Grafana fundamentals

Grafana Labs Team
By Grafana Labs Team

Last update on March 28, 2024

Beginner

Introduction

In this tutorial, you’ll learn how to use Grafana to set up a monitoring solution for your application, and:

  • Explore metrics and logs
  • Build dashboards
  • Annotate dashboards
  • Set up alerts

Alternatively, you can also watch our Grafana for Beginners series where we discuss fundamental concepts to help you get started with Grafana.

Prerequisites

KillerCoda sandbox environment (Alternative)

If you would prefer to follow along with this tutorial without needing to set up a local environment, you can use the KillerCoda sandbox environment.

Set up the sample application

This tutorial uses a sample application to demonstrate some of the features in Grafana. To complete the exercises in this tutorial, you need to download the files to your local machine.

In this step, you’ll set up the sample application, as well as supporting services, such as Loki.

Note: Prometheus, a popular time series database (TSDB), has already been configured as a data source as part of this tutorial.

  1. Clone the github.com/grafana/tutorial-environment repository.

    git clone https://github.com/grafana/tutorial-environment.git
  2. Change to the directory where you cloned this repository:

    cd tutorial-environment
  3. Make sure Docker is running:

    docker ps

    No errors means it is running. If you get an error, then start Docker and then run the command again.

  4. Start the sample application:

    docker-compose up -d

    The first time you run docker-compose up -d, Docker downloads all the necessary resources for the tutorial. This might take a few minutes, depending on your internet connection.

    Note: If you already have Grafana, Loki, or Prometheus running on your system, then you might see errors because the Docker image is trying to use ports that your local installations are already using. Stop the services, then run the command again.

  5. Ensure all services are up-and-running:

    docker-compose ps

    In the State column, it should say Up for all services.

  6. Browse to the sample application on localhost:8081.

Grafana News

The sample application, Grafana News, lets you post links and vote for the ones you like.

To add a link:

  1. In Title, enter Example.

  2. In URL, enter https://example.com.

  3. Click Submit to add the link.

    The link appears in the list under the Grafana News heading.

To vote for a link, click the triangle icon next to the name of the link.

Explore your metrics

Grafana Explore is a workflow for troubleshooting and data exploration. In this step, you’ll be using Explore to create ad-hoc queries to understand the metrics exposed by the sample application.

Ad-hoc queries are queries that are made interactively, with the purpose of exploring data. An ad-hoc query is commonly followed by another, more specific query.

  1. Click the menu icon and, in the sidebar, click Explore. A dropdown menu for the list of available data sources is on the upper-left side. The Prometheus data source will already be selected. If not, choose Prometheus.

  2. Confirm that you’re in code mode by checking the Builder/Code toggle at the top right corner of the query panel.

  3. In the query editor, where it says Enter a PromQL query…, enter tns_request_duration_seconds_count and then press Shift + Enter. A graph appears.

  4. In the top right corner, click the dropdown arrow on the Run Query button, and then select 5s. Grafana runs your query and updates the graph every 5 seconds.

    You just made your first PromQL query! PromQL is a powerful query language that lets you select and aggregate time series data stored in Prometheus.

    tns_request_duration_seconds_count is a counter, a type of metric whose value only ever increases. Rather than visualizing the actual value, you can use counters to calculate the rate of change, i.e. how fast the value increases.

  5. Add the rate function to your query to visualize the rate of requests per second. Enter the following in the query editor and then press Shift + Enter.

    rate(tns_request_duration_seconds_count[5m])

    Immediately below the graph there’s an area where each time series is listed with a colored icon next to it. This area is called the legend.

    PromQL lets you group the time series by their labels, using the sum aggregation operator.

  6. Add the sum aggregation operator to your query to group time series by route:

    sum(rate(tns_request_duration_seconds_count[5m])) by(route)
  7. Go back to the sample application and generate some traffic by adding new links, voting, or just refresh the browser.

  8. Back in Grafana, in the upper-right corner, click the time picker, and select Last 5 minutes. By zooming in on the last few minutes, it’s easier to see when you receive new data.

