Skip to content

Commit 1f64252

Browse files
Merge pull request #295307 from rolyon/rolyon-rbac-roles-monitor-category
[Azure RBAC] Data Purger and Log Analytics roles to Monitor category
2 parents db047e7 + 3245752 commit 1f64252

File tree

4 files changed

+170
-170
lines changed

4 files changed

+170
-170
lines changed

articles/role-based-access-control/built-in-roles.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -253,13 +253,10 @@ The following table provides a brief description of each built-in role. Click th
253253
> | <a name='azure-event-hubs-data-receiver'></a>[Azure Event Hubs Data Receiver](./built-in-roles/analytics.md#azure-event-hubs-data-receiver) | Allows receive access to Azure Event Hubs resources. | a638d3c7-ab3a-418d-83e6-5f17a39d4fde |
254254
> | <a name='azure-event-hubs-data-sender'></a>[Azure Event Hubs Data Sender](./built-in-roles/analytics.md#azure-event-hubs-data-sender) | Allows send access to Azure Event Hubs resources. | 2b629674-e913-4c01-ae53-ef4638d8f975 |
255255
> | <a name='data-factory-contributor'></a>[Data Factory Contributor](./built-in-roles/analytics.md#data-factory-contributor) | Create and manage data factories, as well as child resources within them. | 673868aa-7521-48a0-acc6-0f60742d39f5 |
256-
> | <a name='data-purger'></a>[Data Purger](./built-in-roles/analytics.md#data-purger) | Delete private data from a Log Analytics workspace. | 150f5e0c-0603-4f03-8c7f-cf70034c4e90 |
257256
> | <a name='hdinsight-cluster-operator'></a>[HDInsight Cluster Operator](./built-in-roles/analytics.md#hdinsight-cluster-operator) | Lets you read and modify HDInsight cluster configurations. | 61ed4efc-fab3-44fd-b111-e24485cc132a |
258257
> | <a name='hdinsight-domain-services-contributor'></a>[HDInsight Domain Services Contributor](./built-in-roles/analytics.md#hdinsight-domain-services-contributor) | Can Read, Create, Modify and Delete Domain Services related operations needed for HDInsight Enterprise Security Package | 8d8d5a11-05d3-4bda-a417-a08778121c7c |
259258
> | <a name='hdinsight-on-aks-cluster-admin'></a>[HDInsight on AKS Cluster Admin](./built-in-roles/analytics.md#hdinsight-on-aks-cluster-admin) | Grants a user/group the ability to create, delete and manage clusters within a given cluster pool. Cluster Admin can also run workloads, monitor, and manage all user activity on these clusters. | fd036e6b-1266-47a0-b0bb-a05d04831731 |
260259
> | <a name='hdinsight-on-aks-cluster-pool-admin'></a>[HDInsight on AKS Cluster Pool Admin](./built-in-roles/analytics.md#hdinsight-on-aks-cluster-pool-admin) | Can read, create, modify and delete HDInsight on AKS cluster pools and create clusters | 7656b436-37d4-490a-a4ab-d39f838f0042 |
261-
> | <a name='log-analytics-contributor'></a>[Log Analytics Contributor](./built-in-roles/analytics.md#log-analytics-contributor) | Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources. | 92aaf0da-9dab-42b6-94a3-d43ce8d16293 |
262-
> | <a name='log-analytics-reader'></a>[Log Analytics Reader](./built-in-roles/analytics.md#log-analytics-reader) | Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources. | 73c42c96-874c-492b-b04d-ab87d138a893 |
263260
> | <a name='schema-registry-contributor-preview'></a>[Schema Registry Contributor (Preview)](./built-in-roles/analytics.md#schema-registry-contributor-preview) | Read, write, and delete Schema Registry groups and schemas. | 5dffeca3-4936-4216-b2bc-10343a5abb25 |
264261
> | <a name='schema-registry-reader-preview'></a>[Schema Registry Reader (Preview)](./built-in-roles/analytics.md#schema-registry-reader-preview) | Read and list Schema Registry groups and schemas. | 2c56ea50-c6b3-40a6-83c0-9d98858bc7d2 |
265262
> | <a name='stream-analytics-query-tester'></a>[Stream Analytics Query Tester](./built-in-roles/analytics.md#stream-analytics-query-tester) | Lets you perform query testing without creating a stream analytics job first | 1ec5b3c1-b17e-4e25-8312-2acb3c3c5abf |
