Sizing Azure Log Analytics best practices

Logging

At scale, Azure Log Analytics isn’t just about enabling diagnostics it becomes a full-fledged data engineering challenge. Logs from PaaS, IaaS, and security tools converge into a shared workspace, bringing together diverse data types such as metrics, traces, and logs. Each of these sources may have different retention requirements, and the ingestion patterns are often volatile, with sudden bursts like high-volume network traffic logs. On top of that, maintaining tight query SLAs is critical, especially for dashboards and security operations center (SOC) investigations, where timely insights are non-negotiable.

The below table is forecast of customer average starting point

SourceIngestion (avg/day)Notes
Azure Firewall8–10 GBHigh-velocity; verbose
App Gateway (WAF)3–5 GBContains sensitive POSTs
Defender for Cloud~0.5 GBMostly alerts
100 VMs (Perf + Sys)~30 GBDepends on Windows/Linux split
Sentinel Data Connectors5–15 GBDepends on custom rules, data normalization

Mathematical calculations

Estimated Daily Ingestion (GB) = Σ (Log Volume per Source × Number of Instances)

  • 100 VMs × 0.3 GB = 30 GB
  • 2 Firewalls × 10 GB = 20 GB
  • Defender + Sentinel = ~25 GB
  • Total Per day : ~75 GB/day
  • Total per month : 30X75 = 2,250GB

The default retention is usually 3 months for security related alerts and 7-30 days for performance related alerts

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Verified by MonsterInsights