You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/workspace-design.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ The following table briefly presents the criteria that you should consider in de
33
33
|[Legacy agent limitations](#legacy-agent-limitations)| Legacy virtual machine agents have limitations on the number of workspaces they can connect to. |
34
34
|[Data access control](#data-access-control)| Configure access to the workspace and to different tables and data from different resources. |
35
35
36
-
### Segregate operational and security data<aname="segregate-operational-and-security-data"></a>
36
+
### Segregate operational and security data
37
37
Most customers who use both Azure Monitor and Microsoft Sentinel will create a dedicated workspace for each to segregate ownership of data between your operational and security teams and also to optimize costs. If Microsoft Sentinel is enabled in a workspace, then all data in that workspace is subject to Sentinel pricing, even if it's operational data collected by Azure Monitor. While a workspace with Sentinel gets 3 months of free data retention instead of 31 days, this will typically result in higher cost for operational data in a workspace without Sentinel. See [Azure Monitor Logs pricing details](cost-logs.md#workspaces-with-microsoft-sentinel).
38
38
39
39
The exception is if combining data in the same workspace helps you reach a [commitment tier](#commitment-tiers), which provides a discount to your ingestion charges. For example, consider an organization that has operational data and security data each ingesting about 50 GB per day. Combining the data in the same workspace would allow a commitment tier at 100 GB per day that would provide a 15% discount for Azure Monitor and 50% discount for Sentinel.
@@ -44,13 +44,13 @@ If you create separate workspaces for other criteria then you'll usually create
44
44
-**If you use both Azure Monitor and Microsoft Sentinal**, create a separate workspace for each. Consider combining the two if it helps you reach a commitment tier.
45
45
46
46
47
-
### Azure tenants<aname="azure-tenants"></a>
47
+
### Azure tenants
48
48
Most resources can only send monitoring data to a workspace in the same Azure tenant. Virtual machines using the [Azure Monitor agent](../agents/azure-monitor-agent-overview.md) or the [Log Analytics agents](../agents/log-analytics-agent.md) can send data to workspaces in separate Azure tenants, which may be a scenario that you consider as a [service provider](#multiple-tenant-strategies).
49
49
50
50
-**If you have a single Azure tenant**, then create a single workspace for that tenant.
51
51
-**If you have multiple Azure tenants**, then create a workspace for each tenant. See [Multiple tenant strategies](#multiple-tenant-strategies) for other options including strategies for service providers.
52
52
53
-
### Azure regions<aname="azure-regions"></a>
53
+
### Azure regions
54
54
Log Analytics workspaces each reside in a [particular Azure region](https://azure.microsoft.com/global-infrastructure/geographies/), and you may have regulatory or compliance purposes for keeping data in a particular region. For example, an international company might locate a workspace in each major geographical region, such as United States and Europe.
55
55
56
56
-**If you have requirements for keeping data in a particular geography**, create a separate workspace for each region with such requirements.
@@ -65,27 +65,27 @@ Use the [Azure pricing calculator](https://azure.microsoft.com/pricing/calculato
65
65
-**If bandwidth charges are not significant enough to justify the additional complexity**, use a single workspace for all regions.
66
66
67
67
68
-
### Data ownership<aname="data-ownership"></a>
68
+
### Data ownership
69
69
You may have a requirement to segregate data or define boundaries based on ownership. For example, you may have different subsidiaries or affiliated companies that require delineation of their monitoring data.
70
70
71
71
-**If you require data segregation**, use a separate workspace for each data owner.
72
72
-**If you do not require data segregation**, use a single workspace for all data owners.
73
73
74
-
### Split billing<aname="split-billing"></a>
74
+
### Split billing
75
75
You may need to split billing between different parties or perform charge back to a customer or internal business unit. [Azure Cost Management + Billing](../usage-estimated-costs.md#azure-cost-management--billing) allows you to view charges by workspace. You can also use a log query to view [billable data volume by Azure resource, resource group, or subscription](analyze-usage.md#data-volume-by-azure-resource-resource-group-or-subscription), which may be sufficient for your billing requirements.
76
76
77
77
-**If you do not need to split billing or perform charge back**, use a single workspace for all cost owners.
78
78
-**If you need to split billing or perform charge back**, consider whether [Azure Cost Management + Billing](../usage-estimated-costs.md#azure-cost-management--billing) or a log query provides granular enough cost reporting for your requirements. If not, use a separate workspace for each cost owner.
79
79
80
-
### Data retention and archive<aname="data-retention-and-archive"></a>
80
+
### Data retention and archive
81
81
You can configure default [data retention and archive settings](data-retention-archive.md) for a workspace or [configure different settings for each table](data-retention-archive.md#set-retention-and-archive-policy-by-table). You may require different settings for different sets of data in a particular table. If this is the case, then you would need to separate that data into different workspaces, each with unique retention settings.
82
82
83
83
-**If you can use the same retention and archive settings for all data in each table**, use a single workspace for all resources.
84
84
-**If you can require different retention and archive settings for different resources in the same table**, use a separate workspace for different resources.
[Commitment tiers](../logs/cost-logs.md#commitment-tiers) provide a discount to your workspace ingestion costs when you commit to a particular amount of daily data. You may choose to consolidate data in a single workspace in order to reach the level of a particular tier. This same volume of data spread across multiple workspaces would not be eligible for the same tier, unless you have a dedicated cluster.
90
90
91
91
If you can commit to daily ingestion of at least 500 GB/day, then you should implement a [dedicated cluster](../logs/cost-logs.md#dedicated-clusters) which provides additional functionality and performance. Dedicated clusters also allow you to combine the data from multiple workspaces in the cluster to reach the level of a commitment tier.
@@ -95,15 +95,15 @@ If you can commit to daily ingestion of at least 500 GB/day, then you should imp
While you should avoid sending duplicate data to multiple workspaces because of the additional charges, you may have virtual machines connected to multiple workspaces. The most common scenario is an agent connected to separate workspaces for Azure Monitor and Microsoft Sentinel.
100
100
101
101
The [Azure Monitor agent](../agents/azure-monitor-agent-overview.md) and [Log Analytics agent for Windows](../agents/log-analytics-agent.md) can connect to multiple workspaces. The [Log Analytics agent for Linux](../agents/log-analytics-agent.md) though can only connect to a single workspace.
102
102
103
103
-**If you use the Log Analytics agent for Linux**, migrate to the [Azure Monitor agent](../agents/azure-monitor-agent-overview.md) or ensure that your Linux machines only require access to a single workspace.
104
104
105
105
106
-
### Data access control<aname="data-access-control"></a>
106
+
### Data access control
107
107
When you grant a user [access to a workspace](manage-access.md#azure-rbac), they have access to all data in that workspace. This is appropriate for a member of a central administration or security team who must access data for all resources. Access to the workspace is also determined by resource-context RBAC and table-level RBAC.
0 commit comments