@@ -479,10 +476,13 @@ The following table provides a brief description of each built-in role. Click th
479476
> | <a name='application-insights-component-contributor'></a>[Application Insights Component Contributor](./built-in-roles/monitor.md#application-insights-component-contributor) | Can manage Application Insights components | ae349356-3a1b-4a5e-921d-050484c6347e |
480477
> | <a name='application-insights-snapshot-debugger'></a>[Application Insights Snapshot Debugger](./built-in-roles/monitor.md#application-insights-snapshot-debugger) | Gives user permission to view and download debug snapshots collected with the Application Insights Snapshot Debugger. Note that these permissions are not included in the [Owner](/azure/role-based-access-control/built-in-roles#owner) or [Contributor](/azure/role-based-access-control/built-in-roles#contributor) roles. When giving users the Application Insights Snapshot Debugger role, you must grant the role directly to the user. The role is not recognized when it is added to a custom role. | 08954f03-6346-4c2e-81c0-ec3a5cfae23b |
481478
> | <a name='azure-managed-grafana-workspace-contributor'></a>[Azure Managed Grafana Workspace Contributor](./built-in-roles/monitor.md#azure-managed-grafana-workspace-contributor) | Can manage Azure Managed Grafana resources, without providing access to the workspaces themselves. | 5c2d7e57-b7c2-4d8a-be4f-82afa42c6e95 |
479+
> | <a name='data-purger'></a>[Data Purger](./built-in-roles/monitor.md#data-purger) | Delete private data from a Log Analytics workspace. | 150f5e0c-0603-4f03-8c7f-cf70034c4e90 |
482480
> | <a name='grafana-admin'></a>[Grafana Admin](./built-in-roles/monitor.md#grafana-admin) | Manage server-wide settings and manage access to resources such as organizations, users, and licenses. | 22926164-76b3-42b3-bc55-97df8dab3e41 |
483481
> | <a name='grafana-editor'></a>[Grafana Editor](./built-in-roles/monitor.md#grafana-editor) | Create, edit, delete, or view dashboards; create, edit, or delete folders; and edit or view playlists. | a79a5197-3a5c-4973-a920-486035ffd60f |
484482
> | <a name='grafana-limited-viewer'></a>[Grafana Limited Viewer](./built-in-roles/monitor.md#grafana-limited-viewer) | View home page. | 41e04612-9dac-4699-a02b-c82ff2cc3fb5 |
485483
> | <a name='grafana-viewer'></a>[Grafana Viewer](./built-in-roles/monitor.md#grafana-viewer) | View dashboards, playlists, and query data sources. | 60921a7e-fef1-4a43-9b16-a26c52ad4769 |
484+
> | <a name='log-analytics-contributor'></a>[Log Analytics Contributor](./built-in-roles/monitor.md#log-analytics-contributor) | Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources. | 92aaf0da-9dab-42b6-94a3-d43ce8d16293 |
485+
> | <a name='log-analytics-reader'></a>[Log Analytics Reader](./built-in-roles/monitor.md#log-analytics-reader) | Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources. | 73c42c96-874c-492b-b04d-ab87d138a893 |
486486
> | <a name='monitoring-contributor'></a>[Monitoring Contributor](./built-in-roles/monitor.md#monitoring-contributor) | Can read all monitoring data and edit monitoring settings. See also [Get started with roles, permissions, and security with Azure Monitor](/azure/azure-monitor/roles-permissions-security#built-in-monitoring-roles). | 749f88d5-cbae-40b8-bcfc-e573ddc772fa |
487487
> | <a name='monitoring-metrics-publisher'></a>[Monitoring Metrics Publisher](./built-in-roles/monitor.md#monitoring-metrics-publisher) | Enables publishing metrics against Azure resources | 3913510d-42f4-4e42-8a64-420c390055eb |
488488
> | <a name='monitoring-reader'></a>[Monitoring Reader](./built-in-roles/monitor.md#monitoring-reader) | Can read all monitoring data (metrics, logs, etc.). See also [Get started with roles, permissions, and security with Azure Monitor](/azure/azure-monitor/roles-permissions-security#built-in-monitoring-roles). | 43d0d8ad-25c7-4714-9337-8ba259a9fe05 |

