the value is set, you can also send authenticated POST requests to the local server. You typically use this to enable backend communication between plugins.

This is a comma-separated list which uses glob matching.

This will allow access to all plugins that have a backend:

actions_allow_post_url=/api/plugins/*

This will limit access to the backend of a single plugin:

actions_allow_post_url=/api/plugins/grafana-special-app


angular_support_enabled

This is set to false by default, meaning that the angular framework and support components will not be loaded. This means that all plugins and core features that depend on angular support will stop working.

The core features that depend on angular are:

  • Old graph panel
  • Old table panel

These features each have supported alternatives, and we recommend using them.

csrf_trusted_origins

List of additional allowed URLs to pass by the CSRF check. Suggested when authentication comes from an IdP.

csrf_additional_headers

List of allowed headers to be set by the user. Suggested to use for if authentication lives behind reverse proxies.

csrf_always_check

Set to true to execute the CSRF check even if the login cookie is not in a request (default false).

disable_frontend_sandbox_for_plugins

Comma-separated list of plugins ids that won’t be loaded inside the frontend sandbox. It is recommended to only use this option for plugins that are known to have problems running inside the frontend sandbox.

[snapshots]

enabled

Set to false to disable the snapshot feature (default true).

external_enabled

Set to false to disable external snapshot publish endpoint (default true).

external_snapshot_url

Set root URL to a Grafana instance where you want to publish external snapshots (defaults to https://snapshots.raintank.io).

external_snapshot_name

Set name for external snapshot button. Defaults to Publish to snapshots.raintank.io.

public_mode

Set to true to enable this Grafana instance to act as an external snapshot server and allow unauthenticated requests for creating and deleting snapshots. Default is false.


[dashboards]

versions_to_keep

Number dashboard versions to keep (per dashboard). Default: 20, Minimum: 1.

min_refresh_interval

Only available in Grafana v6.7+.

This feature prevents users from setting the dashboard refresh interval to a lower value than a given interval value. The default interval value is 5 seconds. The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

As of Grafana v7.3, this also limits the refresh interval options in Explore.

default_home_dashboard_path

Path to the default home dashboard. If this value is empty, then Grafana uses StaticRootPath + “dashboards/home.json”.

Note

On Linux, Grafana uses /usr/share/grafana/public/dashboards/home.json as the default home dashboard location.

[sql_datasources]

max_open_conns_default

For SQL data sources (MySql, Postgres, MSSQL) you can override the default maximum number of open connections (default: 100). The value configured in data source settings will be preferred over the default value.

max_idle_conns_default

For SQL data sources (MySql, Postgres, MSSQL) you can override the default allowed number of idle connections (default: 100). The value configured in data source settings will be preferred over the default value.

max_conn_lifetime_default

For SQL data sources (MySql, Postgres, MSSQL) you can override the default maximum connection lifetime specified in seconds (default: 14400). The value configured in data source settings will be preferred over the default value.


[users]

allow_sign_up

Set to false to prohibit users from being able to sign up / create user accounts. Default is false. The admin user can still create users. For more information about creating a user, refer to Add a user.

allow_org_create

Set to false to prohibit users from creating new organizations. Default is false.

auto_assign_org

Set to true to automatically add new users to the main organization (id 1). When set to false, new users automatically cause a new organization to be created for that new user. The organization will be created even if the allow_org_create setting is set to false. Default is true.

auto_assign_org_id

Set this value to automatically add new users to the provided org. This requires auto_assign_org to be set to true. Please make sure that this organization already exists. Default is 1.

auto_assign_org_role

The auto_assign_org_role setting determines the default role assigned to new users in the main organization if auto_assign_org setting is set to true. You can set this to one of the following roles: (Viewer (default), Admin, Editor, and None). For example:

auto_assign_org_role = Viewer

verify_email_enabled

Require email validation before sign up completes or when updating a user email address. Default is false.

login_default_org_id

Set the default organization for users when they sign in. The default is -1.

login_hint

Text used as placeholder text on login page for login/username input.

password_hint

Text used as placeholder text on login page for password input.

default_theme

Sets the default UI theme: dark, light, or system. The default theme is dark.

system matches the user’s system theme.

default_language

This option will set the default UI language if a supported IETF language tag like en-US is available. If set to detect, the default UI language will be determined by browser preference. The default is en-US.

home_page

Path to a custom home page. Users are only redirected to this if the default home dashboard is used. It should match a frontend route and contain a leading slash.

External user management

If you manage users externally you can replace the user invite button for organizations with a link to an external site together with a description.

viewers_can_edit

Viewers can access and use Explore and perform temporary edits on panels in dashboards they have access to. They cannot save their changes. Default is false.

editors_can_admin

Editors can administrate dashboards, folders and teams they create. Default is false.

user_invite_max_lifetime_duration

The duration in time a user invitation remains valid before expiring. This setting should be expressed as a duration. Examples: 6h (hours), 2d (days), 1w (week). Default is 24h (24 hours). The minimum supported duration is 15m (15 minutes).

verification_email_max_lifetime_duration

The duration in time a verification email, used to update the email address of a user, remains valid before expiring. This setting should be expressed as a duration. Examples: 6h (hours), 2d (days), 1w (week). Default is 1h (1 hour).

last_seen_update_interval

The frequency of updating a user’s last seen time. This setting should be expressed as a duration. Examples: 1h (hour), 15m (minutes) Default is 15m (15 minutes). The minimum supported duration is 5m (5 minutes). The maximum supported duration is 1h (1 hour).

hidden_users

This is a comma-separated list of usernames. Users specified here are hidden in the Grafana UI. They are still visible to Grafana administrators and to themselves.


[auth]

Grafana provides many ways to authenticate users. Refer to the Grafana Authentication overview and other authentication documentation for detailed instructions on how to set up and configure authentication.

The cookie name for storing the auth token. Default is grafana_session.

login_maximum_inactive_lifetime_duration

The maximum lifetime (duration) an authenticated user can be inactive before being required to login at next visit. Default is 7 days (7d). This setting should be expressed as a duration, e.g. 5m (minutes), 6h (hours), 10d (days), 2w (weeks), 1M (month). The lifetime resets at each successful token rotation (token_rotation_interval_minutes).

login_maximum_lifetime_duration

The maximum lifetime (duration) an authenticated user can be logged in since login time before being required to login. Default is 30 days (30d). This setting should be expressed as a duration, e.g. 5m (minutes), 6h (hours), 10d (days), 2w (weeks), 1M (month).

token_rotation_interval_minutes

How often auth tokens are rotated for authenticated users when the user is active. The default is each 10 minutes.

disable_login_form

Set to true to disable (hide) the login form, useful if you use OAuth. Default is false.

disable_signout_menu

Set to true to disable the signout link in the side menu. This is useful if you use auth.proxy. Default is false.

signout_redirect_url

The URL the user is redirected to upon signing out. To support OpenID Connect RP-Initiated Logout, the user must add post_logout_redirect_uri to the signout_redirect_url.

