Skip to content

Commit 3295af7

Browse files
committed
quick edit
1 parent 1baab3e commit 3295af7

File tree

1 file changed

+24
-9
lines changed

1 file changed

+24
-9
lines changed

articles/reliability/reliability-key-vault.md

Lines changed: 24 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Reliability in Azure Key Vault
3-
description: Find out about reliability in Azure Key Vault, including availability zones and multi-region deployments.
3+
description: Find out about reliability in Azure Key Vault, including availability zones and multiregion deployments.
44
author: msmbaldwin
55
ms.author: mbaldwin
66
ms.topic: reliability-article
@@ -12,7 +12,7 @@ ms.date: 06/20/2025
1212

1313
# Reliability in Azure Key Vault
1414

15-
This article describes reliability support in Azure Key Vault, covering intra-regional resiliency via [availability zones](#availability-zone-support) and [multi-region deployments](#multi-region-support).
15+
This article describes reliability support in Azure Key Vault, covering intra-regional resiliency via [availability zones](#availability-zone-support) and [multiregion deployments](#multiregion-support).
1616

1717
[!INCLUDE [Shared responsibility description](includes/reliability-shared-responsibility-include.md)]
1818

@@ -23,7 +23,9 @@ Azure Key Vault is a cloud service that provides a secure store for secrets, suc
2323
For production deployments of Azure Key Vault, we recommend that you:
2424

2525
- Use Standard or Premium tier key vaults
26+
2627
- Enable soft delete and purge protection to prevent accidental or malicious deletion
28+
2729
- For critical workloads, consider implementing multi-region strategies as described in this guide
2830

2931
## Reliability architecture overview
@@ -45,16 +47,23 @@ In addition, if the region has a [paired region](./regions-list.md) and that pai
4547
To handle any transient failures that might occur, your client applications should implement retry logic when interacting with Key Vault. Some best practices include:
4648

4749
- Use the [Azure SDKs](https://azure.microsoft.com/downloads/), which typically include built-in retry mechanisms.
50+
4851
- If your clients connect directly to Key Vault, implement exponential backoff retry policies.
52+
4953
- Cache secrets in memory when possible to reduce direct requests to Key Vault.
54+
5055
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling.
5156

5257
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits. Azure Key Vault has specific guidance for these scenarios:
5358

5459
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys).
60+
5561
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions.
62+
5663
- A subscription-wide limit for all transaction types is five times the individual key vault limit.
64+
5765
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults).
66+
5867
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material.
5968

6069
For comprehensive throttling guidance, see [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
@@ -65,7 +74,6 @@ For comprehensive throttling guidance, see [Azure Key Vault throttling guidance]
6574

6675
Azure Key Vault automatically provides zone redundancy in [regions that support availability zones](./regions-list.md), providing high availability within a region without requiring any specific configuration.
6776

68-
6977
When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability.
7078

7179
### Region support
@@ -104,14 +112,13 @@ The following section describes what to expect when key vaults are in a region w
104112

105113
- **Traffic rerouting:** Key Vault automatically reroutes traffic away from the affected zone to healthy zones without requiring any customer intervention.
106114

107-
108115
For more information on the zone-down experience, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
109116

110117
### Failback
111118

112119
When the affected availability zone recovers, Azure Key Vault automatically restores operations to that zone. This process is fully managed by the Azure platform and doesn't require any customer intervention.
113120

114-
## Multi-region support
121+
## Multiregion support
115122

116123
Azure Key Vault resources are deployed into a single Azure region. If the region becomes unavailable, your key vault is also unavailable. However, there are approaches that you can use to help ensure resilience to region outages. These approaches depend on whether the key vault is in a paired or nonpaired region and on your specific requirements and configuration.
117124

@@ -128,7 +135,7 @@ The following regions don't support Microsoft-managed replication or failover ac
128135
> [!IMPORTANT]
129136
> Microsoft triggers Microsoft-managed failover. It's likely to occur after a significant delay and is done on a best-effort basis. There are also some exceptions to this process. The failover of key vaults might occur at a time that's different from the failover time of other Azure services.
130137
>
131-
> If you need to be resilient to region outages, consider using one of the [alternative multi-region approaches](#alternative-multi-region-approaches).
138+
> If you need to be resilient to region outages, consider using one of the [alternative multiregion approaches](#alternative-multiregion-approaches).
132139
133140
For detailed information about how Key Vault replicates data across regions, see [Data replication](/azure/key-vault/general/disaster-recovery-guidance#data-replication) in the Key Vault availability and redundancy guide.
134141

@@ -138,7 +145,7 @@ While the failover is in progress, your key vault might be unavailable for a few
138145

139146
#### Cost
140147

141-
There are no additional costs for the built-in multi-region replication capabilities of Azure Key Vault.
148+
There are no additional costs for the built-in multiregion replication capabilities of Azure Key Vault.
142149

143150
#### Normal operations
144151

@@ -166,19 +173,24 @@ The following section describes what to expect when a key vault is located in a
166173

167174
For a complete description of the failover process and behavior, see [Failover across regions](/azure/key-vault/general/disaster-recovery-guidance#failover-across-regions) in the Key Vault availability and redundancy guide.
168175

169-
### Alternative multi-region approaches
176+
### Alternative multiregion approaches
170177

171178
There are situations where the Microsoft-managed cross-region failover capabilities of Azure Key Vault aren't suitable, such as:
172179

173180
- Your key vault is in a nonpaired region.
181+
174182
- Your key vault is in a paired region that doesn't support Microsoft-managed cross-region replication and failover (Brazil South, Brazil Southeast, West US 3).
183+
175184
- Your business uptime goals aren't satisfied by the recovery time or data loss that Microsoft-managed cross-region failover provides.
185+
176186
- You need to fail over to a region that isn't your primary region's pair.
177187

178188
You can design a custom cross-region failover solution. One approach is to:
179189

180190
1. Create separate key vaults in different regions.
191+
181192
1. Use the backup and restore functionality to maintain consistent secrets across regions.
193+
182194
1. Implement application-level logic to fail over between key vaults.
183195

184196
## Backups
@@ -188,8 +200,11 @@ Azure Key Vault provides the ability to back up and restore individual secrets,
188200
Key points about the backup functionality:
189201

190202
- Backups create encrypted blobs that can't be decrypted outside of Azure.
203+
191204
- Backups can only be restored to a key vault within the same Azure subscription and Azure geography.
205+
192206
- There's a limitation of backing up no more than 500 past versions of a key, secret, or certificate object.
207+
193208
- Backups are point-in-time snapshots and don't automatically update when secrets change.
194209

195210
For most solutions, you shouldn't rely exclusively on backups. Instead, use the other capabilities described in this guide to support your resiliency requirements. However, backups protect against some risks that other approaches don't, such as accidental deletion of specific secrets.
@@ -204,7 +219,7 @@ Azure Key Vault provides two key recovery features to prevent accidental or mali
204219

205220
- **Purge protection:** When enabled, purge protection prevents permanent deletion of your key vault and its objects until the retention period elapses. This prevents malicious actors from permanently destroying your secrets.
206221

207-
Both features are strongly recommended for production environments. For a detailed explanation of these features, see [What are soft-delete and purge protection](/azure/key-vault/general/key-vault-recovery#what-are-soft-delete-and-purge-protection) in the Key Vault recovery management documentation.
222+
We strongly recommend both features for production environments. For more information about these features, see [What are soft-delete and purge protection](/azure/key-vault/general/key-vault-recovery#what-are-soft-delete-and-purge-protection) in the Key Vault recovery management documentation.
208223

209224
## Service-level agreement
210225

0 commit comments

Comments
 (0)