You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/customer-managed-keys.md
+29-34Lines changed: 29 additions & 34 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,34 +14,32 @@ This article provides background information and steps to configure customer-Man
14
14
15
15
We recommend you review [Limitations and constraints](#limitations-and-constraints) below before configuration.
16
16
17
-
## Customer-managed key (CMK) overview
17
+
## Disclaimers
18
18
19
-
The CMK capability is delivered on dedicated Log Analytics clusters. To verify that we have the required capacity in your region, we require that your subscription is whitelisted beforehand. Use your Microsoft contact to get your subscription whitelisted before you start configuring CMK.
19
+
The CMK capability is delivered on dedicated Log Analytics clusters. The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#log-analytics-dedicated-clusters) uses Capacity Reservations starting at a 1000 GB/day level.
20
20
21
-
The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#log-analytics-dedicated-clusters) uses Capacity Reservations starting at a 1000 GB/day level.
21
+
## Customer-managed key (CMK) overview
22
22
23
-
[Encryption at Rest](https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest) is a common privacy and security requirement in organizations. You can let Azure completely manage Encryption at Rest, while you have various options to closely manage encryption or encryption keys.
23
+
Encryption at Rest(https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest) is a common privacy and security requirement in organizations. You can let Azure completely manage Encryption at Rest, while you have various options to closely manage encryption or encryption keys.
24
24
25
25
Azure Monitor ensures that all data is encrypted at rest using Azure-managed keys. Azure Monitor also provides an option for data encryption using your own key that is stored in your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-overview) and accessed by Storage using system-assigned [managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) authentication. This key can be either [software or hardware-HSM protected](https://docs.microsoft.com/azure/key-vault/key-vault-overview).
26
26
27
-
When using CMK, you can control the access to your data and revoke it at any time. Azure Monitor Storage always respects changes in key permissions within an hour. Data ingested in the last 14 days is also kept in hot-cache (SSD-backed) for efficient query engine operation. This data remains encrypted with Microsoft keys regardless CMK configuration, but your control over SSD data adheres to [key revocation](#cmk-kek-revocation). We are working to have SSD data encrypted with CMK in the second half of 2020.
28
-
29
27
Azure Monitor use of encryption is identical to the way [Azure Storage encryption](https://docs.microsoft.com/azure/storage/common/storage-service-encryption#about-azure-storage-encryption) operates.
30
28
29
+
Data ingested in the last 14 days is also kept in hot-cache (SSD-backed) for efficient query engine operation. This data remains encrypted with Microsoft keys regardless CMK configuration, but your control over SSD data adheres to [key revocation](#cmk-kek-revocation). We are working to have SSD data encrypted with CMK in the second half of 2020.
30
+
31
+
The frequency that Azure Monitor Storage accesses Key Vault for wrap and unwrap operations is between 6 to 60 seconds. Azure Monitor Storage always respects changes in key permissions within an hour.
32
+
31
33
## How CMK works in Azure Monitor
32
34
33
35
Azure Monitor leverages system-assigned managed identity to grant access
34
-
to your Azure Key Vault.System-assigned managed identity can only be
35
-
associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level. This
36
+
to your Azure Key Vault.System-assigned managed identity can only be
37
+
associated with a single Azure resource. The identity of the Log Analytics cluster is supported at the cluster level and this
36
38
dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics
37
39
*Cluster* resource performs as an intermediate identity connection
38
-
between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the
40
+
between your Key Vault and your Log Analytics workspaces, which maintains the identity between the Log Analytics cluster and your Key Vault. The Log Analytics cluster storage uses the
39
41
managed identity that\'s associated with the *Cluster* resource to
40
-
authenticate to your Azure Key Vault via Azure Active Directory.
41
-
42
-
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault.
43
-
44
-
You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
42
+
authenticate and access your Azure Key Vault via Azure Active Directory.