Example:

signout_redirect_url = http://localhost:8087/realms/grafana/protocol/openid-connect/logout?post_logout_redirect_uri=http%3A%2F%2Flocalhost%3A3000%2Flogin

oauth_auto_login

Note

This option is deprecated - use auto_login option for specific OAuth provider instead.

Set to true to attempt login with OAuth automatically, skipping the login screen. This setting is ignored if multiple OAuth providers are configured. Default is false.

How many seconds the OAuth state cookie lives before being deleted. Default is 600 (seconds) Administrators can increase this if they experience OAuth login state mismatch errors.

oauth_login_error_message

A custom error message for when users are unauthorized. Default is a key for an internationalized phrase in the frontend, Login provider denied login request.

oauth_refresh_token_server_lock_min_wait_ms

Minimum wait time in milliseconds for the server lock retry mechanism. Default is 1000 (milliseconds). The server lock retry mechanism is used to prevent multiple Grafana instances from simultaneously refreshing OAuth tokens. This mechanism waits at least this amount of time before retrying to acquire the server lock.

There are five retries in total, so with the default value, the total wait time (for acquiring the lock) is at least 5 seconds (the wait time between retries is calculated as random(n, n + 500)), which means that the maximum token refresh duration must be less than 5-6 seconds.

If you experience issues with the OAuth token refresh mechanism, you can increase this value to allow more time for the token refresh to complete.

oauth_skip_org_role_update_sync

Note

This option is removed from G11 in favor of OAuth provider specific skip_org_role_sync settings. The following sections explain settings for each provider.

If you want to change the oauth_skip_org_role_update_sync setting from true to false, then each provider you have set up, use the skip_org_role_sync setting to specify whether you want to skip the synchronization.

Warning

Currently if no organization role mapping is found for a user, Grafana doesn’t update the user’s organization role. With Grafana 10, if oauth_skip_org_role_update_sync option is set to false, users with no mapping will be reset to the default organization role on every login. See auto_assign_org_role option.

skip_org_role_sync

skip_org_role_sync prevents the synchronization of organization roles for a specific OAuth integration, while the deprecated setting oauth_skip_org_role_update_sync affects all configured OAuth providers.

The default value for skip_org_role_sync is false.

With skip_org_role_sync set to false, the users’ organization and role is reset on every new login, based on the external provider’s role. See your provider in the tables below.

With skip_org_role_sync set to true, when a user logs in for the first time, Grafana sets the organization role based on the value specified in auto_assign_org_role and forces the organization to auto_assign_org_id when specified, otherwise it falls back to OrgID 1.

Note: Enabling skip_org_role_sync also disables the synchronization of Grafana Admins from the external provider, as such allow_assign_grafana_admin is ignored.

Use this setting when you want to manage the organization roles of your users from within Grafana and be able to manually assign them to multiple organizations, or to prevent synchronization conflicts when they can be synchronized from another provider.

The behavior of oauth_skip_org_role_update_sync and skip_org_role_sync, can be seen in the tables below:

[auth.grafana_com]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseSynchronize user organization role with Grafana.com role. If no role is provided, auto_assign_org_role is set.false
truefalseSkips organization role synchronization for all OAuth providers’ users. Role is set to auto_assign_org_role.true
falsetrueSkips organization role synchronization for Grafana.com users. Role is set to auto_assign_org_role.true
truetrueSkips organization role synchronization for Grafana.com users and all other OAuth providers. Role is set to auto_assign_org_role.true

[auth.azuread]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseSynchronize user organization role with AzureAD role. If no role is provided, auto_assign_org_role is set.false
truefalseSkips organization role synchronization for all OAuth providers’ users. Role is set to auto_assign_org_role.true
falsetrueSkips organization role synchronization for AzureAD users. Role is set to auto_assign_org_role.true
truetrueSkips organization role synchronization for AzureAD users and all other OAuth providers. Role is set to auto_assign_org_role.true

[auth.google]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseUser organization role is set to auto_assign_org_role and cannot be changed.false
truefalseUser organization role is set to auto_assign_org_role and can be changed in Grafana.true
falsetrueUser organization role is set to auto_assign_org_role and can be changed in Grafana.true
truetrueUser organization role is set to auto_assign_org_role and can be changed in Grafana.true

Note

For GitLab, GitHub, Okta, Generic OAuth providers, Grafana synchronizes organization roles and sets Grafana Admins. The allow_assign_grafana_admin setting is also accounted for, to allow or not setting the Grafana Admin role from the external provider.

[auth.github]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseSynchronize user organization role with GitHub role. If no role is provided, auto_assign_org_role is set.false
truefalseSkips organization role synchronization for all OAuth providers’ users. Role is set to auto_assign_org_role.true
falsetrueSkips organization role and Grafana Admin synchronization for GitHub users. Role is set to auto_assign_org_role.true
truetrueSkips organization role synchronization for all OAuth providers and skips Grafana Admin synchronization for GitHub users. Role is set to auto_assign_org_role.true

[auth.gitlab]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseSynchronize user organization role with Gitlab role. If no role is provided, auto_assign_org_role is set.false
truefalseSkips organization role synchronization for all OAuth providers’ users. Role is set to auto_assign_org_role.true
falsetrueSkips organization role and Grafana Admin synchronization for Gitlab users. Role is set to auto_assign_org_role.true
truetrueSkips organization role synchronization for all OAuth providers and skips Grafana Admin synchronization for Gitlab users. Role is set to auto_assign_org_role.true

[auth.generic_oauth]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseSynchronize user organization role with the provider’s role. If no role is provided, auto_assign_org_role is set.false
truefalseSkips organization role synchronization for all OAuth providers’ users. Role is set to auto_assign_org_role.true
falsetrueSkips organization role and Grafana Admin synchronization for the provider’s users. Role is set to auto_assign_org_role.true
truetrueSkips organization role synchronization for all OAuth providers and skips Grafana Admin synchronization for the provider’s users. Role is set to auto_assign_org_role.true

[auth.okta]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleModifiable
falsefalseSynchronize user organization role with Okta role. If no role is provided, auto_assign_org_role is set.false
truefalseSkips organization role synchronization for all OAuth providers’ users. Role is set to auto_assign_org_role.true
falsetrueSkips organization role and Grafana Admin synchronization for Okta users. Role is set to auto_assign_org_role.true
truetrueSkips organization role synchronization for all OAuth providers and skips Grafana Admin synchronization for Okta users. Role is set to auto_assign_org_role.true

Example skip_org_role_sync

[auth.google]

oauth_skip_org_role_update_syncskip_org_role_syncResulting Org RoleExample Scenario
falsefalseSynchronized with Google Auth organization rolesA user logs in to Grafana using their Google account and their organization role is automatically set based on their role in Google.
truefalseSkipped synchronization of organization roles from all OAuth providersA user logs in to Grafana using their Google account and their organization role is not set based on their role. But Grafana Administrators can modify the role from the UI.
falsetrueSkipped synchronization of organization roles GoogleA user logs in to Grafana using their Google account and their organization role is not set based on their role in Google. But Grafana Administrators can modify the role from the UI.
truetrueSkipped synchronization of organization roles from all OAuth providers including GoogleA user logs in to Grafana using their Google account and their organization role is not set based on their role in Google. But Grafana Administrators can modify the role from the UI.

api_key_max_seconds_to_live

Limit of API key seconds to live before expiration. Default is -1 (unlimited).

sigv4_auth_enabled

Only available in Grafana 7.3+.

