Share via

Can Azure Managed Grafana in one Azure tenant query Log Analytics data that resides in a different Azure tenant, and if so, what is the supported configuration?

Daniel-4204 230 Reputation points
2026-01-06T16:35:34.93+00:00

I have not been able to find explicit Microsoft documentation stating whether Azure Managed Grafana supports querying data across multiple Azure tenants.

Based on existing Azure documentation, it appears this should be possible by granting RBAC access in Tenant B to the system-assigned managed identity (object/principal ID) of an Azure Managed Grafana instance running in Tenant A. However, in practice, this does not appear to work when attempting to manually assign the managed identity in the Azure Portal, even after enabling cross-tenant access for service principals and managed identities.

When pasting the managed identity’s object ID from Tenant A into the IAM role assignment picker in Tenant B, the identity cannot be resolved (“No results”), and there is no clear guidance on whether a prerequisite step (such as explicitly materializing the service principal via CLI or Microsoft Graph) is required, or if cross-tenant usage is unsupported by design.

Could you please clarify:

Whether Azure Managed Grafana is supported for cross-tenant data access (e.g., querying Log Analytics workspaces in another tenant), and

If so, what the officially supported configuration and required steps are?

Thank you,

Azure Managed Grafana
Azure Managed Grafana

An Azure service used to deploy Grafana dashboards for analytics and monitoring solutions.


1 answer

Sort by: Most helpful
  1. Bharath Y P 8,495 Reputation points Microsoft External Staff Moderator
    2026-01-06T18:12:49.69+00:00

    Hello Daniel-4204, We understand that you’re trying to enable Azure Managed Grafana in Tenant A to query data (e.g., Log Analytics) in Tenant B. You attempted to grant RBAC in Tenant B to the system‑assigned managed identity of the Grafana workspace from Tenant A, but the identity can’t be resolved in the IAM role picker even with cross‑tenant access enabled. You want to know whether cross‑tenant access is supported and, if so, the officially supported configuration and steps.

    When you enable a System-Assigned Managed Identity in Tenant A, Entra ID creates a Service Principal only in Tenant A. It is not globally discoverable, which is why the Tenant B IAM picker returns “No Results.”

    While you can materialize user-assigned managed identities or app registrations in Tenant B via CLI (az ad sp create --id), this is unsupported for system-assigned identities in Azure Managed Grafana. Grafana’s “Managed Identity” authentication path is hardcoded to request tokens only from its home tenant (Tenant A); it cannot request cross-tenant tokens.

    You can try below supported configuration for cross-tenant Log Analytics queries in Azure Managed Grafana:

    Hope this helps. Thanks

    We have reached out to you in Private messages for additional details, could you please look into it and share us the details? Thanks

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.