Depending on your use case, you might want to group on other labels. Try grouping by other labels, such as status_code, by changing the by(route) part of the query to by(status_code).

Add a logging data source

Grafana supports log data sources, like Loki. Just like for metrics, you first need to add your data source to Grafana.

  1. Click the menu icon and, in the sidebar, click Connections and then Data sources.
  2. Click + Add new data source.
  3. In the list of data sources, click Loki.
  4. In the URL box, enter http://loki:3100.
  5. Scroll to the bottom of the page and click Save & Test to save your changes.

You should see the message “Data source successfully connected.” Loki is now available as a data source in Grafana.

Explore your logs

Grafana Explore not only lets you make ad-hoc queries for metrics, but lets you explore your logs as well.

  1. Click the menu icon and, in the sidebar, click Explore.

  2. In the data source list at the top, select the Loki data source.

  3. Confirm that you’re in code mode by checking the Builder/Code toggle at the top right corner of the query panel.

  4. Enter the following in the query editor, and then press Shift + Enter:

    {filename="/var/log/tns-app.log"}
  5. Grafana displays all logs within the log file of the sample application. The height of each bar in the graph encodes the number of logs that were generated at that time.

  6. Click and drag across the bars in the graph to filter logs based on time.

Not only does Loki let you filter logs based on labels, but on specific occurrences.

Let’s generate an error, and analyze it with Explore.

  1. In the sample application, post a new link without a URL to generate an error in your browser that says empty url.

  2. Go back to Grafana and enter the following query to filter log lines based on a substring:

    {filename="/var/log/tns-app.log"} |= "error"
  3. Click on the log line that says level=error msg="empty url" to see more information about the error.

    Note: If you’re in Live mode, clicking logs will not show more information about the error. Instead, stop and exit the live stream, then click the log line there.

Logs are helpful for understanding what went wrong. Later in this tutorial, you’ll see how you can correlate logs with metrics from Prometheus to better understand the context of the error.

Build a dashboard

A dashboard gives you an at-a-glance view of your data and lets you track metrics through different visualizations.

Dashboards consist of panels, each representing a part of the story you want your dashboard to tell.

Every panel consists of a query and a visualization. The query defines what data you want to display, whereas the visualization defines how the data is displayed.

  1. Click the menu icon and, in the sidebar, click Dashboards.

  2. On the Dashboards page, click New in top right corner and select New Dashboard in the drop-down.

  3. Click + Add visualization.

  4. In the modal that opens, select the Prometheus data source that you just added.

  5. In the Query tab below the graph, enter the query from earlier and then press Shift + Enter:

    sum(rate(tns_request_duration_seconds_count[5m])) by(route)
  6. In the panel editor on the right, under Panel options, change the panel title to “Traffic”.

  7. Click Apply in the top-right corner to save the panel and go back to the dashboard view.

  8. Click the Save dashboard (disk) icon at the top of the dashboard to save your dashboard.

  9. Enter a name in the Dashboard name field and then click Save.

    You should now have a panel added to your dashboard.

    A panel in a Grafana dashboard
    A panel in a Grafana dashboard

Annotate events

When things go bad, it often helps if you understand the context in which the failure occurred. Time of last deploy, system changes, or database migration can offer insight into what might have caused an outage. Annotations allow you to represent such events directly on your graphs.

In the next part of the tutorial, we will simulate some common use cases that someone would add annotations for.

  1. To manually add an annotation, click anywhere in your graph, then click Add annotation. Note: you might need to save the dashboard first.

  2. In Description, enter Migrated user database.

  3. Click Save.

    Grafana adds your annotation to the graph. Hover your mouse over the base of the annotation to read the text.

Grafana also lets you annotate a time interval, with region annotations.

Add a region annotation:

  1. Press Ctrl (or Cmd on macOS) and hold, then click and drag across the graph to select an area.
  2. In Description, enter Performed load tests.
  3. In Tags, enter testing.
  4. Click Save.

