Resource Organization for Microsoft Fabric Landing Zones
Last updated: 02/27/2025
The resource organization design area establishes consistent patterns for organizing Microsoft Fabric resources within Azure. It ensures scalable, compliant, and manageable environments aligned with best practices for governance, domain architecture, and workload separation specific to Microsoft Fabric.
Overview
Microsoft Fabric Landing Zones require careful planning of your resource structure to achieve the following goals:
- Separation of duties: Isolate domains, workspaces, and environments using subscriptions and resource groups.
- Scalability: Enable growth by assigning workloads to separate Fabric Domains, Capacities, and regions.
- Compliance and policy enforcement: Use Azure Policy and Fabric governance tools to enforce naming, tagging, and configuration standards.
- Operational clarity: Facilitate monitoring, cost management, and DevOps automation through structured Fabric resource topology.
This guidance focuses on Microsoft Fabric-specific requirements while building on Azure landing zone fundamentals.
Scope and Roles
Involved Functions
This design area involves:
- Cloud Platform Team – defines base architecture and policies
- Center of Excellence (CoE) – drives standardization and reuse
- Fabric Solution Architects – design domain and workspace layout
- Governance and Compliance – define mandatory conventions
Design Scope
Resource organization decisions impact the following areas:
- Fabric domain and workspace hierarchy
- Subscription layout aligned with Capacities and domains
- Resource group strategy for Fabric artifacts
- Naming conventions tailored for Fabric constructs
- Tagging enforcement for Fabric governance
Hierarchy of Scope
Microsoft Fabric provides specific resource scoping layers to organize and govern assets effectively:
| Scope Level | Purpose |
|---|---|
| Domains | Logical grouping of workspaces and capacities representing organizational or business units |
| Workspaces | Collaborative environments hosting Fabric items and data assets |
| OneLake Items | Data assets such as Lakehouses, Warehouses, and Dataflows stored within OneLake |
| Fabric Artifacts | Specific Fabric resources like Lakehouses, Warehouses, Pipelines, and Reports |
Subscription Strategy for Fabric
Align subscriptions with Fabric Capacities, Domains, and team responsibilities. Common approaches include:
- One subscription per Fabric Domain and environment: e.g.,
Fabric-Domain1-Prod - Dedicated platform subscription: for shared services like monitoring, identity, and network
- Optional per-project subscriptions: when project-based isolation is required
Subscriptions should support Fabric-specific services such as:
- Capacities (SKU-based resource allocation)
- Workspace-scoped Fabric items
- Region-specific workloads aligned with Fabric Domains
Use subscription democratization to delegate ownership and management where appropriate.
Resource Group Design
Resource groups provide governance and lifecycle boundaries for Microsoft Fabric artifacts.
Recommendations:
- Create separate resource groups per environment and domain, e.g.,
rg-fabric-domain1-dev,rg-fabric-domain2-prod - Group Fabric artifacts by workspace or service type to align with DevOps and deployment pipelines
- Structure resource groups to support automated deployments and governance controls
Fabric resources are often deployed and managed together, for example:
rg-fabric-domain1-prod
├── Lakehouse: lakehouse-sales
├── Warehouse: warehouse-sales
├── Pipelines: pipeline-transform-sales
Naming Convention
Use consistent naming patterns to improve clarity and enforceability across Fabric resources.
Example Pattern:
{domain}-{workspace}-{resourceType}-{env}-{region}
Examples:
finance-analytics-lakehouse-prod-we
sales-marketing-warehouse-dev-ne
etl-data-pipeline-prod-we
Integrate naming validations using Azure Policy or deployment templates (e.g., Bicep, Terraform, or YAML files).
Tagging Strategy
Tags enable cost management, governance, and reporting within Fabric environments. Apply tags at resource group and resource levels.
Recommended Tags:
| Tag Key | Example |
|---|---|
domain | finance, sales |
workspaceOwner | team-data@company.com |
env | dev, test, prod |
capacitySKU | Fabric-SKU1 |
dataSensitivity | confidential, public |
Enforce mandatory tags using Azure Policy.
Multi-Region Considerations
Microsoft Fabric supports geo-location of Capacities and data residency across OneLake regions.
Recommendations:
- Use regional identifiers in resource names and tags to reflect deployment location
- Distribute Capacities and Fabric artifacts across regions for disaster recovery and compliance, e.g.,
westeurope,northeurope - Align data residency with Microsoft Fabric compliance requirements
Integration with Governance and Automation
Ensure resource structures are enforceable and reproducible using Fabric-specific tools and Azure governance:
- Use Fabric CLI and YAML deployment files for consistent provisioning of Fabric Domains, Workspaces, and artifacts
- Use Azure Policy and Fabric governance artifacts like Purview to audit naming, tagging, and data policies across OneLake
- Leverage Azure Resource Graph and Fabric monitoring tools for inventory, reporting, and compliance
Final Notes
A clear resource organization model is foundational for scalable, secure, and efficient Microsoft Fabric Landing Zones. It ensures:
- Domain and workspace isolation
- Simplified access control and governance
- Enhanced monitoring and cost allocation
- Faster onboarding of new teams or projects