Set to true to enable the AWS Signature Version 4 Authentication option for HTTP-based datasources. Default is false.

sigv4_verbose_logging

Only available in Grafana 8.4+.

Set to true to enable verbose request signature logging when AWS Signature Version 4 Authentication is enabled. Default is false.


managed_service_accounts_enabled

Only available in Grafana 11.3+.

Set to true to enable the use of managed service accounts for plugin authentication. Default is false.

Limitations: This feature currently only supports single-organization deployments. The plugin’s service account is automatically created in the default organization. This means the plugin can only access data and resources within that specific organization.

[auth.anonymous]

Refer to Anonymous authentication for detailed instructions.


[auth.github]

Refer to GitHub OAuth2 authentication for detailed instructions.


[auth.gitlab]

Refer to Gitlab OAuth2 authentication for detailed instructions.


[auth.google]

Refer to Google OAuth2 authentication for detailed instructions.


[auth.grafananet]

Legacy key names, still in the config file so they work in env variables.


[auth.grafana_com]

Legacy key names, still in the config file so they work in env variables.


[auth.azuread]

Refer to Azure AD OAuth2 authentication for detailed instructions.


[auth.okta]

Refer to Okta OAuth2 authentication for detailed instructions.


[auth.generic_oauth]

Refer to Generic OAuth authentication for detailed instructions.


[auth.basic]

Refer to Basic authentication for detailed instructions.


[auth.proxy]

Refer to Auth proxy authentication for detailed instructions.


[auth.ldap]

Refer to LDAP authentication for detailed instructions.

[aws]

You can configure core and external AWS plugins.

allowed_auth_providers

Specify what authentication providers the AWS plugins allow. For a list of allowed providers, refer to the data-source configuration page for a given plugin. If you configure a plugin by provisioning, only providers that are specified in allowed_auth_providers are allowed.

Options: default (AWS SDK default), keys (Access and secret key), credentials (Credentials file), ec2_iam_role (EC2 IAM role)

assume_role_enabled

Set to false to disable AWS authentication from using an assumed role with temporary security credentials. For details about assume roles, refer to the AWS API reference documentation about the AssumeRole operation.

If this option is disabled, the Assume Role and the External Id field are removed from the AWS data source configuration page. If the plugin is configured using provisioning, it is possible to use an assumed role as long as assume_role_enabled is set to true.

list_metrics_page_limit

Use the List Metrics API option to load metrics for custom namespaces in the CloudWatch data source. By default, the page limit is 500.


[azure]

Grafana supports additional integration with Azure services when hosted in the Azure Cloud.

cloud

Azure cloud environment where Grafana is hosted:

Azure CloudValue
Microsoft Azure public cloudAzureCloud (default)
Microsoft Chinese national cloudAzureChinaCloud
US Government cloudAzureUSGovernment
Microsoft German national cloud (“Black Forest”)AzureGermanCloud

clouds_config

The JSON config defines a list of Azure clouds and their associated properties when hosted in custom Azure environments.

For example:

ini
clouds_config = `[
		{
			"name":"CustomCloud1",
			"displayName":"Custom Cloud 1",
			"aadAuthority":"https://login.cloud1.contoso.com/",
			"properties":{
				"azureDataExplorerSuffix": ".kusto.windows.cloud1.contoso.com",
				"logAnalytics":            "https://api.loganalytics.cloud1.contoso.com",
				"portal":                  "https://portal.azure.cloud1.contoso.com",
				"prometheusResourceId":    "https://prometheus.monitor.azure.cloud1.contoso.com",
				"resourceManager":         "https://management.azure.cloud1.contoso.com"
			}
		}]`

managed_identity_enabled

Specifies whether Grafana hosted in Azure service with Managed Identity configured (e.g. Azure Virtual Machines instance). Disabled by default, needs to be explicitly enabled.

managed_identity_client_id

The client ID to use for user-assigned managed identity.

Should be set for user-assigned identity and should be empty for system-assigned identity.

workload_identity_enabled

Specifies whether Azure AD Workload Identity authentication should be enabled in datasources that support it.

For more documentation on Azure AD Workload Identity, review Azure AD Workload Identity documentation.

Disabled by default, needs to be explicitly enabled.

workload_identity_tenant_id

Tenant ID of the Azure AD Workload Identity.

Allows to override default tenant ID of the Azure AD identity associated with the Kubernetes service account.

workload_identity_client_id

Client ID of the Azure AD Workload Identity.

Allows to override default client ID of the Azure AD identity associated with the Kubernetes service account.

workload_identity_token_file

Custom path to token file for the Azure AD Workload Identity.

Allows to set a custom path to the projected service account token file.

user_identity_enabled

Specifies whether user identity authentication (on behalf of currently signed-in user) should be enabled in datasources that support it (requires AAD authentication).

Disabled by default, needs to be explicitly enabled.

user_identity_fallback_credentials_enabled

Specifies whether user identity authentication fallback credentials should be enabled in data sources. Enabling this allows data source creators to provide fallback credentials for backend-initiated requests, such as alerting, recorded queries, and so on.

It is by default and needs to be explicitly disabled. It will not have any effect if user identity authentication is disabled.

user_identity_token_url

Override token URL for Azure Active Directory.

By default is the same as token URL configured for AAD authentication settings.

user_identity_client_id

Override ADD application ID which would be used to exchange users token to an access token for the datasource.

By default is the same as used in AAD authentication or can be set to another application (for OBO flow).

user_identity_client_secret

Override the AAD application client secret.

By default is the same as used in AAD authentication or can be set to another application (for OBO flow).

forward_settings_to_plugins

Set plugins that will receive Azure settings via plugin context.

By default, this will include all Grafana Labs owned Azure plugins or those that use Azure settings (Azure Monitor, Azure Data Explorer, Prometheus, MSSQL).

azure_entra_password_credentials_enabled

Specifies whether Entra password auth can be used for the MSSQL data source. This authentication is not recommended and consideration should be taken before enabling this.

Disabled by default, needs to be explicitly enabled.

