Forum Discussion
Log Analytics into Azure Lighthouse
- Sep 27, 2020
SebastiaanR I never even thought of a scenario where the managing tenant wouldn't have a subscription! Add even an Azure Free Account sub to it and see if that works.
Apply "Log Analytics Reader" role. "Contributor" rights will not give access to read/query logs.
Hope this helps!
-Azeem
Thanks for the guidance.
I've changed this, and I now get the LA Reader role assigned (at subscription level). Whenever I run any query, I still get the following error:
{"statusCode":"Unauthorized","serviceRequestId":null,"statusMessage":"{\"error\":{\"code\":\"AuthorizationRequiredError\",\"message\":\"Valid authentication was not provided\"}}","eventCategory":"Administrative"}
- SoniaCuffAug 31, 2020
Microsoft
SebastiaanR Did you get a resolution for this?
I've mirrored your scenario by setting up my provider with ONLY log analytics reader access to a test customer subscription, and I can successfully query log analytics (via Lighthouse delegation) with no errors. This suggests it's something specific to your provider tenant, which would require a support ticket for Microsoft to investigate.
-Sonia
- milkmix_Sep 11, 2020Copper Contributor
Hi SoniaCuff
Same error in my case. I gave Sentinel Contributor and Logs Analytics Reader (also tried w/ Contributor) access to the same PrincipalId through Lighthouse. I can see alerts/incidents but not perform queries or see tables from the managing tenant.
Managed tenant did enable Microsoft.Insights. Any idea on how to debug this?
- milkmix_Sep 11, 2020Copper ContributorIn case anyone else ran into the same issue: Microsoft.Insights needs to be applied on the managing tenant, not the managed one. This was confusing as the error message only mentions "this subscription" while you're accessing a managed one.
- SoniaCuffAug 31, 2020
Microsoft
Also note the doc on managing access to Log Analytics workspaces states at the bottom that if a user is granted the global Reader or Contributor roles, they will be granted access to all log data:
https://docs.microsoft.com/en-us/azure/azure-monitor/platform/manage-access?WT.mc_id=modinfra-5682-socuff