This blog post is all about Log Analytics workspace (later referred as LA) permission models which changed at May 2019. The options (at time of writing) for granting permissions are:
- Grant access using Azure role-based access control (RBAC).
- Grant access to the workspace using workspace permissions.
- Grant access using a specific table in the workspace using Azure RBAC.
These new options gives more granular controls for granting permission to Log Analytics workspaces instead of old model. Anyway, I see still place for granting workspace permissions. It comes back to Log Analytics’ workspace design and organization needs. How operating teams, development teams, and security organization needs to access the performance and security-related events.
There are basically two approaches for Log Analytics design:
- Centralized
- Siloed
If you have chosen the centralized model then more granularity access controls might be needed and you can leverage more about new access control modes table (Resource centric RBAC & Table level RBAC).
Access control mode
The new access model is automatically configured to all workspaces created after March 2019.
How to check which access model is in use?
Navigate to Azure Log Analytics and overview page where you can find ”access control mode” options for the workspace.
- If you are using legacy model ”Access Control mode = require workspace permissions”
- If new model is in place ”Access Control mode = Use resource or workspace permissions”
With PowerShell
- If output is true – Log Analytics is using new access model
- If output is false or null – Log Analytics is using legacy model
Get-AzResource -ResourceType Microsoft.OperationalInsights/workspaces -ExpandProperties | foreach {$_.Name + ": " + $_.Properties.features.enableLogAccessUsingOnlyResourcePermissions}

How to change access model?
Access model can be changed directory from resource properties and verified from Activity log.
If Powershell is the favorite tool for changes here you go (code from docs.microsoft.com)
$WSName = "my-workspace"
$Workspace = Get-AzResource -Name $WSName -ExpandProperties
if ($Workspace.Properties.features.enableLogAccessUsingOnlyResourcePermissions -eq $null)
{ $Workspace.Properties.features | Add-Member enableLogAccessUsingOnlyResourcePermissions $true -Force }
else
{ $Workspace.Properties.features.enableLogAccessUsingOnlyResourcePermissions = $true }
Set-AzResource -ResourceId $Workspace.ResourceId -Properties $Workspace.Properties -Force
New Model In Action
The scenario
Siloed Log Analytics workspace design is in use and operational team members needs to maintain Virtual Machines. In practical person needs to read Virtual Machine metrics and performance data from LA.
If new access model is in use members of the team can access the needed logs directly from the resource blade. They cannot see the LA at all because they don’t have global read access to the resource. If user browses to Azure Monitor the user can see logs he/she has access to.
When log search is opened from a resource menu, the search is automatically scoped to that resource and resource-centric queries are used. This means that if users have access to a resource, they’ll be able to access their logs.

Built-in Roles (from docs.microsoft.com)
Azure has two built-in user roles for Log Analytics workspaces:
- Log Analytics Reader
- Log Analytics Contributor
Members of the Log Analytics Reader role can:
- View and search all monitoring data
- View monitoring settings, including viewing the configuration of Azure diagnostics on all Azure resources.
Nothing prevents from using built-in roles but keep in mind that these are top level permissions. If user has Log Analytics reader permission global read permission with the standard Reader or Contributor roles that include the */read action, it will override the per-table access control and give them access to all log data.
Table Level Access
More granular controls can be achieved with Table level access in case its needed. If centralized Log Analytics model is chosen scenario it might be necessary to grant permissions to different teams to read data from LA tables. This can be achieved with Table level RBAC permissions.
With table level RBAC you can grant permissions only to needed LA tables depending on your needs.

Considerations
If a user has global read permission (Reader or Contributor roles) that include the */read action, it will override the per-table access control and give them access to all log data.
If a user has access to specific LA table but no other permissions, they would be able to access log data through the API but not from the Azure portal.
Summary
Most cases I have worked with, multi-homing Log Analytics design has been used and workspace centric model is enough to satisfy the needs. If centralized model (as few LA’s as possible) would be in use new access model gives more granularity.
0 comments on “Azure Log Analytics – Permission Models”