Operation Information
Details and metadata
Microsoft.OperationalInsights/workspaces/write
Roles Allowing This Operation
12 roles grant this permission
| Role Name | Note |
|---|---|
|
Contributor
b24988ac-6180-42a0-ab88-20f7382dd24c
|
— |
|
Defender Kubernetes Agent Operator
8bb6f106-b146-4ee6-a3f9-b9c5a96e0ae5
|
— |
|
Fabric Resource Management Administrator
337a31c1-4e14-4ef9-83ed-584bb8d2b70a
|
— |
|
Kubernetes Agent Operator
5e93ba01-8f92-4c7a-b12a-801e3df23824
|
— |
|
Kubernetes Agent Subscription Level Operator
ada52afe-776a-4b4d-a8f2-55670d3d8178
|
— |
|
LocalNGFirewallAdministrator role
a8835c7d-b5cb-47fa-b6f0-65ea10ce07a2
|
— |
|
Log Analytics Contributor
92aaf0da-9dab-42b6-94a3-d43ce8d16293
|
— |
|
Monitoring Contributor
749f88d5-cbae-40b8-bcfc-e573ddc772fa
|
— |
|
Monitoring Policy Contributor
47be4a87-7950-4631-9daf-b664a405f074
|
— |
|
Owner
8e3af657-a8ff-443c-a75c-2fe8c4bcb635
|
— |
Note: This list includes roles where the operation is allowed by the role's actions or dataActions patterns,
excluding any patterns in notActions or notDataActions.
Wildcard patterns (like */read or *) are expanded to match this specific operation.