Skip to content

Commit 5c3cd28

Browse files
committed
fix warnings and images
Signed-off-by: Hannah Hunter <[email protected]>
1 parent 6a607d8 commit 5c3cd28

13 files changed

Lines changed: 8 additions & 8 deletions

articles/managed-grafana/grafana-mcp-server.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -12,13 +12,13 @@ ms.service: azure-managed-grafana
1212

1313
# Configure an Azure Managed Grafana remote MCP server
1414

15-
Every Azure Managed Grafana instance includes a built-in Model Context Protocol (MCP) server endpoint called AMG-MCP. The AMG-MCP endpoint allows tools and applications to interact programmatically with the Grafana instance using the MCP. The AMG-MCP endpoint uses the same authentication mechanism as the Grafana instance, supporting both Entra Id and the Grafana service account token.
15+
Every Azure Managed Grafana instance includes a built-in Model Context Protocol (MCP) server endpoint called AMG-MCP. The AMG-MCP endpoint allows tools and applications to interact programmatically with the Grafana instance using the MCP. The AMG-MCP endpoint uses the same authentication mechanism as the Grafana instance, supporting both Entra ID and the Grafana service account token.
1616

1717
## Endpoint path
1818

1919
The AMG-MCP endpoint path format is `https://<grafana-endpoint>/api/azure-mcp`. For example, the endpoint could look like: `https://my-grafana-<guid>.<location>.grafana.azure.com/api/azure-mcp`.
2020

21-
## Available MCP Tools
21+
## Available MCP tools
2222

2323
AMG-MCP provides the following tools for interacting with Azure Managed Grafana:
2424

@@ -43,10 +43,10 @@ AMG-MCP provides the following tools for interacting with Azure Managed Grafana:
4343

4444
To connect to the AMG-MCP endpoint, you need to configure your MCP client with the appropriate settings. AMG-MCP supports two authentication methods:
4545

46-
- [**Grafana Service Account Token:**](#grafana-service-account-token) A token generated from your Grafana instance (format: `glsa_xxx`)
47-
- [**Entra ID Token:**](#entra-id-token) An Azure AD/Entra ID token (e.g., from a managed identity or service principal)
46+
- [**Grafana service account token:**](#grafana-service-account-token) A token generated from your Grafana instance (format: `glsa_xxx`)
47+
- [**Entra ID token:**](#entra-id-token) An Azure AD/Entra ID token (e.g., from a managed identity or service principal)
4848

49-
### Grafana Service Account Token
49+
### Grafana service account token
5050

5151
Use a Grafana service account token for authentication. Start by creating a token:
5252

@@ -69,7 +69,7 @@ Use a Grafana service account token for authentication. Start by creating a toke
6969
}
7070
```
7171

72-
### Entra ID Token
72+
### Entra ID token
7373

7474
Use an Entra ID token (Azure AD token) for authentication. This approach is useful when using managed identities or service principals.
7575

@@ -115,7 +115,7 @@ To configure MCP for Visual Studio Code, use configuration settings similar to t
115115
}
116116
```
117117

118-
**Configuration Parameters:**
118+
**Configuration parameters:**
119119

120120
| Parameter | Description |
121121
|-----------|-------------|
@@ -141,7 +141,7 @@ To configure MCP for Cline, use configuration settings similar to the following
141141
}
142142
```
143143

144-
**Configuration Parameters:**
144+
**Configuration parameters:**
145145

146146
| Parameter | Description |
147147
|-----------|-------------|
350 KB
Loading
-223 KB
Loading
177 KB
Loading
-124 KB
Loading
198 KB
Loading
-118 KB
Loading
466 KB
Loading
-354 KB
Loading
312 KB
Loading

0 commit comments

Comments
 (0)