[auth.jwt]

Refer to JWT authentication for more information.


[smtp]

Email server settings.

enabled

Enable this to allow Grafana to send email. Default is false.

host

Default is localhost:25. Use port 465 for implicit TLS.

user

In case of SMTP auth, default is empty.

password

In case of SMTP auth, default is empty. If the password contains # or ;, then you have to wrap it with triple quotes. Example: “”"#password;"""

cert_file

File path to a cert file, default is empty.

key_file

File path to a key file, default is empty.

skip_verify

Verify SSL for SMTP server, default is false.

from_address

Address used when sending out emails, default is admin@grafana.localhost.

from_name

Name to be used when sending out emails, default is Grafana.

ehlo_identity

Name to be used as client identity for EHLO in SMTP dialog, default is <instance_name>.

startTLS_policy

Either “OpportunisticStartTLS”, “MandatoryStartTLS”, “NoStartTLS”. Default is empty.

enable_tracing

Enable trace propagation in e-mail headers, using the traceparent, tracestate and (optionally) baggage fields. Default is false. To enable, you must first configure tracing in one of the tracing.opentelemetry.* sections.


[smtp.static_headers]

Enter key-value pairs on their own lines to be included as headers on outgoing emails. All keys must be in canonical mail header format. Examples: Foo=bar, Foo-Header=bar.


[emails]

welcome_email_on_sign_up

Default is false.

templates_pattern

Enter a comma separated list of template patterns. Default is emails/*.html, emails/*.txt.

content_types

Enter a comma-separated list of content types that should be included in the emails that are sent. List the content types according descending preference, e.g. text/html, text/plain for HTML as the most preferred. The order of the parts is significant as the mail clients will use the content type that is supported and most preferred by the sender. Supported content types are text/html and text/plain. Default is text/html.


[log]

Grafana logging options.

mode

Options are “console”, “file”, and “syslog”. Default is “console” and “file”. Use spaces to separate multiple modes, e.g. console file.

level

Options are “debug”, “info”, “warn”, “error”, and “critical”. Default is info.

filters

Optional settings to set different levels for specific loggers. For example: filters = sqlstore:debug

user_facing_default_error

Use this configuration option to set the default error message shown to users. This message is displayed instead of sensitive backend errors, which should be obfuscated. The default message is Please inspect the Grafana server log for details..


[log.console]

Only applicable when “console” is used in [log] mode.

level

Options are “debug”, “info”, “warn”, “error”, and “critical”. Default is inherited from [log] level.

format

Log line format, valid options are text, console and json. Default is console.


[log.file]

Only applicable when “file” used in [log] mode.

level

Options are “debug”, “info”, “warn”, “error”, and “critical”. Default is inherited from [log] level.

format

Log line format, valid options are text, console and json. Default is text.

log_rotate

Enable automated log rotation, valid options are false or true. Default is true. When enabled use the max_lines, max_size_shift, daily_rotate and max_days to configure the behavior of the log rotation.

max_lines

Maximum lines per file before rotating it. Default is 1000000.

max_size_shift

Maximum size of file before rotating it. Default is 28, which means 1 << 28, 256MB.

daily_rotate

Enable daily rotation of files, valid options are false or true. Default is true.

max_days

Maximum number of days to keep log files. Default is 7.


[log.syslog]

Only applicable when “syslog” used in [log] mode.

level

Options are “debug”, “info”, “warn”, “error”, and “critical”. Default is inherited from [log] level.

format

Log line format, valid options are text, console, and json. Default is text.

network and address

Syslog network type and address. This can be UDP, TCP, or UNIX. If left blank, then the default UNIX endpoints are used.

facility

Syslog facility. Valid options are user, daemon or local0 through local7. Default is empty.

tag

Syslog tag. By default, the process’s argv[0] is used.


[log.frontend]

Note: This feature is available in Grafana 7.4+.

enabled

Faro javascript agent is initialized. Default is false.

custom_endpoint

Custom HTTP endpoint to send events captured by the Faro agent to. Default, /log-grafana-javascript-agent, will log the events to stdout.

log_endpoint_requests_per_second_limit

Requests per second limit enforced per an extended period, for Grafana backend log ingestion endpoint, /log-grafana-javascript-agent. Default is 3.

log_endpoint_burst_limit

Maximum requests accepted per short interval of time for Grafana backend log ingestion endpoint, /log-grafana-javascript-agent. Default is 15.

instrumentations_errors_enabled

Turn on error instrumentation. Only affects Grafana Javascript Agent.

instrumentations_console_enabled

Turn on console instrumentation. Only affects Grafana Javascript Agent

instrumentations_webvitals_enabled

Turn on webvitals instrumentation. Only affects Grafana Javascript Agent

instrumentations_tracing_enabled

Turns on tracing instrumentation. Only affects Grafana Javascript Agent.

api_key

If custom_endpoint required authentication, you can set the API key here. Only relevant for Grafana Javascript Agent provider.


[quota]

Set quotas to -1 to make unlimited.

enabled

Enable usage quotas. Default is false.

org_user

Limit the number of users allowed per organization. Default is 10.

org_dashboard

Limit the number of dashboards allowed per organization. Default is 100.

org_data_source

Limit the number of data sources allowed per organization. Default is 10.

org_api_key

Limit the number of API keys that can be entered per organization. Default is 10.

org_alert_rule

Limit the number of alert rules that can be entered per organization. Default is 100.

user_org

Limit the number of organizations a user can create. Default is 10.

global_user

Sets a global limit of users. Default is -1 (unlimited).

global_org

Sets a global limit on the number of organizations that can be created. Default is -1 (unlimited).

global_dashboard

Sets a global limit on the number of dashboards that can be created. Default is -1 (unlimited).

global_api_key

Sets global limit of API keys that can be entered. Default is -1 (unlimited).

global_session

Sets a global limit on number of users that can be logged in at one time. Default is -1 (unlimited).

global_alert_rule

Sets a global limit on number of alert rules that can be created. Default is -1 (unlimited).

global_correlations

Sets a global limit on number of correlations that can be created. Default is -1 (unlimited).

alerting_rule_evaluation_results

Limit the number of query evaluation results per alert rule. If the condition query of an alert rule produces more results than this limit, the evaluation results in an error. Default is -1 (unlimited).


[unified_alerting]

For more information about the Grafana alerts, refer to Grafana Alerting.

enabled

Enable or disable Grafana Alerting. The default value is true.

Alerting rules migrated from dashboards and panels will include a link back via the annotations.

disabled_orgs

Comma-separated list of organization IDs for which to disable Grafana 8 Unified Alerting.

admin_config_poll_interval

Specify the frequency of polling for admin config changes. The default value is 60s.

The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

alertmanager_config_poll_interval

Specify the frequency of polling for Alertmanager config changes. The default value is 60s.

The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

ha_redis_address

The Redis server address that should be connected to.

