Operation Information
Details and metadata
Microsoft.Insights/DiagnosticSettings/Delete
Roles Allowing This Operation
17 roles grant this permission
| Role Name | Note |
|---|---|
|
Automation Contributor
f353d9bd-d4a6-484e-a77a-8050b599b867
|
— |
|
Azure AI Account Owner
e47c6f54-e4a2-4754-9501-8e0985b135e1
|
— |
|
Azure AI Administrator
b78c5d69-af96-48a3-bf8d-a8b4d589de94
|
— |
|
Azure Sphere Contributor
8b9dfcab-4b77-4632-a6df-94bd07820648
|
— |
|
Azure Sphere Owner
5a382001-fe36-41ff-bba4-8bf06bd54da9
|
— |
|
Cognitive Services Contributor
25fbc0a9-bd7c-42a3-aa1a-3b75d497ee68
|
— |
|
Contributor
b24988ac-6180-42a0-ab88-20f7382dd24c
|
— |
|
Domain Services Contributor
eeaeda52-9324-47f6-8069-5d5bade478b2
|
— |
|
Fabric Resource Management Administrator
337a31c1-4e14-4ef9-83ed-584bb8d2b70a
|
— |
|
Log Analytics Contributor
92aaf0da-9dab-42b6-94a3-d43ce8d16293
|
— |
Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns,
excluding any patterns in notActions or notDataActions.
Wildcard patterns (like */read or *) are expanded to match this specific operation.