articles/role-based-access-control/built-in-roles/analytics.md

Lines changed: 0 additions & 165 deletions
Original file line numberDiff line numberDiff line change
@@ -202,53 +202,6 @@ Create and manage data factories, as well as child resources within them.
202202
}
203203
```
204204

205-
## Data Purger
206-
207-
Delete private data from a Log Analytics workspace.
208-
209-
[Learn more](/azure/azure-monitor/logs/personal-data-mgmt)
210-
211-
> [!div class="mx-tableFixed"]
212-
> | Actions | Description |
213-
> | --- | --- |
214-
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/components/*/read | |
215-
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/components/purge/action | Purging data from Application Insights |
216-
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/*/read | View log analytics data |
217-
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/purge/action | Delete specified data by query from workspace. |
218-
> | **NotActions** | |
219-
> | *none* | |
220-
> | **DataActions** | |
221-
> | *none* | |
222-
> | **NotDataActions** | |
223-
> | *none* | |
224-
225-
```json
226-
{
227-
"assignableScopes": [
228-
"/"
229-
],
230-
"description": "Can purge analytics data",
231-
"id": "/providers/Microsoft.Authorization/roleDefinitions/150f5e0c-0603-4f03-8c7f-cf70034c4e90",
232-
"name": "150f5e0c-0603-4f03-8c7f-cf70034c4e90",
233-
"permissions": [
234-
{
235-
"actions": [
236-
"Microsoft.Insights/components/*/read",
237-
"Microsoft.Insights/components/purge/action",
238-
"Microsoft.OperationalInsights/workspaces/*/read",
239-
"Microsoft.OperationalInsights/workspaces/purge/action"
240-
],
241-
"notActions": [],
242-
"dataActions": [],
243-
"notDataActions": []
244-
}
245-
],
246-
"roleName": "Data Purger",
247-
"roleType": "BuiltInRole",
248-
"type": "Microsoft.Authorization/roleDefinitions"
249-
}
250-
```
251-
252205
## HDInsight Cluster Operator
253206

254207
Lets you read and modify HDInsight cluster configurations.
@@ -559,124 +512,6 @@ Can read, create, modify and delete HDInsight on AKS cluster pools and create cl
559512
}
560513
```
561514