1. Subscription whitelisting -- To assure that we have the required capacity in your region to provision a Log Analytics cluster, we need to verify and whitelist your subscription beforehand
79
77
2. Creating Azure Key Vault and storing key
80
78
3. Creating a *Cluster* resource
81
-
4. Granting permissions to your Key Vault
82
-
5. Associating Log Analytics workspaces
79
+
5. Granting permissions to your Key Vault
80
+
6. Associating Log Analytics workspaces
83
81
84
82
The procedure is not supported in the UI currently and the provisioning process is performed via REST API.
85
83
@@ -283,7 +281,7 @@ details.
283
281
284
282
This Resource Manager request is asynchronous operation when updating Key identifier details, while it is synchronous when updating Capacity value.
285
283
286
-
> [!NOTE]
284
+
> [!Note]
287
285
> You can provide partial body in *Cluster* resource to update a *sku*, *keyVaultProperties* or *billingType*.
@@ -402,7 +400,7 @@ GET https://management.azure.com/subscriptions/<subscription-id>/resourcegroups/
402
400
"name": "pricing-tier-name",
403
401
"lastSkuUpdate": "Tue, 28 Jan 2020 12:26:30 GMT"
404
402
},
405
-
"retentionInDays": 31,
403
+
"retentionInDays": days,
406
404
"features": {
407
405
"legacy": 0,
408
406
"searchVersion": 1,
@@ -442,7 +440,7 @@ All your data remains accessible after the key rotation operation including data
442
440
443
441
- The max number of *Cluster* resources per region and subscription is 2
444
442
445
-
- You can associate a workspace to your *Cluster* resource and then disassociate it if CMK isn't required for the workspace. The number of workspace association on particular workspace in a period of 30 days is limited to 2
443
+
- You can associate a workspace to your *Cluster* resource and then disassociate it when CMK for its data is no longer needed or any other reason. The number of workspace association that you can perform on a workspace in a period of 30 days is limited to 2
446
444
447
445
- Workspace association to *Cluster* resource should be carried ONLY after you have verified that the Log Analytics cluster provisioning was completed. Data sent to your workspace prior to the completion will be dropped and won't be recoverable.
448
446
@@ -466,7 +464,7 @@ All your data remains accessible after the key rotation operation including data
466
464
associated to another *Cluster* resource
467
465
468
466
469
-
## CMK Management
467
+
## Management
470
468
471
469
-**Get all *Cluster* resources for a resource group**
472
470
@@ -493,9 +491,9 @@ All your data remains accessible after the key rotation operation including data
@@ -595,9 +592,7 @@ All your data remains accessible after the key rotation operation including data
595
592
596
593
- Transient connection errors -- Storage handles transient errors (timeouts, connection failures, DNS issues) by allowing keys to stay in cache for a short while longer and this overcomes any small blips in availability. The query and ingestion capabilities continue without interruption.
597
594
598
-
- Live site -- Unavailability of about 30 minutes will cause the Storage account to become unavailable. The query capability is unavailable and ingested data is cached for several hours using Microsoft key to avoid data loss. When access to Key Vault is restored, query becomes available and the temporary cached data is ingested to the data-store and encrypted with CMK.
599
-
600
-
- Key Vault access rate -- The frequency that Azure Monitor Storage accesses Key Vault for wrap and unwrap operations is between 6 to 60 seconds.
595
+
- Live site -- unavailability of about 30 minutes will cause the Storage account to become unavailable. The query capability is unavailable and ingested data is cached for several hours using Microsoft key to avoid data loss. When access to Key Vault is restored, query becomes available and the temporary cached data is ingested to the data-store and encrypted with CMK.
601
596
602
597
- If you create a *Cluster* resource and specify the KeyVaultProperties immediately, the operation may fail since the
603
598
access policy can't be defined until system identity is assigned to the *Cluster* resource.
@@ -614,5 +609,5 @@ All your data remains accessible after the key rotation operation including data
614
609
615
610
- If you update your key version in Key Vault and don't update the new key identifier details in the *Cluster* resource, the Log Analytics cluster will keep using your previous key and your data will become inaccessible. Update new key identifier details in the *Cluster* resource to resume data ingestion and ability to query data.
616
611
617
-
- For questions and support related to CMK, use your Microsoft account.
612
+
- For support and help related to customer managed key, use your contacts into Microsoft.
0 commit comments