Note

For more information on Redis, refer to Enable alerting high availability using Redis.

ha_redis_username

The username that should be used to authenticate with the Redis server.

ha_redis_password

The password that should be used to authenticate with the Redis server.

ha_redis_db

The Redis database. The default value is 0.

ha_redis_prefix

A prefix that is used for every key or channel that is created on the Redis server as part of HA for alerting.

ha_redis_peer_name

The name of the cluster peer that will be used as an identifier. If none is provided, a random one will be generated.

ha_redis_max_conns

The maximum number of simultaneous Redis connections.

ha_listen_address

Listen IP address and port to receive unified alerting messages for other Grafana instances. The port is used for both TCP and UDP. It is assumed other Grafana instances are also running on the same port. The default value is 0.0.0.0:9094.

ha_advertise_address

Explicit IP address and port to advertise other Grafana instances. The port is used for both TCP and UDP.

ha_peers

Comma-separated list of initial instances (in a format of host:port) that will form the HA cluster. Configuring this setting will enable High Availability mode for alerting.

ha_peer_timeout

Time to wait for an instance to send a notification via the Alertmanager. In HA, each Grafana instance will be assigned a position (e.g. 0, 1). We then multiply this position with the timeout to indicate how long should each instance wait before sending the notification to take into account replication lag. The default value is 15s.

The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

ha_label

The label is an optional string to include on each packet and stream. It uniquely identifies the cluster and prevents cross-communication issues when sending gossip messages in an environment with multiple clusters.

ha_gossip_interval

The interval between sending gossip messages. By lowering this value (more frequent) gossip messages are propagated across cluster more quickly at the expense of increased bandwidth usage. The default value is 200ms.

The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

ha_reconnect_timeout

Length of time to attempt to reconnect to a lost peer. When running Grafana in a Kubernetes cluster, set this duration to less than 15m.

The string is a possibly signed sequence of decimal numbers followed by a unit suffix (ms, s, m, h, d), such as 30s or 1m.

ha_push_pull_interval

The interval between gossip full state syncs. Setting this interval lower (more frequent) will increase convergence speeds across larger clusters at the expense of increased bandwidth usage. The default value is 60s.

The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

execute_alerts

Enable or disable alerting rule execution. The default value is true. The alerting UI remains visible.

evaluation_timeout

Sets the alert evaluation timeout when fetching data from the data source. The default value is 30s.

The timeout string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

max_attempts

Sets a maximum number of times we’ll attempt to evaluate an alert rule before giving up on that evaluation. The default value is 1.

min_interval

Sets the minimum interval to enforce between rule evaluations. The default value is 10s which equals the scheduler interval. Rules will be adjusted if they are less than this value or if they are not multiple of the scheduler interval (10s). Higher values can help with resource management as we’ll schedule fewer evaluations over time.

The interval string is a possibly signed sequence of decimal numbers, followed by a unit suffix (ms, s, m, h, d), e.g. 30s or 1m.

Note. This setting has precedence over each individual rule frequency. If a rule frequency is lower than this value, then this value is enforced.


[unified_alerting.screenshots]

For more information about screenshots, refer to Images in notifications.

capture

Enable screenshots in notifications. This option requires a remote HTTP image rendering service. Please see [rendering] for further configuration options.

capture_timeout

The timeout for capturing screenshots. If a screenshot cannot be captured within the timeout then the notification is sent without a screenshot. The maximum duration is 30 seconds. This timeout should be less than the minimum Interval of all Evaluation Groups to avoid back pressure on alert rule evaluation.

max_concurrent_screenshots

The maximum number of screenshots that can be taken at the same time. This option is different from concurrent_render_request_limit as max_concurrent_screenshots sets the number of concurrent screenshots that can be taken at the same time for all firing alerts where as concurrent_render_request_limit sets the total number of concurrent screenshots across all Grafana services.

upload_external_image_storage

Uploads screenshots to the local Grafana server or remote storage such as Azure, S3 and GCS. Please see [external_image_storage] for further configuration options. If this option is false then screenshots will be persisted to disk for up to temp_data_lifetime.


[unified_alerting.reserved_labels]

For more information about Grafana Reserved Labels, refer to Labels in Grafana Alerting

disabled_labels

Comma-separated list of reserved labels added by the Grafana Alerting engine that should be disabled.

For example: disabled_labels=grafana_folder


[unified_alerting.state_history.annotations]

This section controls retention of annotations automatically created while evaluating alert rules when alerting state history backend is configured to be annotations (see setting [unified_alerting.state_history].backend)

max_age

Configures for how long alert annotations are stored. Default is 0, which keeps them forever. This setting should be expressed as an duration. Ex 6h (hours), 10d (days), 2w (weeks), 1M (month).

max_annotations_to_keep

Configures max number of alert annotations that Grafana stores. Default value is 0, which keeps all alert annotations.


[annotations]

cleanupjob_batchsize

Configures the batch size for the annotation clean-up job. This setting is used for dashboard, API, and alert annotations.

tags_length

Enforces the maximum allowed amount of tags for any newly introduced annotations. This value can be between 500 and 4096 (inclusive). The default value is 500. Setting it to a higher value would impact performance and is therefore not recommended.

[annotations.dashboard]

Dashboard annotations means that annotations are associated with the dashboard they are created on.

max_age

Configures how long dashboard annotations are stored. Default is 0, which keeps them forever. This setting should be expressed as a duration. Examples: 6h (hours), 10d (days), 2w (weeks), 1M (month).

max_annotations_to_keep

Configures max number of dashboard annotations that Grafana stores. Default value is 0, which keeps all dashboard annotations.

[annotations.api]

API annotations means that the annotations have been created using the API without any association with a dashboard.

max_age

Configures how long Grafana stores API annotations. Default is 0, which keeps them forever. This setting should be expressed as a duration. Examples: 6h (hours), 10d (days), 2w (weeks), 1M (month).

max_annotations_to_keep

Configures max number of API annotations that Grafana keeps. Default value is 0, which keeps all API annotations.


[explore]

For more information about this feature, refer to Explore.

enabled

Enable or disable the Explore section. Default is enabled.

defaultTimeOffset

Set a default time offset from now on the time picker. Default is 1 hour. This setting should be expressed as a duration. Examples: 1h (hour), 1d (day), 1w (week), 1M (month).

[help]

Configures the help section.

enabled

Enable or disable the Help section. Default is enabled.

[profile]

Configures the Profile section.

enabled

Enable or disable the Profile section. Default is enabled.

[news]

news_feed_enabled

Enables the news feed section. Default is true


[query]

concurrent_query_limit

Set the number of queries that can be executed concurrently in a mixed data source panel. Default is the number of CPUs.

[query_history]

Configures Query history in Explore.

enabled

Enable or disable the Query history. Default is enabled.


