Rediger

Del via


System information

Applies to: ✅ Microsoft FabricAzure Data Explorer

This section summarizes commands that are available to Database Admins and Database Monitors to explore usage, track operations, and investigate ingestion failures. For more information on security roles, see Kusto role-based access control.