Using annotations to correlate logs with metrics

Manually annotating your dashboard is fine for those single events. For regularly occurring events, such as deploying a new release, Grafana supports querying annotations from one of your data sources. Let’s create an annotation using the Loki data source we added earlier.

  1. At the top of the dashboard, click the Dashboard settings (gear) icon.

  2. Go to Annotations and click Add annotation query.

  3. In Name, enter Errors.

  4. In Data source, select Loki.

  5. In Query, enter the following query:

    {filename="/var/log/tns-app.log"} |= "error"
  6. Click Apply. Grafana displays the Annotations list, with your new annotation.

  7. Click on your dashboard name to return to your dashboard.

  8. At the top of your dashboard, there is now a toggle to display the results of the newly created annotation query. Press it if it’s not already enabled.

  9. Click the Save dashboard icon to save the changes.

  10. To test the changes, go back to the sample application, post a new link without a URL to generate an error in your browser that says empty url.

The log lines returned by your query are now displayed as annotations in the graph.

A panel in a Grafana dashboard with log queries from Loki displayed as annotations
Displaying log queries from Loki as annotations

Being able to combine data from multiple data sources in one graph allows you to correlate information from both Prometheus and Loki.

Annotations also work very well alongside alerts. In the next and final section, we will set up an alert for our app grafana.news and then we will trigger it. This will provide a quick intro to our new Alerting platform.

Create a Grafana Managed Alert

Alerts allow you to identify problems in your system moments after they occur. By quickly identifying unintended changes in your system, you can minimize disruptions to your services.

Grafana’s new alerting platform debuted with Grafana 8. A year later, with Grafana 9, it became the default alerting method. In this step we will create a Grafana Managed Alert. Then we will trigger our new alert and send a test message to a dummy endpoint.

The most basic alert consists of two parts:

  1. A Contact point - A Contact point defines how Grafana delivers an alert. When the conditions of an alert rule are met, Grafana notifies the contact points, or channels, configured for that alert.

    Some popular channels include:

  2. An Alert rule - An Alert rule defines one or more conditions that Grafana regularly evaluates. When these evaluations meet the rule’s criteria, the alert is triggered.

To begin, let’s set up a webhook contact point. Once we have a usable endpoint, we’ll write an alert rule and trigger a notification.

Create a contact point for Grafana Managed Alerts

In this step, we’ll set up a new contact point. This contact point will use the webhooks channel. In order to make this work, we also need an endpoint for our webhook channel to receive the alert. We will use requestbin.com to quickly set up that test endpoint. This way we can make sure that our alert is actually sending a notification somewhere.

  1. Browse to requestbin.com.
  2. Under the Create Request Bin button, click the link to create a public bin instead.
  3. From Request Bin, copy the endpoint URL.

Your Request Bin is now waiting for the first request.

Next, let’s configure a Contact Point in Grafana’s Alerting UI to send notifications to our Request Bin.

  1. Return to Grafana. In Grafana’s sidebar, hover over the Alerting (bell) icon and then click Contact points.

  2. Click + Add contact point.

  3. In Name, write RequestBin.

  4. In Integration, choose Webhook.

  5. In URL, paste the endpoint to your request bin.

  6. Click Test, and then click Send test notification to send a test alert to your request bin.

  7. Navigate back to the Request Bin you created earlier. On the left side, there’s now a POST / entry. Click it to see what information Grafana sent.

  8. Return to Grafana and click Save contact point.

We have now created a dummy webhook endpoint and created a new Alerting Contact Point in Grafana. Now we can create an alert rule and link it to this new channel.

Add an Alert Rule to Grafana

Now that Grafana knows how to notify us, it’s time to set up an alert rule:

  1. In Grafana’s sidebar, hover over the Alerting (bell) icon and then click Alert rules.

  2. Click + New alert rule.

  3. For Section 1, name the rule fundamentals-test.

  4. For Section 2, Find the query A box. Choose your Prometheus datasource. Note that the rule type should automatically switch to Grafana-managed alert.

