You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/customer-managed-keys.md
+17-10Lines changed: 17 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ After the Customer-managed key configuration, new ingested data to workspaces li
36
36
> [!IMPORTANT]
37
37
> Customer-managed key capability is regional. Your Azure Key Vault, cluster and linked workspaces must be in the same region, but they can be in different subscriptions.
[](media/customer-managed-keys/cmk-overview.png#lightbox)
40
40
41
41
1. Key Vault
42
42
2. Log Analytics cluster resource having managed identity with permissions to Key Vault—The identity is propagated to the underlay dedicated cluster storage
@@ -73,7 +73,7 @@ Customer-managed key configuration isn't supported in Azure portal currently and
73
73
74
74
Create or use an existing Azure Key Vault in the region that the cluster is planed, and generate or import a key to be used for logs encryption. The Azure Key Vault must be configured as recoverable, to protect your key and the access to your data in Azure Monitor. You can verify this configuration under properties in your Key Vault, both *Soft delete* and *Purge protection* should be enabled.
75
75
76
-

76
+
[](media/customer-managed-keys/soft-purge-protection.png#lightbox)
77
77
78
78
These settings can be updated in Key Vault via CLI and PowerShell:
79
79
@@ -97,16 +97,23 @@ Follow the procedure illustrated in [Dedicated Clusters article](./logs-dedicate
97
97
98
98
## Grant Key Vault permissions
99
99
100
-
Create Access Policy in Key Vault to grants permissions to your cluster. These permissions are used by the underlay cluster storage. Open your Key Vault in Azure portal and click *Access Policies* then *+ Add Access Policy* to create a policy with these settings:
100
+
There are two permission models in Key Vault to grants permissions to your cluster and underlay storage, Vault access policy and Azure role-based access control.
101
101
102
-
- Key permissions—select *Get*, *Wrap Key* and *Unwrap Key*.
103
-
- Select principal—depending on the identity type used in the cluster (system or user assigned managed identity)
104
-
- System assigned managed identity - enter the cluster name or cluster principal ID
105
-
- User assigned managed identity - enter the identity name
Open your Key Vault in Azure portal and click *Access Policies*, select *Vault access policy*, then click *+ Add Access Policy* to create a policy with these settings:
108
105
109
-
The *Get* permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
106
+
- Key permissions—select *Get*, *Wrap Key* and *Unwrap Key*.
107
+
- Select principal—depending on the identity type used in the cluster (system or user assigned managed identity)
108
+
- System assigned managed identity - enter the cluster name or cluster principal ID
109
+
- User assigned managed identity - enter the identity name
110
+
111
+
[](media/customer-managed-keys/grant-key-vault-permissions-8bit.png#lightbox)
112
+
113
+
The *Get* permission is required to verify that your Key Vault is configured as recoverable to protect your key and the access to your Azure Monitor data.
114
+
115
+
2. Azure role-based access control
116
+
Open your Key Vault in Azure portal and click *Access Policies*, select *Azure role-based access control*, then enter *Access control (IAM)* and add *Key Vault Crypto Service Encryption User* role assignment.
110
117
111
118
## Update cluster with key identifier details
112
119
@@ -118,7 +125,7 @@ This step updates dedicated cluster storage with the key and version to use for
118
125
>- Key rotation can be automatic or require explicit key update, see [Key rotation](#key-rotation) to determine approach that is suitable for you before updating the key identifier details in cluster.
119
126
>- Cluster update should not include both identity and key identifier details in the same operation. If you need to update both, the update should be in two consecutive operations.
0 commit comments