diff --git a/README.md b/README.md index 26e74b63..0dae49cc 100644 --- a/README.md +++ b/README.md @@ -37,6 +37,7 @@ that make up the Bento platform. * [Troubleshooting guide](./docs/troubleshooting.md) * [Deployment](./docs/deployment.md) * [Monitoring](./docs/monitoring.md) +* [Public discovery configuration](./docs/public_discovery.md) ### Data ingestion and usage diff --git a/docs/monitoring.md b/docs/monitoring.md index 0d58e0e3..627983a4 100644 --- a/docs/monitoring.md +++ b/docs/monitoring.md @@ -35,7 +35,7 @@ Create the Grafana OIDC client, its permissions and group mappings with the foll ./bentoctl.bash init-auth ``` -Set the outputed value for `BENTO_GRAFANA_CLIENT_SECRET` in the `local.env` file and restart Grafana. +Set the outputted value for `BENTO_GRAFANA_CLIENT_SECRET` in the `local.env` file and restart Grafana. ```bash ./bentoctl.bash restart grafana @@ -57,7 +57,8 @@ Group role-mappings in Keycloak: - Viewer - Can view created dashboards -The `admin`, `editor` and `viewer` roles are Grafana concepts. During authentication, Grafana will synchronize the user's roles from Keycloak, and only let the user in if a valid role can be retrieved from the ID token. +The `admin`, `editor` and `viewer` roles are Grafana concepts. During authentication, Grafana will synchronize the +user's roles from Keycloak, and only let the user in if a valid role can be retrieved from the ID token. The `init-auth` step in the [configuration](#configuration) creates everything needed for this in Keycloak.