Skip to content

Commit 48db300

Browse files
authored
Merge pull request #115526 from yossi-y/patch-1
edited disclaimer
2 parents 6aa73a6 + b10a6e5 commit 48db300

File tree

1 file changed

+5
-3
lines changed

1 file changed

+5
-3
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ We recommend you review [Limitations and constraints](#limitations-and-constrain
1616

1717
## Disclaimers
1818

19-
The CMK capability is delivered on dedicated Log Analytics clusters. The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#log-analytics-dedicated-clusters) uses Capacity Reservations starting at a 1000 GB/day level.
19+
The CMK capability is delivered on dedicated Log Analytics clusters. To verify that we have the required capacity in your region, we require that your subscription is whitelisted beforehand. Use your Microsoft contact to get your subscription whitelisted.
2020

2121
## Customer-managed key (CMK) overview
2222

@@ -26,6 +26,8 @@ Azure Monitor ensures that all data is encrypted at rest using Azure-managed key
2626

2727
Azure Monitor use of encryption is identical to the way [Azure Storage encryption](https://docs.microsoft.com/azure/storage/common/storage-service-encryption#about-azure-storage-encryption) operates.
2828

29+
The CMK capability is delivered on dedicated Log Analytics clusters. The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#log-analytics-dedicated-clusters) uses Capacity Reservations starting at a 1000 GB/day level.
30+
2931
Data ingested in the last 14 days is also kept in hot-cache (SSD-backed) for efficient query engine operation. This data remains encrypted with Microsoft keys regardless CMK configuration, but your control over SSD data adheres to [key revocation](#cmk-kek-revocation). We are working to have SSD data encrypted with CMK in the second half of 2020.
3032

3133
The frequency that Azure Monitor Storage accesses Key Vault for wrap and unwrap operations is between 6 to 60 seconds. Azure Monitor Storage always respects changes in key permissions within an hour.
@@ -73,7 +75,7 @@ The following rules apply:
7375

7476
## CMK provisioning procedure
7577

76-
1. Subscription whitelisting -- To assure that we have the required capacity in your region to provision a Log Analytics cluster, we need to verify and whitelist your subscription beforehand
78+
1. Subscription whitelisting -- The CMK capability is delivered on dedicated Log Analytics clusters. To verify that we have the required capacity in your region, we require that your subscription is whitelisted beforehand. Use your Microsoft contact to get your subscription whitelisted
7779
2. Creating Azure Key Vault and storing key
7880
3. Creating a *Cluster* resource
7981
5. Granting permissions to your Key Vault
@@ -609,5 +611,5 @@ All your data remains accessible after the key rotation operation including data
609611

610612
- If you update your key version in Key Vault and don't update the new key identifier details in the *Cluster* resource, the Log Analytics cluster will keep using your previous key and your data will become inaccessible. Update new key identifier details in the *Cluster* resource to resume data ingestion and ability to query data.
611613

612-
- For support and help related to customer managed key, use your contacts into Microsoft.
614+
- For support and help related to customer managed key, use your Microsoft contact to contact us.
613615

0 commit comments

Comments
 (0)