Back to Dashboard

Log Analytics Contributor

Azure Built-in Role

Role Information

Details and metadata

Role ID
92aaf0da-9dab-42b6-94a3-d43ce8d16293
Type
BuiltInRole
Last Updated (Azure)
2025-12-17 10:01:15

Change History

Track all modifications to this role

2025-12-17 10:01:15 Updated

properties.updatedOn, properties.permissions

View details
{
"id": "/providers/Microsoft.Authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293",
"name": "92aaf0da-9dab-42b6-94a3-d43ce8d16293",
"properties": {
"assignableScopes": [
"/"
],
"createdBy": null,
"createdOn": "2017-04-25T21:51:45.317Z",
"description": "Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.",
"permissions": [
{
"actions": [
"*/read",
"Microsoft.ClassicCompute/virtualMachines/extensions/*",
"Microsoft.ClassicStorage/storageAccounts/listKeys/action",
"Microsoft.Compute/virtualMachines/extensions/*",
"Microsoft.HybridCompute/machines/extensions/write",
"Microsoft.Insights/alertRules/*",
"Microsoft.Insights/diagnosticSettings/*",
"Microsoft.OperationalInsights/*",
"Microsoft.OperationsManagement/*",
"Microsoft.Resources/deployments/*",
"Microsoft.Resources/subscriptions/resourcegroups/deployments/*",
"Microsoft.Storage/storageAccounts/listKeys/action",
"Microsoft.Support/*"
],
- "dataActions": [
+ "dataActions": [],
- "Microsoft.OperationalInsights/workspaces/jobs/export/action"
- ],
"notActions": [],
"notDataActions": []
}
],
"roleName": "Log Analytics Contributor",
"type": "BuiltInRole",
"updatedBy": null,
- "updatedOn": "2025-12-12T15:31:40.657Z"
+ "updatedOn": "2025-12-17T10:01:15.704Z"
},
"type": "Microsoft.Authorization/roleDefinitions"
}
2025-12-12 15:31:40 Initial Scan
View details
{
  "properties": {
    "roleName": "Log Analytics Contributor",
    "type": "BuiltInRole",
    "description": "Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.",
    "assignableScopes": [
      "/"
    ],
    "permissions": [
      {
        "actions": [
          "*/read",
          "Microsoft.ClassicCompute/virtualMachines/extensions/*",
          "Microsoft.ClassicStorage/storageAccounts/listKeys/action",
          "Microsoft.Compute/virtualMachines/extensions/*",
          "Microsoft.HybridCompute/machines/extensions/write",
          "Microsoft.Insights/alertRules/*",
          "Microsoft.Insights/diagnosticSettings/*",
          "Microsoft.OperationalInsights/*",
          "Microsoft.OperationsManagement/*",
          "Microsoft.Resources/deployments/*",
          "Microsoft.Resources/subscriptions/resourcegroups/deployments/*",
          "Microsoft.Storage/storageAccounts/listKeys/action",
          "Microsoft.Support/*"
        ],
        "notActions": [],
        "dataActions": [],
        "notDataActions": []
      }
    ],
    "createdOn": "2017-04-25T21:51:45.317Z",
    "updatedOn": "2025-12-17T10:01:15.704Z",
    "createdBy": null,
    "updatedBy": null
  },
  "id": "/providers/Microsoft.Authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293",
  "type": "Microsoft.Authorization/roleDefinitions",
  "name": "92aaf0da-9dab-42b6-94a3-d43ce8d16293"
}

Latest Role JSON

Raw definition from Azure

{
  "properties": {
    "roleName": "Log Analytics Contributor",
    "type": "BuiltInRole",
    "description": "Log Analytics Contributor can read all monitoring data and edit monitoring settings. Editing monitoring settings includes adding the VM extension to VMs; reading storage account keys to be able to configure collection of logs from Azure Storage; adding solutions; and configuring Azure diagnostics on all Azure resources.",
    "assignableScopes": [
      "/"
    ],
    "permissions": [
      {
        "actions": [
          "*/read",
          "Microsoft.ClassicCompute/virtualMachines/extensions/*",
          "Microsoft.ClassicStorage/storageAccounts/listKeys/action",
          "Microsoft.Compute/virtualMachines/extensions/*",
          "Microsoft.HybridCompute/machines/extensions/write",
          "Microsoft.Insights/alertRules/*",
          "Microsoft.Insights/diagnosticSettings/*",
          "Microsoft.OperationalInsights/*",
          "Microsoft.OperationsManagement/*",
          "Microsoft.Resources/deployments/*",
          "Microsoft.Resources/subscriptions/resourcegroups/deployments/*",
          "Microsoft.Storage/storageAccounts/listKeys/action",
          "Microsoft.Support/*"
        ],
        "notActions": [],
        "dataActions": [],
        "notDataActions": []
      }
    ],
    "createdOn": "2017-04-25T21:51:45.317Z",
    "updatedOn": "2025-12-17T10:01:15.704Z",
    "createdBy": null,
    "updatedBy": null
  },
  "id": "/providers/Microsoft.Authorization/roleDefinitions/92aaf0da-9dab-42b6-94a3-d43ce8d16293",
  "type": "Microsoft.Authorization/roleDefinitions",
  "name": "92aaf0da-9dab-42b6-94a3-d43ce8d16293"
}

Effective Permissions

Operations granted by this role (7582 total)

Permission Patterns (from role definition)

Actions 13 patterns
*/read Microsoft.ClassicCompute/virtualMachines/extensions/* Microsoft.ClassicStorage/storageAccounts/listKeys/action Microsoft.Compute/virtualMachines/extensions/* Microsoft.HybridCompute/machines/extensions/write Microsoft.Insights/alertRules/* Microsoft.Insights/diagnosticSettings/* Microsoft.OperationalInsights/* Microsoft.OperationsManagement/* Microsoft.Resources/deployments/* Microsoft.Resources/subscriptions/resourcegroups/deployments/* Microsoft.Storage/storageAccounts/listKeys/action Microsoft.Support/*

Control Plane Operations (7582)

Data Plane Operations (0)

No data plane operations granted