  5. Switch to code mode by checking the Builder/Code toggle.

  6. Enter the same Prometheus query that we used in our earlier panel:

    sum(rate(tns_request_duration_seconds_count[5m])) by(route)
  7. Press Preview. You should see some data returned.

  8. Keep expressions “B” and “C” as they are. These expressions (Reduce and Threshold, respectively) come by default when creating a new rule. Expression “B”, selects the last value of our query “A”, while the Threshold expression “C” will check if the last value from expression “B” is above a specific value. In addition, the Threshold expression is the alert condition by default. Enter 0.2 as threshold value. You can read more about queries and conditions here.

  9. In Section 3, in Folder, create a new folder, by clicking New folder and typing a name for the folder. This folder will contain our alerts. For example: fundamentals. Then, click create.

  10. In the Evaluation group, repeat the above step to create a new one. We will name it fundamentals too.

  11. Choose an Evaluation interval (how often the alert will be evaluated). For example, every 10s (10 seconds).

  12. Set the pending period. This is the time that a condition has to be met until the alert enters in Firing state and a notification is sent. Enter 0s. For the purposes of this tutorial, the evaluation interval is intentionally short. This makes it easier to test. This setting makes Grafana wait until an alert has fired for a given time before Grafana sends the notification.

  13. In Section 4, you can optionally add some sample text to your summary message. Read more about message templating here.

  14. Click Save rule and exit at the top of the page.

  15. In Grafana’s sidebar, navigate to Notification policies.

  16. Under Default policy, select Edit and change the Default contact point from grafana-default-email to RequestBin.

  17. Expand the Timing options dropdown and under Group wait and Group interval update the value to 30s for testing purposes. Group wait is the time Grafana waits before sending the first notification for a new group of alerts. In contrast, group interval is the time Grafana waits before sending notifications about changes to the group.

  18. Click Update default policy.

    As a system grows, admins can use the Notification policies setting to organize and match alert rules to specific contact points.

Trigger a Grafana Managed Alert

We have now configured an alert rule and a contact point. Now let’s see if we can trigger a Grafana Managed Alert by generating some traffic on our sample application.

  1. Browse to localhost:8081.
  2. Add a new title and URL, repeatedly click the vote button, or refresh the page to generate a traffic spike.

Once the query sum(rate(tns_request_duration_seconds_count[5m])) by(route) returns a value greater than 0.2 Grafana will trigger our alert. Browse to the Request Bin we created earlier and find the sent Grafana alert notification with details and metadata.

Display Grafana Alerts to your dashboard

In most cases, it’s also valuable to display Grafana Alerts as annotations to your dashboard. Check out the video tutorial below to learn how to display alerting to your dashboard.

Let’s see how we can configure this.

  1. In Grafana’s sidebar, hover over the Alerting (bell) icon and then click Alert rules.

  2. Expand the fundamentals > fundamentals folder to view our created alert rule.

  3. Click the Edit icon and scroll down to Section 4.

  4. Click the Link dashboard and panel button and select the dashboard and panel to which you want the alert to be added as an annotation.

  5. Click Confirm and Save rule and exit to save all the changes.

  6. In Grafana’s sidebar, navigate to the dashboard by clicking Dashboards and selecting the dashboard you created.

  7. To test the changes, follow the steps listed to trigger a Grafana Managed Alert.

    You should now see a red, broken heart icon beside the panel name, signifying that the alert has been triggered. An annotation for the alert, represented as a vertical red line, is also displayed.

    A panel in a Grafana dashboard with alerting and annotations configured
    Displaying Grafana Alerts on a dashboard

Summary

In this tutorial you learned about fundamental features of Grafana. To do so, we ran several Docker containers on your local machine. When you are ready to clean up this local tutorial environment, run the following command:

docker-compose down -v

KillerCoda sandbox environment (completed tutorial)

Do you want to see the finished result? Check out our completed KillerCoda sandbox environment containing the entire demo with dashboards, checks, and data sources configured.

Learn more

Check out the links below to continue your learning journey with Grafana’s LGTM stack.