|
2 | 2 | title: Design a Log Analytics workspace architecture
|
3 | 3 | description: The article describes the considerations and recommendations for customers preparing to deploy a workspace in Azure Monitor.
|
4 | 4 | ms.topic: conceptual
|
5 |
| -ms.date: 05/30/2024 |
| 5 | +ms.date: 08/15/2024 |
6 | 6 | ---
|
7 | 7 |
|
8 | 8 | # Design a Log Analytics workspace architecture
|
@@ -67,6 +67,7 @@ Each Log Analytics workspace resides in a [particular Azure region](https://azur
|
67 | 67 |
|
68 | 68 | - **If you have requirements for keeping data in a particular geography:** Create a separate workspace for each region with such requirements.
|
69 | 69 | - **If you don't have requirements for keeping data in a particular geography:** Use a single workspace for all regions.
|
| 70 | +- **If you are sending data to a geography or region that outside of your workspace's region, whether or not the sending resource resides in Azure**: Consider using a workspace in the same geography or region as your data. |
70 | 71 |
|
71 | 72 | Also consider potential [bandwidth charges](https://azure.microsoft.com/pricing/details/bandwidth/) that might apply when you're sending data to a workspace from a resource in another region. These charges are usually minor relative to data ingestion costs for most customers. These charges typically result from sending data to the workspace from a virtual machine. Monitoring data from other Azure resources by using [diagnostic settings](../essentials/diagnostic-settings.md) doesn't [incur egress charges](../cost-usage.md#data-transfer-charges).
|
72 | 73 |
|
@@ -123,18 +124,24 @@ For example, you might grant access to only specific tables collected by Microso
|
123 | 124 | - **If you don't require granular access control by table:** Grant the operations and security team access to their resources and allow resource owners to use resource-context RBAC for their resources.
|
124 | 125 | - **If you require granular access control by table:** Grant or deny access to specific tables by using table-level RBAC.
|
125 | 126 |
|
| 127 | +For more information, see [Manage access to Microsoft Sentinel data by resource](../../sentinel/resource-context-rbac.md). |
| 128 | + |
126 | 129 | ### Resilience
|
127 | 130 |
|
128 | 131 | To ensure that critical data in your workspace is available in the event of a region failure, you can ingest some or all of your data into multiple workspaces in different regions.
|
129 | 132 |
|
130 | 133 | This option requires managing integration with other services and products separately for each workspace. Even though the data will be available in the alternate workspace in case of failure, resources that rely on the data, such as alerts and workbooks, won't know to switch over to the alternate workspace. Consider storing ARM templates for critical resources with configuration for the alternate workspace in Azure DevOps, or as disabled policies that can quickly be enabled in a failover scenario.
|
131 | 134 |
|
132 | 135 | ## Work with multiple workspaces
|
133 |
| -Many designs include multiple workspaces, so Azure Monitor and Microsoft Sentinel include features to assist you in analyzing this data across workspaces. For more information, see: |
| 136 | +Many designs include multiple workspaces. For example, a central security operations team might use its own Microsoft Sentinel workspaces to manage centralized artifacts like analytics rules or workbooks. |
| 137 | + |
| 138 | +Both Azure Monitor and Microsoft Sentinel include features to assist you in analyzing this data across workspaces. For more information, see: |
134 | 139 |
|
135 | 140 | - [Create a log query across multiple workspaces and apps in Azure Monitor](cross-workspace-query.md)
|
136 | 141 | - [Extend Microsoft Sentinel across workspaces and tenants](../../sentinel/extend-sentinel-across-workspaces-tenants.md)
|
137 | 142 |
|
| 143 | +When naming each workspace, we recommend including a meaningful indicator in the name so that you can easily identity the purpose of each workspace. |
| 144 | + |
138 | 145 | ## Multiple tenant strategies
|
139 | 146 | Environments with multiple Azure tenants, including Microsoft service providers (MSPs), independent software vendors (ISVs), and large enterprises, often require a strategy where a central administration team has access to administer workspaces located in other tenants. Each of the tenants might represent separate customers or different business units.
|
140 | 147 |
|
|
0 commit comments