IBM Cloud Docs
Granting permissions to work with the Monitoring service

Granting permissions to work with the Monitoring service

IBM Cloud® Identity and Access Management (IAM) enables you to securely authenticate users and consistently control access to all cloud resources in the IBM Cloud.

Complete the following steps to grant a user or service ID permissions to work with the IBM Cloud Monitoring service:

Prerequisites

Your user ID needs administrator platform permissions to manage the IBM Cloud Monitoring service. The account owner can grant user access to the account for the purposes of managing user access, and managing account resources. Learn more.

Step 1. Create an access group

Complete the following steps to create an access group:

  1. From the menu bar, click Manage > Access (IAM), and select Access Groups.
  2. Click Create.
  3. Enter a name and optional description for your group, and click Create.

You can delete a group by selecting the Remove group option. When you remove a group from the account, you are removing all users and service IDs from the group and all access that is assigned to the group.

To create an access group by using the CLI, you can use the ibmcloud iam access-group-create command.

ibmcloud iam access-group-create GROUP_NAME [-d, --description DESCRIPTION]

Step 2. Add permissions to view Monitoring instances in the Observability UI

After you set up your group, you can assign a common access policy to the group. You must add permissions to view Monitoring instances in the Observability UI, to manage the instance in the IBM Cloud, or both.

Any policy that you set for an access group applies to all entities, users, and service IDs, within the group.

You can assign the policy by using the UI or through the command line.

When you define the policy, you need to select a platform role. Platform management roles cover a range of actions, including the ability to create and delete instances, manage aliases, bindings, and credentials, and manage access. Valid platform roles are administrator, editor, operator, and viewer.

Add permissions through the CLI

To create an access group policy by using the CLI, you can use the ibmcloud iam access-group-policy-create command.

ibmcloud iam access-group-policy-create GROUP_NAME {-f, --file @JSON_FILE | --roles ROLE_NAME1,ROLE_NAME2... [--service-name SERVICE_NAME] [--service-instance SERVICE_INSTANCE] [--region REGION] [--resource-type RESOURCE_TYPE] [--resource RESOURCE] [--resource-group-name RESOURCE_GROUP_NAME] [--resource-group-id RESOURCE_GROUP_ID]}

Where valid roles are Administrator, Editor, Operator, and Viewer.

For example, you can run the following command to grant a user viewer permissions:

ibmcloud iam access-group-policy-create my-access-group --roles Viewer --service-name my-monitoring-instance --service-instance 99999999-9999-9999-999999

Add permissions through the UI

Complete the following steps to assign a policy to an access group through the UI:

  1. From the menu bar, click Manage > Access (IAM), and select Access Groups.

  2. Select the name of the group that you want to assign access to.

  3. Click Access policies > Assign access > Assign access to resources.

  4. Select IAM services.

  5. In the section What type of access do you want to assign?, select IBM Cloud Monitoring.

  6. In the section Which services do you want to assign access to?, choose one of the following options:

    Select All services to define the scope of the policy to include all instances.

    Select Services based on attributes to refine the scope of the policy. Choose 1 of the following options:

    Option 1: The scope is set to a resource group. Select Resource group to choose 1 resource group and define the scope of the policy to include all instances that are associated with that resource group.

    Option 2: The scope is set to 1 instance in a resource group. Select Resource group to choose the resource group. Then select Service Instance to choose the instance within the resource group.

    Option 3: The scope is set to 1 instance. Select Service Instance to choose the instance.

    Do not specify a value in the Sysdig Team section.

  7. Select a platform role.

    Select administrator to grant admin permissions for the service.

    Select viewer to grant permissions to view instances in the Observability UI.

    Learn more about the roles that you need.

  8. Click Assign.

Step 3. Add permissions to work with data in the Monitoring service

Next, you must add a policy that grants the user permission to work with data in the Monitoring service.

When you define the policy, you need to select a service role. Service access roles define a user's or service's ability to perform actions on a service instance. The service access roles are manager, writer, and reader.

Add permissions through the CLI

To create an access group policy by using the CLI, you can use the ibmcloud iam access-group-policy-create command.

ibmcloud iam access-group-policy-create GROUP_NAME {-f, --file @JSON_FILE | --roles ROLE_NAME1,ROLE_NAME2... [--service-name SERVICE_NAME] [--service-instance SERVICE_INSTANCE] [--region REGION] [--resource-type RESOURCE_TYPE] [--resource RESOURCE] [--resource-group-name RESOURCE_GROUP_NAME] [--resource-group-id RESOURCE_GROUP_ID]}

Where valid roles are Reader, Writer, and Manager.

For example, you can run the following command to grant a user reader permissions:

ibmcloud iam access-group-policy-create my-access-group --roles Reader --service-name my-monitoring-instance --service-instance 99999999-9999-9999-999999

Add permissions through the UI

Complete the following steps to assign a policy to an access group through the UI:

  1. From the menu bar, click Manage > Access (IAM), and select Access Groups.

  2. Select the name of the group that you want to assign access to.

  3. Click Access policies > Assign access > Assign access to resources.

  4. Select IAM services.

  5. In the section What type of access do you want to assign?, select IBM Cloud Monitoring.

  6. In the section Which services do you want to assign access to?, choose one of the following options:

    Select All services to define the scope of the policy to include all instances.

    Select Services based on attributes to refine the scope of the policy. Choose 1 of the following options:

    Option 1: The scope is set to a resource group. Select Resource group to choose 1 resource group and define the scope of the policy to include all instances that are associated with that resource group.

    Option 2: The scope is set to 1 instance in a resource group. Select Resource group to choose the resource group. Then select Service Instance to choose the instance within the resource group.

    Option 3: The scope is set to 1 instance. Select Service Instance to choose the instance.

    Do not specify a value in the Sysdig Team section.

  7. Select a service role.

    Select manager to grant admin permissions for the service.

    Select reader to grant permissions to view data only.

    Learn more about the roles that you need.

  8. Click Assign.

Step 4. Add a user or service ID to the access group

You can add users or service IDs to an existing group.

Add a user to the access group

Complete the following steps to add a user:

  1. From the menu bar, click Manage > Access (IAM), and select Access Groups.
  2. Select the name of the group that you want to assign access to.
  3. Click Add users on the Users tab.
  4. Select the users that you want to add from the list, and click Add to group.

Add a service ID to the access group

Complete the following steps to add a service ID:

  1. From the menu bar, click Manage > Access (IAM), and select Access Groups.
  2. Select the name of the group that you want to assign access to.
  3. Click the Service IDs tab, and click Add service ID.
  4. Select the IDs that you want to add from the list, and click Add to group.