You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/customer-managed-keys.md
+3-8Lines changed: 3 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -437,10 +437,6 @@ If you update your key in Key Vault and don't update the new *Key identifier* de
437
437
configuration, remained encrypted with Microsoft key. You can query
438
438
data before and after the configuration seamlessly.
439
439
440
-
- CMK capability is regional -- your Azure Key Vault, *Cluster*
441
-
resource and associated workspaces must be in the same region but
442
-
can be in different subscriptions.
443
-
444
440
- Once workspace is associated to a *Cluster* resource, it cannot be
445
441
de-associated from the *Cluster* resource, since data is encrypted
446
442
with your key and isn't accessible without your KEK in Azure Key
@@ -458,10 +454,9 @@ If you update your key in Key Vault and don't update the new *Key identifier* de
458
454
-*Cluster* resource move to another resource group or subscription
459
455
isn't supported currently.
460
456
461
-
- Workspace association to *Cluster* resource will fail if the
462
-
*Cluster* resource is in a different tenant.
457
+
- Your Azure Key Vault, *Cluster* resource and associated workspaces must be in the same region and in the same Azure Active Directory (Azure AD) tenant, but they can be in different subscriptions.
463
458
464
-
-Workspace association to *Cluster* resource will fail if it is
459
+
- Workspace association to *Cluster* resource will fail if it is
0 commit comments