Configures settings around the short link feature.

expire_time

Short links which are never accessed are considered expired or stale, and will be deleted as cleanup. Set the expiration time in days. Default is 7 days. Maximum is 365 days, and setting above the maximum will have 365 set instead. Setting 0 means the short links will be cleaned up approximately every 10 minutes.


[metrics]

For detailed instructions, refer to Internal Grafana metrics.

enabled

Enable metrics reporting. defaults true. Available via HTTP API <URL>/metrics.

interval_seconds

Flush/write interval when sending metrics to external TSDB. Defaults to 10.

disable_total_stats

If set to true, then total stats generation (stat_totals_* metrics) is disabled. Default is false.

total_stats_collector_interval_seconds

Sets the total stats collector interval. The default is 1800 seconds (30 minutes).

basic_auth_username and basic_auth_password

If both are set, then basic authentication is required to access the metrics endpoint.


[metrics.environment_info]

Adds dimensions to the grafana_environment_info metric, which can expose more information about the Grafana instance.

; exampleLabel1 = exampleValue1
; exampleLabel2 = exampleValue2

[metrics.graphite]

Use these options if you want to send internal Grafana metrics to Graphite.

address

Enable by setting the address. Format is <Hostname or ip>:port.

prefix

Graphite metric prefix. Defaults to prod.grafana.%(instance_name)s.


[grafana_net]

Refer to [grafana_com] config as that is the new and preferred config name. The grafana_net config is still accepted and parsed to grafana_com config.


[grafana_com]

url

Default is https://grafana.com. The default authentication identity provider for Grafana Cloud.


[tracing.jaeger]

[Deprecated - use tracing.opentelemetry.jaeger or tracing.opentelemetry.otlp instead]

Configure Grafana’s Jaeger client for distributed tracing.

You can also use the standard JAEGER_* environment variables to configure Jaeger. See the table at the end of https://www.jaegertracing.io/docs/1.16/client-features/ for the full list. Environment variables will override any settings provided here.

address

The host:port destination for reporting spans. (ex: localhost:6831)

Can be set with the environment variables JAEGER_AGENT_HOST and JAEGER_AGENT_PORT.

always_included_tag

Comma-separated list of tags to include in all new spans, such as tag1:value1,tag2:value2.

Can be set with the environment variable JAEGER_TAGS (use = instead of : with the environment variable).

sampler_type

Default value is const.

Specifies the type of sampler: const, probabilistic, ratelimiting, or remote.

Refer to https://www.jaegertracing.io/docs/1.16/sampling/#client-sampling-configuration for details on the different tracing types.

Can be set with the environment variable JAEGER_SAMPLER_TYPE.

To override this setting, enter sampler_type in the tracing.opentelemetry section.

sampler_param

Default value is 1.

This is the sampler configuration parameter. Depending on the value of sampler_type, it can be 0, 1, or a decimal value in between.

  • For const sampler, 0 or 1 for always false/true respectively
  • For probabilistic sampler, a probability between 0 and 1.0
  • For rateLimiting sampler, the number of spans per second
  • For remote sampler, param is the same as for probabilistic and indicates the initial sampling rate before the actual one is received from the mothership

May be set with the environment variable JAEGER_SAMPLER_PARAM.

Setting sampler_param in the tracing.opentelemetry section will override this setting.

sampling_server_url

sampling_server_url is the URL of a sampling manager providing a sampling strategy.

Setting sampling_server_url in the tracing.opentelemetry section will override this setting.

zipkin_propagation

Default value is false.

Controls whether or not to use Zipkin’s span propagation format (with x-b3- HTTP headers). By default, Jaeger’s format is used.

Can be set with the environment variable and value JAEGER_PROPAGATION=b3.

disable_shared_zipkin_spans

Default value is false.

Setting this to true turns off shared RPC spans. Leaving this available is the most common setting when using Zipkin elsewhere in your infrastructure.


[tracing.opentelemetry]

Configure general parameters shared between OpenTelemetry providers.

custom_attributes

Comma-separated list of attributes to include in all new spans, such as key1:value1,key2:value2.

Can be set or overridden with the environment variable OTEL_RESOURCE_ATTRIBUTES (use = instead of : with the environment variable). The service name can be set or overridden using attributes or with the environment variable OTEL_SERVICE_NAME.

sampler_type

Default value is const.

Specifies the type of sampler: const, probabilistic, ratelimiting, or remote.

sampler_param

Default value is 1.

Depending on the value of sampler_type, the sampler configuration parameter can be 0, 1, or any decimal value between 0 and 1.

  • For the const sampler, use 0 to never sample or 1 to always sample
  • For the probabilistic sampler, you can use a decimal value between 0.0 and 1.0
  • For the rateLimiting sampler, enter the number of spans per second
  • For the remote sampler, use a decimal value between 0.0 and 1.0 to specify the initial sampling rate used before the first update is received from the sampling server

sampling_server_url

When sampler_type is remote, this specifies the URL of the sampling server. This can be used by all tracing providers.

Use a sampling server that supports the Jaeger remote sampling API, such as jaeger-agent, jaeger-collector, opentelemetry-collector-contrib, or Grafana Alloy.


[tracing.opentelemetry.jaeger]

Configure Grafana’s Jaeger client for distributed tracing.

address

The host:port destination for reporting spans. (ex: localhost:14268/api/traces)

propagation

The propagation specifies the text map propagation format. The values jaeger and w3c are supported. Add a comma (,) between values to specify multiple formats (for example, "jaeger,w3c"). The default value is w3c.


[tracing.opentelemetry.otlp]

Configure Grafana’s otlp client for distributed tracing.

address

The host:port destination for reporting spans. (ex: localhost:4317)

propagation

The propagation specifies the text map propagation format. The values jaeger and w3c are supported. Add a comma (,) between values to specify multiple formats (for example, "jaeger,w3c"). The default value is w3c.


[external_image_storage]

These options control how images should be made public so they can be shared on services like Slack or email message.

provider

Options are s3, webdav, gcs, azure_blob, local). If left empty, then Grafana ignores the upload action.


[external_image_storage.s3]

endpoint

Optional endpoint URL (hostname or fully qualified URI) to override the default generated S3 endpoint. If you want to keep the default, just leave this empty. You must still provide a region value if you specify an endpoint.

path_style_access

Set this to true to force path-style addressing in S3 requests, i.e., http://s3.amazonaws.com/BUCKET/KEY, instead of the default, which is virtual hosted bucket addressing when possible (http://BUCKET.s3.amazonaws.com/KEY).

Note

This option is specific to the Amazon S3 service.

bucket_url

(for backward compatibility, only works when no bucket or region are configured) Bucket URL for S3. AWS region can be specified within URL or defaults to ‘us-east-1’, e.g.

bucket

Bucket name for S3. e.g. grafana.snapshot.

region

Region name for S3. e.g. ‘us-east-1’, ‘cn-north-1’, etc.

path

Optional extra path inside bucket, useful to apply expiration policies.

access_key

Access key, e.g. AAAAAAAAAAAAAAAAAAAA.

