Skip to content

Commit 3ef69ad

Browse files
committed
CLI documentation for Data encryption
1 parent c6dcb2e commit 3ef69ad

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

articles/mysql/howto-data-encryption-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Learn how to use the Azure CLI to set up and manage data encryption for your Azu
1515
## Prerequisites for Azure CLI
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
18-
* In Azure Key Vault, create a key vault and a key to use for a customer-managed key. Also enable purge protection and soft delete enabled on the key vault.
18+
* In Azure Key Vault, create a key vault and a key to use for a customer-managed key. Also enable purge protection and soft delete on the key vault.
1919

2020
```azurecli-interactive
2121
az keyvault create -g <resource_group> -n <vault_name> --enable-soft-delete true --enable-purge-protection true
@@ -69,15 +69,15 @@ Learn how to use the Azure CLI to set up and manage data encryption for your Azu
6969
7070
## Set data encryption for Azure Database for MySQL
7171
72-
1. Enabling Data encryption for the Azure Database for MySQL using the key created in the Azure Key Vault and the Key created.
72+
1. Enable Data encryption for the Azure Database for MySQL using the key created in the Azure Key Vault.
7373
7474
```azurecli-interactive
7575
az mysql server key create –name <server name> -g <resource_group> --kid <key url>
7676
```
7777
7878
Key url: https://YourVaultName.vault.azure.net/keys/YourKeyName/01234567890123456789012345678901>
7979
80-
## Restore or replica of the server
80+
## Using Data encryption for restore or replica servers
8181
8282
After Azure Database for MySQL is encrypted with a customer's managed key stored in Key Vault, any newly created copy of the server is also encrypted. You can make this new copy either through a local or geo-restore operation, or through a replica (local/cross-region) operation. So for an encrypted MySQL server, you can use the following steps to create an encrypted restored server.
8383
@@ -128,7 +128,7 @@ This Azure Resource Manager template creates an Azure Database for MySQL server
128128
### For an existing server
129129
Additionally, you can use Azure Resource Manager templates to enable data encryption on your existing Azure Database for MySQL servers.
130130
131-
* Pass the URI of the Azure Key Vault key that you copied earlier under the `keyVaultKeyUri` property in the properties object.
131+
* Pass the Resource ID of the Azure Key Vault key that you copied earlier under the `Uri` property in the properties object.
132132
133133
* Use *2020-01-01-preview* as the API version.
134134

articles/postgresql/howto-data-encryption-cli.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Learn how to use the Azure CLI to set up and manage data encryption for your Azu
1515
## Prerequisites for Azure CLI
1616

1717
* You must have an Azure subscription and be an administrator on that subscription.
18-
* In Azure Key Vault, create a key vault and a key to use for a customer-managed key. Also enable purge protection and soft delete enabled on the key vault.
18+
* In Azure Key Vault, create a key vault and a key to use for a customer-managed key. Also enable purge protection and soft delete on the key vault.
1919

2020
```azurecli-interactive
2121
az keyvault create -g <resource_group> -n <vault_name> --enable-soft-delete true --enable-purge-protection true
@@ -69,15 +69,15 @@ Learn how to use the Azure CLI to set up and manage data encryption for your Azu
6969
7070
## Set data encryption for Azure Database for PostgreSQL Single server
7171
72-
1. Enabling Data encryption for the Azure Database for PostgreSQL Single server using the key created in the Azure Key Vault and the Key created.
72+
1. Enable Data encryption for the Azure Database for PostgreSQL Single server using the key created in the Azure Key Vault.
7373
7474
```azurecli-interactive
7575
az postgres server key create –name <server name> -g <resource_group> --kid <key url>
7676
```
7777
7878
Key url: https://YourVaultName.vault.azure.net/keys/YourKeyName/01234567890123456789012345678901>
7979
80-
## Restore or replica of the server
80+
## Using Data encryption for restore or replica servers
8181
8282
After Azure Database for PostgreSQL Single server is encrypted with a customer's managed key stored in Key Vault, any newly created copy of the server is also encrypted. You can make this new copy either through a local or geo-restore operation, or through a replica (local/cross-region) operation. So for an encrypted PostgreSQL Single server server, you can use the following steps to create an encrypted restored server.
8383
@@ -127,7 +127,7 @@ This Azure Resource Manager template creates an Azure Database for PostgreSQL Si
127127
### For an existing server
128128
Additionally, you can use Azure Resource Manager templates to enable data encryption on your existing Azure Database for PostgreSQL Single servers.
129129
130-
* Pass the URI of the Azure Key Vault key that you copied earlier under the `keyVaultKeyUri` property in the properties object.
130+
* Pass the Resource ID of the Azure Key Vault key that you copied earlier under the `Uri` property in the properties object.
131131
132132
* Use *2020-01-01-preview* as the API version.
133133

0 commit comments

Comments
 (0)