Skip to main content

Organize Microsoft Fabric Artefacts

Organizing your Microsoft Fabric artefacts—including Lakehouses, Warehouses, Notebooks, Pipelines, Dataflows, Reports, Dashboards, and Workspaces—is essential for maintaining control, scalability, and governance across your Fabric environment. As Fabric projects scale, a consistent and well-documented artefact structure supports efficient collaboration, robust security, and optimized cost tracking.

Define workspace structure and ownership

Use Fabric Workspaces to separate projects, environments (Dev/Test/Prod), business domains, or cost centers. Establish clear ownership for each workspace by assigning responsible individuals or teams, and apply role-based access control (RBAC) using Entra ID groups to govern access. Consider using a naming convention such as fab-{domain}-{environment}-{purpose}. For a strategic introduction to domain-oriented design and decentralized ownership, see Data Mesh Introduction.

Example:

  • fab-sales-prod-reports
  • fab-hr-dev-onboarding

Naming conventions for artefacts

Fabric artefact names are immutable and should follow a clear and scalable naming pattern. Include context such as the domain, purpose, and environment where relevant. Examples:

  • Lakehouse: lh-sales-transactions-prod
  • Warehouse: wh-hr-analytics-dev
  • Pipeline: pl-dataimport-crm-weekly
  • Notebook: nb-clean-orders-daily For background on naming in decentralized data product architectures, refer to the Data Mesh Introduction.

Standardized abbreviations for Fabric artefacts

To keep names concise and consistent, use the following standard abbreviations for common Microsoft Fabric artefacts:

Artefact TypeAbbreviationExample
Lakehouselhlh-finance-ledger-prod
Warehousewhwh-sales-insights-dev
Notebooknbnb-clean-customer-data
Pipelineplpl-load-orders-weekly
Dataflowdfdf-hr-payroll-import
Reportrprp-kpi-overview-prod
Dashboarddbdb-executive-summary
KQL Querysetkqlkql-security-events
Semantic Modelsmsm-marketing-campaigns
Eventstreameses-metering-ingest
Eventhouseeheh-energy-archive
KQL Tablektkt-logins-raw
KQL Databasekdkd-network-logs
KQL Functionkfkf-parse-http-status
Data Activator Ruledrdr-alert-high-load
Data Activator Groupdgdg-fraud-detection

These abbreviations cover all artefact types available in Microsoft Fabric, including Real-Time Intelligence components, and should be used consistently for clarity and automation support.

Apply tagging for governance and automation

Tags help classify artefacts by owner, cost center, project, sensitivity, and lifecycle stage. Although native tagging is not yet consistently available across all Fabric artefacts, maintain a tagging strategy through workspace metadata and naming conventions. Suggested tag dimensions:

  • owner: data.team@contoso.com
  • env: dev | test | prod
  • project: sales-insights
  • compliance: pii | none
  • costcenter: 1234

Tagging practices are aligned with principles discussed in the Data Mesh Introduction.

Tags can be maintained in different ways depending on the artefact type:

  • Workspaces: Use descriptions and naming standards. No native tagging yet.

  • Lakehouses/Warehouses: Tag through metadata tables or naming patterns.

  • Notebooks: Use structured comments at the top of the file, e.g.:

    # owner: data.team@contoso.com
    # env: dev
    # project: customer-segmentation
    # compliance: pii
    # costcenter: 1234
  • Pipelines: Use naming conventions and internal documentation fields.

  • Reports/Dashboards: Use workspace metadata or embedded notes/pages to indicate ownership and purpose.

Group artefacts by lifecycle

Align artefacts within a workspace based on their lifecycle. For example, associate pipelines, notebooks, and dataflows that build a Lakehouse within the same workspace. Use Git integration (via deployment pipelines) to version and promote artefacts between environments.

  • Use Dev/Test/Prod workspaces for lifecycle progression.
  • Define deployment boundaries in Git repos for each domain or project.
  • Automate promotions with deployment pipelines in Fabric or Azure DevOps.

Structure for cost visibility and access control

Assign capacities strategically across workspaces to track and manage costs. Use Premium/F64+ capacities for production workloads, and Trial or Pro capacities for experimentation. Consider the impact of noisy neighbor workloads in shared capacities and isolate critical workloads where needed.

Monitor workspace usage and artefact execution using Fabric monitoring features and integrate logs with Azure Monitor for advanced telemetry.

Contributors