Amazon Managed Grafana tightly integrates with multiple AWS services to meet your corporate security and compliance requirements. Access to Amazon Managed Grafana is authenticated through AWS IAM Identity Center (successor to AWS SSO) or your existing Identity Provider via SAML 2.0, enabling re-use of existing trust relationships between AWS and your corporate user directories. You can track changes made to Grafana workspaces for compliance and audit tracking using audit logs provided by AWS CloudTrail. Amazon Managed Grafana also natively integrates with multiple AWS data sources including Amazon OpenSearch Service, Amazon CloudWatch, AWS X-Ray, AWS IoT SiteWise, Amazon Timestream, and Amazon Managed Service for Prometheus, so you don’t have to manually manage IAM credentials and permissions for each data source. Amazon Managed Grafana also discovers the resources in your account across multiple Regions and across your Organizational Units, and automatically provisions the right IAM policies to access your data.
Amazon Managed Grafana can also connect to data sources that are inside your private Amazon Virtual Private Cloud (VPC) without using public IPs or requiring traffic to traverse the Internet. Data sources such as OpenSearch, Amazon RDS databases, self-managed Prometheus, and other data sources often do not have a publicly facing endpoint. By connecting your Amazon Managed Grafana workspaces to your VPC, you will now be able to query, visualize, and alert on the data sources within your VPC. You can also connect Grafana workspaces to multiple VPCs using VPC Peering and Transit Gateways. In this way, you can have both your privately-hosted and public-facing data sources connect to the same Amazon Managed Grafana workspace to visualize your data all in one place.
You have granular security controls over your Amazon Managed Grafana workspaces by defining customer-managed prefix lists and VPC endpoints to help you restrict the inbound network traffic that can reach your Grafana workspaces. To learn more, check out the user guide for managing network access. You can also use AWS PrivateLink to connect between Amazon VPC and Amazon Managed Grafana workspaces. You can control access to the Amazon Managed Grafana service from the virtual private cloud (VPC) endpoints by attaching an IAM resource policy for Amazon VPC endpoints. Amazon Managed Grafana supports two different kinds of VPC endpoints. You can connect to the Amazon Managed Grafana service, providing access to the Amazon Managed Grafana APIs to manage workspaces. Or you can create a VPC endpoint to a specific workspace. For information about creating a VPC endpoint for your Grafana workspaces, see Interface VPC endpoints.