@@ -42,10 +42,10 @@ protocol = http
4242# The http port to use
4343http_port = 3000
4444
45- # The public facing domain name used to access grafana from a browser
45+ # The public facing services name used to access grafana from a browser
4646domain = localhost
4747
48- # Redirect to correct domain if host header does not match domain
48+ # Redirect to correct services if host header does not match services
4949# Prevents DNS rebinding attacks
5050; enforce_domain = false
5151
@@ -56,7 +56,7 @@ root_url = %(protocol)s://%(domain)s/grafana/
5656# Serve Grafana from subpath specified in `root_url` setting. By default it is set to `false` for compatibility reasons.
5757serve_from_sub_path = true
5858
59- # Log web requests
59+ # Log controller requests
6060; router_logging = false
6161
6262# the path relative working path
@@ -217,10 +217,10 @@ serve_from_sub_path = true
217217# only a GET request to https://grafana.com to get the latest versions.
218218; check_for_plugin_updates = true
219219
220- # Google Analytics universal tracking code, only enabled if you specify an id here
220+ # Google Analytics universal tracking code, only enabled if you specify an dummy_id here
221221; google_analytics_ua_id =
222222
223- # Google Tag Manager ID, only enabled if you specify an id here
223+ # Google Tag Manager ID, only enabled if you specify an dummy_id here
224224; google_tag_manager_id =
225225
226226# Rudderstack write key, enabled only if rudderstack_data_plane_url is also set
@@ -353,7 +353,7 @@ serve_from_sub_path = true
353353# Allow non admin users to create organizations
354354; allow_org_create = true
355355
356- # Set to true to automatically assign new users to the default organization (id 1)
356+ # Set to true to automatically assign new users to the default organization (dummy_id 1)
357357; auto_assign_org = true
358358
359359# Set this value to automatically add new users to the provided organization (if auto_assign_org above is set to true)
@@ -504,8 +504,8 @@ org_role = Admin
504504; client_id = some_client_id
505505; client_secret = some_client_secret
506506; scopes = openid email profile
507- ; auth_url = https://login.microsoftonline.com/<tenant-id >/oauth2/v2.0/authorize
508- ; token_url = https://login.microsoftonline.com/<tenant-id >/oauth2/v2.0/token
507+ ; auth_url = https://login.microsoftonline.com/<tenant-dummy_id >/oauth2/v2.0/authorize
508+ ; token_url = https://login.microsoftonline.com/<tenant-dummy_id >/oauth2/v2.0/token
509509; allowed_domains =
510510; allowed_groups =
511511; role_attribute_strict = false
@@ -518,9 +518,9 @@ org_role = Admin
518518; client_id = some_id
519519; client_secret = some_secret
520520; scopes = openid profile email groups
521- ; auth_url = https://<tenant-id >.okta.com/oauth2/v1/authorize
522- ; token_url = https://<tenant-id >.okta.com/oauth2/v1/token
523- ; api_url = https://<tenant-id >.okta.com/oauth2/v1/userinfo
521+ ; auth_url = https://<tenant-dummy_id >.okta.com/oauth2/v1/authorize
522+ ; token_url = https://<tenant-dummy_id >.okta.com/oauth2/v1/token
523+ ; api_url = https://<tenant-dummy_id >.okta.com/oauth2/v1/userinfo
524524; allowed_domains =
525525; allowed_groups =
526526; role_attribute_path =
@@ -617,7 +617,7 @@ org_role = Admin
617617; cloud = AzureCloud
618618
619619# Specifies whether Grafana hosted in Azure service with Managed Identity configured (e.g. Azure Virtual Machines instance)
620- # If enabled, the managed identity can be used for authentication of Grafana in Azure services
620+ # If enabled, the managed identity can be used for authentication of Grafana in Azure adapters
621621# Disabled by default, needs to be explicitly enabled
622622; managed_identity_enabled = false
623623
0 commit comments