You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Information and steps to configure CustomerManaged Key (CMK) to encrypt data in your Log Analytics workspaces using an Azure Key Vault key.
description: Information and steps to configure Customer-Managed Key (CMK) to encrypt data in your Log Analytics workspaces using an Azure Key Vault key.
This guide provides background information and steps to configure CustomerManaged Keys (CMK) for your Log Analytics workspaces. Once configured, any data sent to your workspaces is encrypted with your Azure Key Vault key.
15
+
This guide provides background information and steps to configure Customer-Managed Keys (CMK) for your Log Analytics workspaces. Once configured, any data sent to your workspaces is encrypted with your Azure Key Vault key.
16
16
17
17
We recommend you review [Limitations and constraints](#Limitations and constraints) below before configuration.
18
18
@@ -22,7 +22,7 @@ We recommend you review [Limitations and constraints](#Limitations and constrain
22
22
23
23
- The CMK deployment described in the guide is delivered in production quality and supported as such although it's an early access feature.
24
24
25
-
- CMK capability is delivered on a dedicated data-store-cluster, aka ADX cluster and suitable for customers sending 1TB per day.
25
+
- CMK capability is delivered on a dedicated data-store-cluster, aka ADX cluster and suitable for customers sending 1 TB per day.
26
26
27
27
- CMK pricing model isn't available currently and it isn't covered in the guide -- A pricing model for dedicated data-store-cluster is expected in the second quarter of 2020 and will apply on any existing CMK deployments.
28
28
@@ -33,15 +33,15 @@ We recommend you review [Limitations and constraints](#Limitations and constrain
33
33
> Log Analytics and Application Insights are using the same data-store platform and query engine.
34
34
> We are bringing these two stores together via integration of Application Insights into Log Analytics to create a single unified logs store under Azure Monitor. This change is planned for the second quarter of calendar year 2020. If you don’t have to deploy CMK for your Application Insight data by then, we recommend waiting for the completion of the consolidation since such deployments will be disrupted by the consolidation and you will have to re-configure CMK after the migration to Log Analytics workspace.
35
35
36
-
## Customermanaged key (CMK) overview
36
+
## Customer-managed key (CMK) overview
37
37
38
38
[Encryption at Rest](https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest)
39
39
is a common privacy and security requirement in organizations. You can
40
40
let Azure completely manage Encryption at Rest, while you have various
41
41
options to closely manage encryption or encryption keys.
42
42
43
43
The Azure Monitor data-store ensures that all data encrypted at
44
-
rest using Azuremanaged keys while stored in Azure storage. Azure Monitor also
44
+
rest using Azure-managed keys while stored in Azure Storage. Azure Monitor also
45
45
provides an option for data encryption using your own key that is stored
46
46
in [Azure Key Vaults](https://docs.microsoft.com/azure/key-vault/key-vault-overview),
47
47
which is accessed using system-assigned [managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) authentication. This key can be either [software or hardware-HSM
@@ -563,7 +563,7 @@ platform and query engine -- We are bringing these two stores together
563
563
via integration of Application Insights into Log Analytics to provide a
564
564
single unified logs store under Azure Monitor by the second quarter of
565
565
2020. This change will bring your Application Insight data into Log
566
-
Analytics workspaces and make queries, insights and other improvements
566
+
Analytics workspaces and make queries, insights, and other improvements
567
567
possible while the configuration of CMK on your workspace, will also
568
568
apply to your Application Insights data.
569
569
@@ -588,7 +588,7 @@ of the ones listed above.
588
588
589
589
### Create *Cluster* resource
590
590
591
-
This resource is used as intermediate identity connection between your Key Vault and your components. AFTER you received a confirmation that your subscriptions were whitelisted, create a Log Analytics Cluster resource at the region where your components are located. The type of the Cluster resource is defined at creation time by setting the “clusterType” property to either ‘LogAnalytics’, or ‘ApplicationInsights’ – It should be ‘ApplicationInsights’ for Application Insights CMK. “clusterType” setting can’t be altered after the configuration.
591
+
This resource is used as intermediate identity connection between your Key Vault and your components. AFTER you received a confirmation that your subscriptions were whitelisted, create a Log Analytics Cluster resource at the region where your components are located. The type of the Cluster resource is defined at creation time by setting the *clusterType* property to either *LogAnalytics*, or *ApplicationInsights*. It should be *ApplicationInsights* for Application Insights CMK. The *clusterType* setting can’t be altered after the configuration.
0 commit comments