562-
## Log Analytics Contributor
563-
564-
Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.
565-
566-
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
567-
568-
[Learn more](/azure/azure-monitor/logs/manage-access)
569-
570-
> [!div class="mx-tableFixed"]
571-
> | Actions | Description |
572-
> | --- | --- |
573-
> | */read | Read control plane information for all Azure resources. |
574-
> | [Microsoft.ClassicCompute](../permissions/compute.md#microsoftclassiccompute)/virtualMachines/extensions/* | |
575-
> | [Microsoft.ClassicStorage](../permissions/storage.md#microsoftclassicstorage)/storageAccounts/listKeys/action | Lists the access keys for the storage accounts. |
576-
> | [Microsoft.Compute](../permissions/compute.md#microsoftcompute)/virtualMachines/extensions/* | |
577-
> | [Microsoft.HybridCompute](../permissions/hybrid-multicloud.md#microsofthybridcompute)/machines/extensions/write | Installs or Updates an Azure Arc extensions |
578-
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/alertRules/* | Create and manage a classic metric alert |
579-
> | [Microsoft.Insights](../permissions/monitor.md#microsoftinsights)/diagnosticSettings/* | Creates, updates, or reads the diagnostic setting for Analysis Server |
580-
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/* | |
581-
> | [Microsoft.OperationsManagement](../permissions/monitor.md#microsoftoperationsmanagement)/* | |
582-
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/deployments/* | Create and manage a deployment |
583-
> | [Microsoft.Resources](../permissions/management-and-governance.md#microsoftresources)/subscriptions/resourcegroups/deployments/* | |
584-
> | [Microsoft.Storage](../permissions/storage.md#microsoftstorage)/storageAccounts/listKeys/action | Returns the access keys for the specified storage account. |
585-
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |
586-
> | **NotActions** | |
587-
> | *none* | |
588-
> | **DataActions** | |
589-
> | *none* | |
590-
> | **NotDataActions** | |
591-
> | *none* | |
592-
593-
```json
594-
{
595-
"assignableScopes": [
596-
"/"
597-
],
598-
"description": "Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.",
599-
"id": "/providers/Microsoft.Authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293",
600-
"name": "92aaf0da-9dab-42b6-94a3-d43ce8d16293",
601-
"permissions": [
602-
{
603-
"actions": [
604-
"*/read",
605-
"Microsoft.ClassicCompute/virtualMachines/extensions/*",
606-
"Microsoft.ClassicStorage/storageAccounts/listKeys/action",
607-
"Microsoft.Compute/virtualMachines/extensions/*",
608-
"Microsoft.HybridCompute/machines/extensions/write",
609-
"Microsoft.Insights/alertRules/*",
610-
"Microsoft.Insights/diagnosticSettings/*",
611-
"Microsoft.OperationalInsights/*",
612-
"Microsoft.OperationsManagement/*",
613-
"Microsoft.Resources/deployments/*",
614-
"Microsoft.Resources/subscriptions/resourcegroups/deployments/*",
615-
"Microsoft.Storage/storageAccounts/listKeys/action",
616-
"Microsoft.Support/*"
617-
],
618-
"notActions": [],
619-
"dataActions": [],
620-
"notDataActions": []
621-
}
622-
],
623-
"roleName": "Log Analytics Contributor",
624-
"roleType": "BuiltInRole",
625-
"type": "Microsoft.Authorization/roleDefinitions"
626-
}
627-
```
628-
629-
## Log Analytics Reader
630-
631-
Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources.
632-
633-
[!INCLUDE [role-read-permissions.md](../includes/role-read-permissions.md)]
634-
635-
[Learn more](/azure/azure-monitor/logs/manage-access)
636-
637-
> [!div class="mx-tableFixed"]
638-
> | Actions | Description |
639-
> | --- | --- |
640-
> | */read | Read control plane information for all Azure resources. |
641-
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/analytics/query/action | Search using new engine. |
642-
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/search/action | Executes a search query |
643-
> | [Microsoft.Support](../permissions/general.md#microsoftsupport)/* | Create and update a support ticket |
644-
> | **NotActions** | |
645-
> | [Microsoft.OperationalInsights](../permissions/monitor.md#microsoftoperationalinsights)/workspaces/sharedKeys/read | Retrieves the shared keys for the workspace. These keys are used to connect Microsoft Operational Insights agents to the workspace. |
646-
> | **DataActions** | |
647-
> | *none* | |
648-
> | **NotDataActions** | |
649-
> | *none* | |
650-
651-
```json
652-
{
653-
"assignableScopes": [
654-
"/"
655-
],
656-
"description": "Log Analytics Reader can view and search all monitoring data as well as and view monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources.",
657-
"id": "/providers/Microsoft.Authorization/roleDefinitions/73c42c96-874c-492b-b04d-ab87d138a893",
658-
"name": "73c42c96-874c-492b-b04d-ab87d138a893",
659-
"permissions": [
660-
{
661-
"actions": [
662-
"*/read",
663-
"Microsoft.OperationalInsights/workspaces/analytics/query/action",
664-
"Microsoft.OperationalInsights/workspaces/search/action",
665-
"Microsoft.Support/*"
666-
],
667-
"notActions": [
668-
"Microsoft.OperationalInsights/workspaces/sharedKeys/read"
669-
],
670-
"dataActions": [],
671-
"notDataActions": []
672-
}
673-
],
674-
"roleName": "Log Analytics Reader",
675-
"roleType": "BuiltInRole",
676-
"type": "Microsoft.Authorization/roleDefinitions"
677-
}
678-
```
679-
680515
## Schema Registry Contributor (Preview)
681516

682517
Read, write, and delete Schema Registry groups and schemas.

0 commit comments

Comments
 (0)