Skip to content

Commit 809b11e

Browse files
Merge pull request #223623 from guywi-ms/patch-35
Update manage-access.md
2 parents d45c1fd + 7e39199 commit 809b11e

File tree

1 file changed

+23
-4
lines changed

1 file changed

+23
-4
lines changed

articles/azure-monitor/logs/manage-access.md

Lines changed: 23 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -163,6 +163,8 @@ Each workspace can have multiple accounts associated with it. Each account can h
163163
| Read the workspace keys to allow sending logs to this workspace. | `Microsoft.OperationalInsights/workspaces/sharedKeys/action` |
164164
| Add and remove monitoring solutions. | `Microsoft.Resources/deployments/*` <br> `Microsoft.OperationalInsights/*` <br> `Microsoft.OperationsManagement/*` <br> `Microsoft.Automation/*` <br> `Microsoft.Resources/deployments/*/write`<br><br>These permissions need to be granted at resource group or subscription level. |
165165
| View data in the **Backup** and **Site Recovery** solution tiles. | Administrator/Co-administrator<br><br>Accesses resources deployed by using the classic deployment model. |
166+
| Run a search job. | `Microsoft.OperationalInsights/workspaces/tables/write` <br> `Microsoft.OperationalInsights/workspaces/searchJobs/write`|
167+
| Restore data from archived table. | `Microsoft.OperationalInsights/workspaces/tables/write` <br> `Microsoft.OperationalInsights/workspaces/restoreLogs/write`|
166168

167169
### Built-in roles
168170

@@ -245,24 +247,34 @@ The `/read` permission is usually granted from a role that includes _\*/read or_
245247

246248
In addition to using the built-in roles for a Log Analytics workspace, you can create custom roles to assign more granular permissions. Here are some common examples.
247249

248-
**Example 1: Grant a user access to log data from their resources.**
250+
**Example 1: Grant a user permission to read log data from their resources.**
249251

250252
- Configure the workspace access control mode to *use workspace or resource permissions*.
251253
- Grant users `*/read` or `Microsoft.Insights/logs/*/read` permissions to their resources. If they're already assigned the [Log Analytics Reader](../../role-based-access-control/built-in-roles.md#reader) role on the workspace, it's sufficient.
252254

253-
**Example 2: Grant a user access to log data from their resources and configure their resources to send logs to the workspace.**
255+
256+
**Example 2: Grant a user permission to read log data from their resources and run a search job.**
257+
258+
- Configure the workspace access control mode to *use workspace or resource permissions*.
259+
- Grant users `*/read` or `Microsoft.Insights/logs/*/read` permissions to their resources. If they're already assigned the [Log Analytics Reader](../../role-based-access-control/built-in-roles.md#reader) role on the workspace, it's sufficient.
260+
- Grant users the following permissions on the workspace:
261+
- `Microsoft.OperationalInsights/workspaces/tables/write`: Required to be able to create the search results table (_SRCH).
262+
- `Microsoft.OperationalInsights/workspaces/searchJobs/write`: Required to allow executing the search job operation.
263+
264+
265+
**Example 3: Grant a user permission to read log data from their resources and configure their resources to send logs to the Log Analytics workspace.**
254266

255267
- Configure the workspace access control mode to *use workspace or resource permissions*.
256268
- Grant users the following permissions on the workspace: `Microsoft.OperationalInsights/workspaces/read` and `Microsoft.OperationalInsights/workspaces/sharedKeys/action`. With these permissions, users can't perform any workspace-level queries. They can only enumerate the workspace and use it as a destination for diagnostic settings or agent configuration.
257269
- Grant users the following permissions to their resources: `Microsoft.Insights/logs/*/read` and `Microsoft.Insights/diagnosticSettings/write`. If they're already assigned the [Log Analytics Contributor](../../role-based-access-control/built-in-roles.md#contributor) role, assigned the Reader role, or granted `*/read` permissions on this resource, it's sufficient.
258270

259-
**Example 3: Grant a user access to log data from their resources without being able to read security events and send data.**
271+
**Example 4: Grant a user permission to read log data from their resources, but not to send logs to the Log Analytics workspace or read security events.**
260272

261273
- Configure the workspace access control mode to *use workspace or resource permissions*.
262274
- Grant users the following permissions to their resources: `Microsoft.Insights/logs/*/read`.
263275
- Add the following NonAction to block users from reading the SecurityEvent type: `Microsoft.Insights/logs/SecurityEvent/read`. The NonAction shall be in the same custom role as the action that provides the read permission (`Microsoft.Insights/logs/*/read`). If the user inherits the read action from another role that's assigned to this resource or to the subscription or resource group, they could read all log types. This scenario is also true if they inherit `*/read` that exists, for example, with the Reader or Contributor role.
264276

265-
**Example 4: Grant a user access to log data from their resources and read all Azure AD sign-in and read Update Management solution log data from the workspace.**
277+
**Example 5: Grant a user permission to read log data from their resources and all Azure AD sign-in and read Update Management solution log data in the Log Analytics workspace.**
266278

267279
- Configure the workspace access control mode to *use workspace or resource permissions*.
268280
- Grant users the following permissions on the workspace:
@@ -276,6 +288,13 @@ In addition to using the built-in roles for a Log Analytics workspace, you can c
276288
- `Microsoft.OperationalInsights/workspaces/query/ComputerGroup/read`: Required to be able to use Update Management solutions
277289
- Grant users the following permissions to their resources: `*/read`, assigned to the Reader role, or `Microsoft.Insights/logs/*/read`
278290

291+
**Example 6: Restrict a user from restoring archived logs.**
292+
293+
- Configure the workspace access control mode to *use workspace or resource permissions*.
294+
- Assign the user to the [Log Analytics Contributor](../../role-based-access-control/built-in-roles.md#contributor) role.
295+
- Add the following NonAction to block users from restoring archived logs: `Microsoft.OperationalInsights/workspaces/restoreLogs/write`
296+
297+
279298
## Set table-level read access
280299

281300
[Azure custom roles](../../role-based-access-control/custom-roles.md) let you grant specific users or groups access to specific tables in the workspace. Azure custom roles apply to workspaces with either workspace-context or resource-context [access control modes](#access-control-mode) regardless of the user's [access mode](#access-mode).

0 commit comments

Comments
 (0)