Friday, October 22, 2021

 

This is a continuation of an article that describes operational considerations for hosting solutions on Azure public cloud.

Log analytics workspace does not always follow a one-size-fits-all. These map to the Centralized, Decentralized or Hybrid structures of IT in the organizations.  In the case of centralized IT infrastructure, all logs are stored in a centralized workspace and administered by a single team, with Azure Monitor providing differentiated access per team. This is an easy solution to manage. It helps with searching across resources and cross-correlating logs. The decentralized department or teams run their own workspaces in a resource group they own and manage. Even in this case, the workspace can be kept secure and access control can be kept consistent with resource access, but it is difficult to cross-correlate logs without involving third-party log indexes. Without a combined index, every addition of a workspace will require a rewrite of the queries. In the hybrid environment, both deployments are deployed in parallel. The hybrid case results in complex, expensive and hard to maintain configuration. The log analytics workspace can be in any region, but the destination storage account or event hub must be in the same region as the Log Analytics workspace. The jump from centralized to decentralized log analytics workspace is warranted when cross-correlation queries are not required.

In all these cases, access to data logs and workspaces must be managed. The workspace must be managed using workspace permissions. Users who need access to log data from specific resources can be granted permission using Azure role-based access control (Azure RBAC) and those who need access to specific tables in the workspace can have restrictive access. The access control mode can be configured on a workspace from Azure Portal.

The workspace context and resource context have different access. All logs in the workspace can be accessed with the workspace context. The Resource context is aimed at Application teams. Administrators of Azure resources that are monitored can be granted access. The view for these users gets restricted based on their role and scope.

The Azure Monitor has an ingestion pipeline as well as the Log Analytics workspace. It is possible to set it up with a central Storage Account. The incoming data feeds the ingestion pipeline which then sends the data to the storage account or the Event Hub.

Design decisions depend on factors such as whether a central location with all data is required and should there be one workspace per application or each team manages their own workspaces. Data Location, data retention, data access, and data collection must be decided for a streamlined data path. A good data path will be short and clean.

 

 

 

No comments:

Post a Comment