Service account API

If you are running Grafana Enterprise, for some endpoints you’ll need to have specific permissions. Refer to Role-based access control permissions for more information.

Search service accounts with Paging

GET /api/serviceaccounts/search?perpage=10&page=1&query=myserviceaccount

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:readn/a

Example Request:

  1. GET /api/serviceaccounts/search?perpage=10&page=1&query=mygraf HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=

Default value for the perpage parameter is 1000 and for the page parameter is 1. The totalCount field in the response can be used for pagination of the user list E.g. if totalCount is equal to 100 users and the perpage parameter is set to 10 then there are 10 pages of users. The query parameter is optional and it will return results where the query value is contained in one of the name. Query values with spaces need to be URL encoded e.g. query=Jane%20Doe.

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. {
  4. "totalCount": 2,
  5. "serviceAccounts": [
  6. {
  7. "id": 1,
  8. "name": "grafana",
  9. "login": "sa-grafana",
  10. "orgId": 1,
  11. "isDisabled": false,
  12. "role": "Viewer",
  13. "tokens": 0,
  14. "avatarUrl": "/avatar/85ec38023d90823d3e5b43ef35646af9",
  15. "accessControl": {
  16. "serviceaccounts:delete": true,
  17. "serviceaccounts:read": true,
  18. "serviceaccounts:write": true
  19. }
  20. },
  21. {
  22. "id": 2,
  23. "name": "test",
  24. "login": "sa-test",
  25. "orgId": 1,
  26. "isDisabled": false,
  27. "role": "Viewer",
  28. "tokens": 0,
  29. "avatarUrl": "/avatar/8ea890a677d6a223c591a1beea6ea9d2",
  30. "accessControl": {
  31. "serviceaccounts:delete": true,
  32. "serviceaccounts:read": true,
  33. "serviceaccounts:write": true
  34. }
  35. }
  36. ],
  37. "page": 1,
  38. "perPage": 10
  39. }

Create service account

POST /api/serviceaccounts

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:createn/a

Example Request:

  1. POST /api/serviceaccounts HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=
  5. {
  6. "name": "grafana",
  7. "role": "Viewer",
  8. "isDisabled" : false
  9. }

Example Response:

  1. HTTP/1.1 201
  2. Content-Type: application/json
  3. {
  4. "id": 1,
  5. "name": "test",
  6. "login": "sa-test",
  7. "orgId": 1,
  8. "isDisabled": false,
  9. "createdAt": "2022-03-21T14:35:33Z",
  10. "updatedAt": "2022-03-21T14:35:33Z",
  11. "avatarUrl": "/avatar/8ea890a677d6a223c591a1beea6ea9d2",
  12. "role": "Viewer",
  13. "teams": []
  14. }

Get a service account by ID

GET /api/serviceaccounts/:id

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:readserviceaccounts:id:*

Example Request:

  1. GET /api/serviceaccounts/1 HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. {
  4. "id": 1,
  5. "name": "test",
  6. "login": "sa-test",
  7. "orgId": 1,
  8. "isDisabled": false,
  9. "createdAt": "2022-03-21T14:35:33Z",
  10. "updatedAt": "2022-03-21T14:35:33Z",
  11. "avatarUrl": "/avatar/8ea890a677d6a223c591a1beea6ea9d2",
  12. "role": "Viewer",
  13. "teams": []
  14. }

Update service account

PATCH /api/serviceaccounts/:id

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:writeserviceaccounts:id:*

Example Request:

  1. PATCH /api/serviceaccounts/2 HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=
  5. {
  6. "name": "test",
  7. "role": "Editor"
  8. }

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. {
  4. "id": 2,
  5. "name": "test",
  6. "login": "sa-grafana",
  7. "orgId": 1,
  8. "isDisabled": false,
  9. "createdAt": "2022-03-21T14:35:44Z",
  10. "updatedAt": "2022-03-21T14:35:44Z",
  11. "avatarUrl": "/avatar/8ea890a677d6a223c591a1beea6ea9d2",
  12. "role": "Editor",
  13. "teams": []
  14. }

Get service account tokens

GET /api/serviceaccounts/:id/tokens

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:readserviceaccounts:id:*

Example Request:

  1. GET /api/serviceaccounts/2/tokens HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. [
  4. {
  5. "id": 1,
  6. "name": "grafana",
  7. "role": "Viewer",
  8. "created": "2022-03-23T10:31:02Z",
  9. "expiration": null,
  10. "secondsUntilExpiration": 0,
  11. "hasExpired": false
  12. }
  13. ]

Create service account tokens

POST /api/serviceaccounts/:id/tokens

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:writeserviceaccounts:id:*

Example Request:

  1. POST /api/serviceaccounts/2/tokens HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=
  5. {
  6. "name": "grafana",
  7. "role": "Viewer"
  8. }

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. {
  4. "id": 7,
  5. "name": "grafana",
  6. "key": "eyJrIjoiVjFxTHZ6dGdPSjg5Um92MjN1RlhjMkNqYkZUbm9jYkwiLCJuIjoiZ3JhZmFuYSIsImlkIjoxfQ=="
  7. }

Delete service account tokens

DELETE /api/serviceaccounts/:id/tokens/:tokenId

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:writeserviceaccounts:id:*

Example Request:

  1. DELETE /api/serviceaccounts/2/tokens/1 HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. {
  4. "message": "API key deleted"
  5. }

Revert service account token to API key

DELETE /api/serviceaccounts/:serviceAccountId/revert/:keyId

This operation will delete the service account and create a legacy API Key for the given keyId.

Required permissions

See note in the introduction for an explanation.

ActionScope
serviceaccounts:deleteserviceaccounts:id:*

Example Request:

  1. DELETE /api/serviceaccounts/1/revert/glsa_VVQjot0nijQ59lun6pMZRtsdBXxnFQ9M_77c34a79 HTTP/1.1
  2. Accept: application/json
  3. Content-Type: application/json
  4. Authorization: Basic YWRtaW46YWRtaW4=

Example Response:

  1. HTTP/1.1 200
  2. Content-Type: application/json
  3. {
  4. "message": "Reverted service account to API key"
  5. }