Skip to content

Commit 5855646

Browse files
committed
Adding new troubleshooting document
1 parent 334120e commit 5855646

File tree

2 files changed

+10
-10
lines changed

2 files changed

+10
-10
lines changed

articles/mysql/howto-data-encryption-troubleshoot.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ No permissions to access the key vault or the key doesn't exist
2929

3030
* The key was accidentally deleted, disabled or the key expired.
3131
* The Azure Database for MySQL instance-managed identity was accidentally deleted.
32-
* Permissions granted to the Azure Database for MySQL server’s managed identity for the keys aren't sufficient (they don't include Get, Wrap, and Unwrap).
32+
* Permissions granted to the Azure Database for MySQL server managed identity for the keys aren't sufficient (they don't include Get, Wrap, and Unwrap).
3333
* Permissions for the Azure Database for MySQL server instance-managed identity were revoked.
3434

3535
## Identify and resolve common errors
@@ -50,4 +50,4 @@ No permissions to access the key vault or the key doesn't exist
5050

5151

5252
## Next steps
53-
Learn how to [set up data encryption with a customer-managed key for your Azure database for MySQL by using the Azure portal](howto-data-encryption-portal.md).
53+
[Set up data encryption with a customer-managed key for your Azure database for MySQL by using the Azure portal](howto-data-encryption-portal.md).

articles/postgresql/howto-data-encryption-troubleshoot.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
11
---
2-
title: Data encryption for Azure Database for PostgreSQL Single server troubleshooting
3-
description: Learn how to troubleshoot the data encryption for your Azure Database for PostgreSQL Single server
2+
title: Data encryption for Azure Database for PostgreSQL - Single server troubleshooting
3+
description: Learn how to troubleshoot the data encryption for your Azure Database for PostgreSQL - Single server
44
author: kummanish
55
ms.author: manishku
66
ms.service: postgresql
77
ms.topic: conceptual
88
ms.date: 02/13/2020
99
---
1010

11-
# Troubleshooting data encryption with customer-managed keys in Azure Database for PostgreSQL Single server
12-
This article describes how to identify and resolve common issues/errors that occur on an Azure Database for PostgreSQL Single server configured with Data Encryption using customer-managed key.
11+
# Troubleshooting data encryption with customer-managed keys in Azure Database for PostgreSQL - Single server
12+
This article describes how to identify and resolve common issues/errors that occur on an Azure Database for PostgreSQL - Single server configured with Data Encryption using customer-managed key.
1313

1414
## Introduction
1515
When data encryption is configured to use a customer-managed key in Azure Key Vault, continuous access to this key is required for the server to stay available. If the server loses access to the customer-managed key in Azure Key Vault, the server will start denying all connections with the appropriate error message and change its state to ***Inaccessible*** in the Azure portal.
1616

17-
If an inaccessible Azure Database for PostgreSQL Single server is no longer needed, it can be deleted immediately to stop incurring costs. All other actions on the server are not permitted until access to the Azure key vault has been restored and the server is back available. Changing the data encryption option from ‘Yes’(customer-managed) to ‘No’ (service-managed) on an inaccessible the server is also not possible while a server is encrypted with customer-managed. You must revalidate the key manually to make the server back available. This is necessary to protect the data from unauthorized access while permissions to the customer-managed key have been revoked.
17+
If an inaccessible Azure Database for PostgreSQL - Single server is no longer needed, it can be deleted immediately to stop incurring costs. All other actions on the server are not permitted until access to the Azure key vault has been restored and the server is back available. Changing the data encryption option from ‘Yes’(customer-managed) to ‘No’ (service-managed) on an inaccessible the server is also not possible while a server is encrypted with customer-managed. You must revalidate the key manually to make the server back available. This is necessary to protect the data from unauthorized access while permissions to the customer-managed key have been revoked.
1818

1919
## Common errors causing server to become inaccessible
2020

@@ -28,8 +28,8 @@ The key vault is unavailable or doesn't exist
2828
No permissions to access the key vault or the key doesn't exist
2929

3030
* The key was accidentally deleted, disabled or the key expired.
31-
* The Azure Database for PostgreSQL Single server instance-managed identity was accidentally deleted.
32-
* Permissions granted to the Azure Database for PostgreSQL Single server’s managed identity for the keys aren't sufficient (they don't include Get, Wrap, and Unwrap).
31+
* The Azure Database for PostgreSQL - Single server instance-managed identity was accidentally deleted.
32+
* Permissions granted to the Azure Database for PostgreSQL managed identity for the keys aren't sufficient (they don't include Get, Wrap, and Unwrap).
3333
* Permissions for the Azure Database for PostgreSQL Single server instance-managed identity were revoked or deleted.
3434

3535
## Identify and resolve common errors
@@ -50,4 +50,4 @@ No permissions to access the key vault or the key doesn't exist
5050

5151

5252
## Next steps
53-
Learn how to [set up data encryption with a customer-managed key for your Azure database for PostgreSQL by using the Azure portal](howto-data-encryption-portal.md).
53+
[Set up data encryption with a customer-managed key for your Azure database for PostgreSQL by using the Azure portal](howto-data-encryption-portal.md).

0 commit comments

Comments
 (0)