Skip to content

Commit 0605e31

Browse files
author
Thomas Weiss
committed
Restore PITR + CMK clarifications
1 parent 195b007 commit 0605e31

File tree

2 files changed

+19
-3
lines changed

2 files changed

+19
-3
lines changed

articles/cosmos-db/continuous-backup-restore-introduction.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -99,14 +99,19 @@ For example, if you have 1-TB of data in two regions then:
9999

100100
* Restore cost is calculated as (1000 * 0.15) = $150 per restore
101101

102+
## Customer-managed keys
103+
104+
See [How do customer-managed keys affect continuous backups?](./how-to-setup-cmk.md#how-do-customer-managed-keys-affect-continuous-backups) to learn:
105+
106+
- How to configure your Azure Cosmos DB account when using customer-managed keys in conjunction with continuous backups.
107+
- How do customer-managed keys affect restores.
108+
102109
## Current limitations
103110

104111
Currently the point in time restore functionality has the following limitations:
105112

106113
* Only Azure Cosmos DB APIs for SQL and MongoDB are supported for continuous backup. Cassandra, Table, and Gremlin APIs are not yet supported.
107114

108-
* Accounts with customer-managed keys are not supported to use continuous backup.
109-
110115
* Multi-regions write accounts are not supported.
111116

112117
* Azure Synapse Link and periodic backup mode can coexist in the same database account. However, analytical store data isn't included in backups and restores. When Synapse Link is enabled, Azure Cosmos DB will continue to automatically take backups of your data in the transactional store at a scheduled backup interval.

articles/cosmos-db/how-to-setup-cmk.md

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure customer-managed keys for your Azure Cosmos
44
author: ThomasWeiss
55
ms.service: cosmos-db
66
ms.topic: how-to
7-
ms.date: 10/15/2021
7+
ms.date: 01/24/2022
88
ms.author: thweiss
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -404,6 +404,17 @@ The following conditions are necessary to successfully restore a periodic backup
404404
- The encryption key that you used at the time of the backup is required and must be available in Azure Key Vault. This means that no revocation was made and the version of the key that was used at the time of the backup is still enabled.
405405
- If you [used a system-assigned managed identity in the Azure Key Vault access policy](#to-use-a-system-assigned-managed-identity) of the source account, you must temporarily grant access to the Azure Cosmos DB first-party identity in that access policy as described [here](#add-access-policy) before restoring your data. Once the data is fully restored to the target account, you can remove the first-party identity from the Key Vault access policy and set your desired identity configuration.
406406
407+
### How do customer-managed keys affect continuous backups?
408+
409+
Azure Cosmos DB gives you the option to configure [continuous backups](./continuous-backup-restore-introduction.md) on your account. With continuous backups, you can restore your data to any point in time within the past 30 days. To use continuous backups on an account where customer-managed keys are enabled, you must [use a user-assigned managed identity](#to-use-a-user-assigned-managed-identity) in the Key Vault access policy; the Azure Cosmos DB first-party identity or a system-assigned managed identity aren't currently supported on accounts using continuous backups.
410+
411+
The following conditions are necessary to successfully perform a point-in-time restore:
412+
- The encryption key that you used at the time of the backup is required and must be available in Azure Key Vault. This means that no revocation was made and the version of the key that was used at the time of the backup is still enabled.
413+
- You must ensure that the user-assigned managed identity originally used on the source account is still declared in the Key Vault access policy.
414+
415+
> [!IMPORTANT]
416+
> If you revoke the encryption key before deleting your account, your account's backup may miss the data written after the revocation has been made.
417+
407418
### How do I revoke an encryption key?
408419
409420
Key revocation is done by disabling the latest version of the key:

0 commit comments

Comments
 (0)