Grafana Enterprise configuration
This page describes Grafana Enterprise-specific configuration options that you can specify in a
.ini configuration file or using environment variables. Refer to Configuration for more information about available configuration options.
Set to your company name to override application title.
Set to complete URL to override login logo.
Set to complete CSS background expression to override login background. Example:
[white_labeling] login_background = url(http://www.bhmpics.com/wallpapers/starfield-1920x1080.jpg)
Set to complete URL to override menu logo.
Set to complete URL to override fav icon (icon shown in browser tab).
Set to complete URL to override Apple/iOS icon.
List the link IDs to use here. Grafana will look for matching link configurations, the link IDs should be space-separated and contain no whitespace.
Max age for data files before they get deleted.
Max size in megabytes of the data files directory before files get deleted.
The directory where events will be stored in.
Interval for writing dashboard usage stats buffer to database.
Timeout for writing dashboard usage stats buffer to database.
Interval for trying to roll up per dashboard usage summary. Only rolled up at most once per day.
Timeout for trying to rollup per dashboard usage summary.
Age for recent active users.
Timeout for each panel rendering request.
Maximum number of concurrent calls to the rendering service.
Scale factor for rendering images. Value
2 is enough for monitor resolutions,
4 would be better for printed material. Setting a higher value affects performance and memory.
Auditing allows you to track important changes to your Grafana instance. By default, audit logs are logged to file but the auditing feature also supports sending logs directly to Loki.
Enable the auditing feature. Defaults to false.
List of enabled loggers.
Keep dashboard content in the logs (request or response fields). This can significantly increase the size of your logs.
Path to logs folder.
Maximum log files to keep.
Max size in megabytes per log file.
Set the URL for writing logs to Loki.
If true, it establishes a secure connection to Loki. Defaults to true.
If true, the feature is enabled. Defaults to false.
Base64-encoded public X.509 certificate. Used to sign requests to the IdP.
Path to the public X.509 certificate. Used to sign requests to the IdP.
Base64-encoded private key. Used to decrypt assertions from the IdP.
Path to the private key. Used to decrypt assertions from the IdP.
Base64-encoded IdP SAML metadata XML. Used to verify and obtain binding locations from the IdP.
Path to the SAML metadata XML. Used to verify and obtain binding locations from the IdP.
URL to fetch SAML IdP metadata. Used to verify and obtain binding locations from the IdP.
Time since the IdP issued a response and the SP is allowed to process it. Defaults to 90 seconds.
How long the SPs metadata is valid. Defaults to 48 hours.
Friendly name or name of the attribute within the SAML assertion to use as the user name.
Friendly name or name of the attribute within the SAML assertion to use as the user login handle.
Friendly name or name of the attribute within the SAML assertion to use as the user email.
Friendly name or name of the attribute within the SAML assertion to use as the user groups.
Friendly name or name of the attribute within the SAML assertion to use as the user roles.
Friendly name or name of the attribute within the SAML assertion to use as the user organization.
List of comma- or space-separated organizations. Each user must be a member of at least one organization to log in.
List of comma- or space-separated Organization:OrgId mappings.
List of comma- or space-separated roles that will be mapped to the Editor role.
List of comma- or space-separated roles that will be mapped to the Admin role.
List of comma- or space-separated roles that will be mapped to the Grafana Admin (Super Admin) role.
Location of the Vault server.
Vault namespace if using Vault with multi-tenancy.
Method for authenticating towards Vault. Vault is inactive if this option is not set. Current possible values:
Secret token to connect to Vault when auth_method is
Time between checking if there are any secrets which needs to be renewed.
Time until expiration for tokens which are renewed. Should have a value higher than lease_renewal_interval.
New duration for renewed tokens. Vault may be configured to ignore this value and impose a stricter limit.