Skip to content

Commit 41440ea

Browse files
committed
fix build errors
1 parent 515596d commit 41440ea

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ with your Key Vault key. The underlay ADX cluster storage uses the
7171
managed identity that\'s associated with the *Cluster* resource to
7272
authenticate and access your Azure Key Vault via Azure Active Directory.
7373

74-
![CMK Overview](media\customer-managed-keys\cmk-overview-8bit.png)
74+
![CMK Overview](media/customer-managed-keys/cmk-overview-8bit.png)
7575

7676
## Encryption keys management
7777

@@ -153,7 +153,7 @@ Create an Azure Key Vault resource, then generate or import a key to be used for
153153
The Azure Key Vault must be configured as recoverable to protect your key and the access to your Azure Monitor data.
154154

155155
To [Turn on recovery options](https://docs.microsoft.com/azure/key-vault/key-vault-best-practices#turn-on-recovery-options):
156-
- [Soft Delete](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-soft-delete)
156+
- [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
157157
must be turned on
158158
- Purge protection should be turned on to guard against force deletion of the secret / vault even after soft delete
159159

@@ -217,7 +217,7 @@ Update your Key Vault and add access policy with 'Get', 'Wrap Key' and
217217
resource name. These permissions will be propagated to the underlaying
218218
Azure Monitor Storage.
219219

220-
![grant Key Vault permissions](media\customer-managed-keys\grant-key-vault-permissions-8bit.png)
220+
![grant Key Vault permissions](media/customer-managed-keys/grant-key-vault-permissions-8bit.png)
221221

222222
The *Get* permission is required to verify that your Key Vault is
223223
configured as recoverable to protect your key and the access to your
@@ -235,7 +235,7 @@ resource with Azure Key Vault Key identifier details, to allow Azure
235235
Monitor Storage to use the new version. To get the Key Identifier,
236236
select the current version of your key in Azure Key Vault:
237237

238-
![Grant Key Vault permissions](media\customer-managed-keys\key-identifier-8bit.png)
238+
![Grant Key Vault permissions](media/customer-managed-keys/key-identifier-8bit.png)
239239

240240
Update the *Cluster* resource KeyVaultProperties with Key Identifier
241241
details.
@@ -453,7 +453,7 @@ Limitations and constraints
453453
- The Azure Key Vault must be configured as recoverable. These
454454
properties aren't enabled by default:
455455

456-
- [Soft Delete](https://docs.microsoft.com/en-us/azure/key-vault/key-vault-ovw-soft-delete)
456+
- [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
457457
is turned on
458458
- 'Do Not Purge' is turned on to guard against force deletion of
459459
the secret / vault even after soft delete
@@ -629,7 +629,7 @@ Identity is assigned to the Cluster at creation time.
629629
"type": "Microsoft.OperationalInsights/clusters",
630630
"location": "region-name"
631631
}
632-
````
632+
```
633633
634634
### Associate a component to a Cluster resource
635635

0 commit comments

Comments
 (0)