Access key requires permissions to the S3 bucket for the ‘s3:PutObject’ and ‘s3:PutObjectAcl’ actions.

secret_key

Secret key, e.g. AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA.


[external_image_storage.webdav]

url

URL where Grafana sends PUT request with images.

username

Basic auth username.

password

Basic auth password.

public_url

Optional URL to send to users in notifications. If the string contains the sequence {{file}}, it is replaced with the uploaded filename. Otherwise, the file name is appended to the path part of the URL, leaving any query string unchanged.


[external_image_storage.gcs]

key_file

Optional path to JSON key file associated with a Google service account to authenticate and authorize. If no value is provided it tries to use the application default credentials. Service Account keys can be created and downloaded from https://console.developers.google.com/permissions/serviceaccounts.

Service Account should have “Storage Object Writer” role. The access control model of the bucket needs to be “Set object-level and bucket-level permissions”. Grafana itself will make the images public readable when signed urls are not enabled.

bucket

Bucket Name on Google Cloud Storage.

path

Optional extra path inside bucket.

enable_signed_urls

If set to true, Grafana creates a signed URL for the image uploaded to Google Cloud Storage.

signed_url_expiration

Sets the signed URL expiration, which defaults to seven days.

[external_image_storage.azure_blob]

account_name

Storage account name.

account_key

Storage account key

container_name

Container name where to store “Blob” images with random names. Creating the blob container beforehand is required. Only public containers are supported.

sas_token_expiration_days

Number of days for SAS token validity. If specified SAS token will be attached to image URL. Allow storing images in private containers.


[external_image_storage.local]

This option does not require any configuration.


[rendering]

Options to configure a remote HTTP image rendering service, e.g. using https://github.com/grafana/grafana-image-renderer.

renderer_token

Note

Available in Grafana v9.1.2 and Image Renderer v3.6.1 or later.

An auth token will be sent to and verified by the renderer. The renderer will deny any request without an auth token matching the one configured on the renderer.

server_url

URL to a remote HTTP image renderer service, e.g. http://localhost:8081/render, will enable Grafana to render panels and dashboards to PNG-images using HTTP requests to an external service.

callback_url

If the remote HTTP image renderer service runs on a different server than the Grafana server you may have to configure this to a URL where Grafana is reachable, e.g. http://grafana.domain/.

concurrent_render_request_limit

Concurrent render request limit affects when the /render HTTP endpoint is used. Rendering many images at the same time can overload the server, which this setting can help protect against by only allowing a certain number of concurrent requests. Default is 30.

default_image_width

Configures the width of the rendered image. The default width is 1000.

default_image_height

Configures the height of the rendered image. The default height is 500.

default_image_scale

Configures the scale of the rendered image. The default scale is 1.

[panels]

enable_alpha

Set to true if you want to test alpha panels that are not yet ready for general usage. Default is false.

disable_sanitize_html

Note

This configuration is not available in Grafana Cloud instances.

If set to true Grafana will allow script tags in text panels. Not recommended as it enables XSS vulnerabilities. Default is false.

[plugins]

enable_alpha

Set to true if you want to test alpha plugins that are not yet ready for general usage. Default is false.

allow_loading_unsigned_plugins

Enter a comma-separated list of plugin identifiers to identify plugins to load even if they are unsigned. Plugins with modified signatures are never loaded.

We do not recommend using this option. For more information, refer to Plugin signatures.

plugin_admin_enabled

Available to Grafana administrators only, enables installing / uninstalling / updating plugins directly from the Grafana UI. Set to true by default. Setting it to false will hide the install / uninstall / update controls.

For more information, refer to Plugin catalog.

plugin_admin_external_manage_enabled

Set to true if you want to enable external management of plugins. Default is false. This is only applicable to Grafana Cloud users.

plugin_catalog_url

Custom install/learn more URL for enterprise plugins. Defaults to https://grafana.com/grafana/plugins/.

plugin_catalog_hidden_plugins

Enter a comma-separated list of plugin identifiers to hide in the plugin catalog.

public_key_retrieval_disabled

Disable download of the public key for verifying plugin signature. The default is false. If disabled, it will use the hardcoded public key.

public_key_retrieval_on_startup

Force download of the public key for verifying plugin signature on startup. The default is false. If disabled, the public key will be retrieved every 10 days. Requires public_key_retrieval_disabled to be false to have any effect.

disable_plugins

Enter a comma-separated list of plugin identifiers to avoid loading (including core plugins). These plugins will be hidden in the catalog.


[live]

max_connections

Note

Available in Grafana v8.0 and later versions.

The max_connections option specifies the maximum number of connections to the Grafana Live WebSocket endpoint per Grafana server instance. Default is 100.

Refer to Grafana Live configuration documentation if you specify a number higher than default since this can require some operating system and infrastructure tuning.

0 disables Grafana Live, -1 means unlimited connections.

allowed_origins

Note

Available in Grafana v8.0.4 and later versions.

The allowed_origins option is a comma-separated list of additional origins (Origin header of HTTP Upgrade request during WebSocket connection establishment) that will be accepted by Grafana Live.

If not set (default), then the origin is matched over root_url which should be sufficient for most scenarios.

Origin patterns support wildcard symbol “*”.

For example:

ini
[live]
allowed_origins = "https://*.example.com"

ha_engine

Note

Available in Grafana v8.1 and later versions.

Experimental

The high availability (HA) engine name for Grafana Live. By default, it’s not set. The only possible value is “redis”.

For more information, refer to the Configure Grafana Live HA setup.

ha_engine_address

Note

Available in Grafana v8.1 and later versions.

Experimental

Address string of selected the high availability (HA) Live engine. For Redis, it’s a host:port string. Example:

ini
[live]
ha_engine = redis
ha_engine_address = 127.0.0.1:6379

[plugin.plugin_id]

This section can be used to configure plugin-specific settings. Replace the plugin_id attribute with the plugin ID present in plugin.json.

Properties described in this section are available for all plugins, but you must set them individually for each plugin.

tracing

Note

Available in Grafana v9.5.0 or later, and OpenTelemetry must be configured as well.

If true, propagate the tracing context to the plugin backend and enable tracing (if the backend supports it).

as_external

Load an external version of a core plugin if it has been installed.

Experimental. Requires the feature toggle externalCorePlugins to be enabled.


