Before the Capacity Fire Starts: Why FUAM Belongs in Every FSS Fabric Baseline

Most Fabric monitoring conversations begin too late.

They begin when a workspace is already noisy, when refreshes are already failing, or when capacity pressure has already become visible enough to trigger concern. By that point, the real problem is usually larger than utilization. It is a visibility problem. Teams do not have a durable, tenant-level view of what exists, what changed, what is connected to source control, what is actively used, and where governance has started to drift. That is the gap FUAM was designed to close. The distinction worth making is not between a “simple” and a “serious” version of monitoring, but between an original governance-first package and the newer Fabric Toolbox implementation that extends that foundation with Capacity Metrics and deeper operational analysis.

That distinction matters for FSS environments because it changes the order of operations. The older GT-Analytics package, labeled FUAM Basic, focused on the data that can be gathered without reading Capacity Metrics. The current Fabric Toolbox implementation keeps the same broad monitoring vision, but adds Capacity Metrics as part of a larger platform-admin monitoring solution. If the question is what should be present by default in an FSS Fabric setup, the answer starts with the governance-and-inventory layer and then grows into the richer Capacity Metrics-enabled implementation as operational maturity increases.

The monitoring gap hiding in plain sight

Microsoft already provides several useful monitoring surfaces in Fabric. The monitoring hub gives teams a centralized view of active and recent jobs, but its main Activities page shows only up to 100 activities from the past 30 days, and its keyword search applies only to loaded data. Workspace monitoring creates a read-only Eventhouse database at the workspace level for logs and metrics. The admin monitoring workspace provides tenant-level reports, but the workspace and its semantic models are read-only, and those semantic models refresh once per day. The Capacity Metrics app is the deepest native view into capacity performance and consumption. Each of these tools is valuable. None of them, on its own, becomes a tenant-owned monitoring backbone.

That is why FUAM matters. It is not compelling because Microsoft lacks monitoring. It is compelling because Microsoft’s monitoring surfaces are purpose-built and distributed. What platform teams still need is a way to bring governance, activity, inventory, refresh, and capacity-adjacent signals into one model they can persist, extend, and use as shared operating context. That is the role FUAM fills.

What the original package actually brought to the table

The original GT-Analytics package is explicit about its scope. It extracts tenant settings, delegated tenant settings, activities, workspaces, capacities, Scanner API metadata, capacity refreshables, and Git connections. It is built on Fabric-native components such as pipelines, notebooks, lakehouses, semantic models, and Power BI reports, with a modular architecture designed to support both maintenance and extension. The data is transformed and persisted so it can be analyzed through a semantic model in Direct Lake mode.

That is more significant than the word basic suggests. In an FSS environment, those are the signals that make the platform legible. They tell you how the tenant is configured, how workspaces are spreading, where refreshable assets are accumulating, whether Git discipline is present, and what administrative changes have taken place. In other words, this is not a trimmed-down observability story. It is the governance baseline. It gives a platform team something many Fabric environments lack at the beginning: a durable system of record for how the estate is actually being run.

What the current FUAM implementation adds

The current Fabric Toolbox implementation takes that baseline and expands it. The main FUAM documentation is a holistic Fabric monitoring solution built entirely with Fabric capabilities, storing data in raw and Delta Parquet forms so it can be queried through Direct Lake or the Lakehouse SQL endpoint. The solution now includes Capacity Metrics alongside activities, active items, inventory, capacity refreshables, and other modules.

That broader implementation also changes the kind of questions FUAM can answer. The current core report includes Git connections, domains and sub-domains, external application activity, operations, failed and cancelled operations, average item CU over 14- and 30-day windows, tenant setting changes, capacities, and regions. That means FUAM is no longer only about understanding what exists and what changed. It also becomes a practical surface for understanding how the tenant is being consumed, where pressure is emerging, and how governance and utilization intersect.

There is, however, an important caveat, and it reinforces the sequencing argument rather than weakening it. FUAM is a solution accelerator rather than an official Microsoft product, and Capacity Metrics extraction can break because it depends on the Capacity Metrics app. The authorization documentation adds that the Capacity Metrics notebooks currently rely on the notebook owner’s identity; a full service-principal-only implementation for that path is not yet available. That makes the Capacity Metrics-enabled implementation powerful, but also a little more operationally delicate than the original governance-focused package.

Why FUAM should be a default part of any FSS Fabric setup

The strongest case for making FUAM part of the default FSS blueprint is that self-service environments fail governance before they fail engineering. Long before a team asks for detailed CU analysis, it usually needs clear answers to simpler questions. What changed in tenant settings? Which workspaces are active? What is connected to Git? Which assets are refreshing? Which areas of the tenant are growing without corresponding stewardship? The original package answers those questions directly, and it does so in a Fabric-native, extensible architecture rather than through a loose collection of screenshots, exports, and one-off admin checks.

That is why the governance layer should be the baseline. Then, once the environment is ready for stronger operational questions around compute pressure, failed operations, item-level CU patterns, or capacity trends, the current Fabric Toolbox implementation of FUAM extends that same foundation rather than replacing it. The Capacity Metrics app remains the platform’s deepest native source for capacity performance, but FUAM adds the broader tenant context that capacity analysis often needs in practice.

Calling FUAM a default part of the setup does not mean deploying it casually. It means treating it as shared platform infrastructure. The current docs make clear that it is a solution accelerator, not a Microsoft-managed service, and that matters. But in a serious FSS environment, that is an argument for ownership and design discipline, not for leaving the monitoring baseline to chance. The right pattern is straightforward: start with the governance-and-inventory layer, then add the Capacity Metrics-enabled FUAM implementation where platform operations, FinOps, and performance engineering require it.

Conclusion

The most useful way to think about FUAM is not as a single dashboard, and not as a synonym for capacity reporting.

It is a monitoring model that starts by making the tenant understandable. The original package gave teams a way to unify settings, activities, workspaces, metadata, refreshables, and Git signals into one Fabric-native operating layer. The current Fabric Toolbox implementation builds on that and adds Capacity Metrics and broader operational analysis. For an FSS Fabric setup, that sequence matters. Governance should be standard. Capacity depth should be additive. And FUAM, properly understood, is the bridge between the two.

Unknown's avatar

Author: Jason Miles

A solution-focused developer, engineer, and data specialist focusing on diverse industries. He has led data products and citizen data initiatives for almost twenty years and is an expert in enabling organizations to turn data into insight, and then into action. He holds MS in Analytics from Texas A&M, DAMA CDMP Master, and INFORMS CAP-Expert credentials.

Leave a Reply

Discover more from EduDataSci - Educating the world about data and leadership

Subscribe now to keep reading and get access to the full archive.

Continue reading