[plugin.grafana-image-renderer]

For more information, refer to Image rendering.

rendering_timezone

Instruct headless browser instance to use a default timezone when not provided by Grafana, e.g. when rendering panel image of alert. See ICUs metaZones.txt for a list of supported timezone IDs. Fallbacks to TZ environment variable if not set.

rendering_language

Instruct headless browser instance to use a default language when not provided by Grafana, e.g. when rendering panel image of alert. Refer to the HTTP header Accept-Language to understand how to format this value, e.g. ‘fr-CH, fr;q=0.9, en;q=0.8, de;q=0.7, *;q=0.5’.

rendering_viewport_device_scale_factor

Instruct headless browser instance to use a default device scale factor when not provided by Grafana, e.g. when rendering panel image of alert. Default is 1. Using a higher value will produce more detailed images (higher DPI), but requires more disk space to store an image.

rendering_ignore_https_errors

Instruct headless browser instance whether to ignore HTTPS errors during navigation. Per default HTTPS errors are not ignored. Due to the security risk, we do not recommend that you ignore HTTPS errors.

rendering_verbose_logging

Instruct headless browser instance whether to capture and log verbose information when rendering an image. Default is false and will only capture and log error messages.

When enabled, debug messages are captured and logged as well.

For the verbose information to be included in the Grafana server log you have to adjust the rendering log level to debug, configure [log].filter = rendering:debug.

rendering_dumpio

Instruct headless browser instance whether to output its debug and error messages into running process of remote rendering service. Default is false.

It can be useful to set this to true when troubleshooting.

rendering_timing_metrics

Note: Available from grafana-image-renderer v3.9.0+

Instruct a headless browser instance on whether to record metrics for the duration of every rendering step. Default is false.

Setting this to true when optimizing the rendering mode settings to improve the plugin performance or when troubleshooting can be useful.

rendering_args

Additional arguments to pass to the headless browser instance. Defaults are --no-sandbox,--disable-gpu. The list of Chromium flags can be found at (https://peter.sh/experiments/chromium-command-line-switches/). Separate multiple arguments with commas.

rendering_chrome_bin

You can configure the plugin to use a different browser binary instead of the pre-packaged version of Chromium.

Please note that this is not recommended. You might encounter problems if the installed version of Chrome/Chromium is not compatible with the plugin.

rendering_mode

Instruct how headless browser instances are created. Default is default and will create a new browser instance on each request.

Mode clustered will make sure that only a maximum of browsers/incognito pages can execute concurrently.

Mode reusable will have one browser instance and will create a new incognito page on each request.

rendering_clustering_mode

When rendering_mode = clustered, you can instruct how many browsers or incognito pages can execute concurrently. Default is browser and will cluster using browser instances.

Mode context will cluster using incognito pages.

rendering_clustering_max_concurrency

When rendering_mode = clustered, you can define the maximum number of browser instances/incognito pages that can execute concurrently. Default is 5.

rendering_clustering_timeout

Note

Available in grafana-image-renderer v3.3.0 and later versions.

When rendering_mode = clustered, you can specify the duration a rendering request can take before it will time out. Default is 30 seconds.

rendering_viewport_max_width

Limit the maximum viewport width that can be requested.

rendering_viewport_max_height

Limit the maximum viewport height that can be requested.

rendering_viewport_max_device_scale_factor

Limit the maximum viewport device scale factor that can be requested.

grpc_host

Change the listening host of the gRPC server. Default host is 127.0.0.1.

grpc_port

Change the listening port of the gRPC server. Default port is 0 and will automatically assign a port not in use.


[enterprise]

For more information about Grafana Enterprise, refer to Grafana Enterprise.


[feature_toggles]

enable

Keys of features to enable, separated by space.

FEATURE_TOGGLE_NAME = false

Some feature toggles for stable features are on by default. Use this setting to disable an on-by-default feature toggle with the name FEATURE_TOGGLE_NAME, for example, exploreMixedDatasource = false.


[feature_management]

The options in this section configure the experimental Feature Toggle Admin Page feature, which is enabled using the featureToggleAdminPage feature toggle. Grafana Labs offers support on a best-effort basis, and breaking changes might occur prior to the feature being made generally available.

Please see Configure feature toggles for more information.

allow_editing

Lets you switch the feature toggle state in the feature management page. The default is false.

update_webhook

Set the URL of the controller that manages the feature toggle updates. If not set, feature toggles in the feature management page will be read-only.

Note

The API for feature toggle updates has not been defined yet.

hidden_toggles

Hide additional specific feature toggles from the feature management page. By default, feature toggles in the unknown, experimental, and private preview stages are hidden from the UI. Use this option to hide toggles in the public preview, general availability, and deprecated stages.

read_only_toggles

Use to disable updates for additional specific feature toggles in the feature management page. By default, feature toggles can only be updated if they are in the general availability and deprecatedstages. Use this option to disable updates for toggles in those stages.


[date_formats]

Note

The date format options below are only available in Grafana v7.2+.

This section controls system-wide defaults for date formats used in time ranges, graphs, and date input boxes.

The format patterns use Moment.js formatting tokens.

full_date

Full date format used by time range picker and in other places where a full date is rendered.

intervals

These intervals formats are used in the graph to show only a partial date or time. For example, if there are only minutes between Y-axis tick labels then the interval_minute format is used.

Defaults

interval_second = HH:mm:ss
interval_minute = HH:mm
interval_hour = MM/DD HH:mm
interval_day = MM/DD
interval_month = YYYY-MM
interval_year = YYYY

use_browser_locale

Set this to true to have date formats automatically derived from your browser location. Defaults to false. This is an experimental feature.

default_timezone

Used as the default time zone for user preferences. Can be either browser for the browser local time zone or a time zone name from the IANA Time Zone database, such as UTC or Europe/Amsterdam.

default_week_start

Set the default start of the week, valid values are: saturday, sunday, monday or browser to use the browser locale to define the first day of the week. Default is browser.

[expressions]

Note

This feature is available in Grafana v7.4 and later versions.

enabled

Set this to false to disable expressions and hide them in the Grafana UI. Default is true.

[geomap]

This section controls the defaults settings for Geomap Plugin.

default_baselayer_config

The json config used to define the default base map. Four base map options to choose from are carto, esriXYZTiles, xyzTiles, standard. For example, to set cartoDB light as the default base layer:

ini
default_baselayer_config = `{
  "type": "xyz",
  "config": {
    "attribution": "Open street map",
    "url": "https://tile.openstreetmap.org/{z}/{x}/{y}.png"
  }
}`

enable_custom_baselayers

Set this to false to disable loading other custom base maps and hide them in the Grafana UI. Default is true.

[rbac]

Refer to Role-based access control for more information.

Move an app plugin (referenced by its id), including all its pages, to a specific navigation section. Format: <pluginId> = <sectionId> <sortWeight>

Move an individual app plugin page (referenced by its path field) to a specific navigation section. Format: <pageUrl> = <sectionId> <sortWeight>

[public_dashboards]

This section configures the public dashboards feature.

enabled

Set this to false to disable the public dashboards feature. This prevents users from creating new public dashboards and disables existing ones.