Skip to content

Commit 65ad6c7

Browse files
committed
update
1 parent a27c70d commit 65ad6c7

File tree

1 file changed

+21
-10
lines changed

1 file changed

+21
-10
lines changed

articles/reliability/reliability-key-vault.md

Lines changed: 21 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -48,15 +48,24 @@ Azure Key Vault is designed to handle most transient errors automatically. Howev
4848
- Use the Azure SDK libraries which typically include built-in retry mechanisms
4949
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling
5050

51-
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits.
51+
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits. Azure Key Vault has specific guidance for these scenarios:
52+
53+
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys)
54+
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions
55+
- A subscription-wide limit for all transaction types is five times the individual key vault limit
56+
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults)
57+
- Cache secrets in memory when possible to reduce direct requests to Key Vault
58+
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material
59+
60+
For comprehensive throttling guidance, see [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
5261

5362
## Availability zone support
5463

5564
[!INCLUDE [AZ support description](includes/reliability-availability-zone-description-include.md)]
5665

5766
Azure Key Vault automatically leverages availability zones in regions where they're available, providing high availability within a region without requiring any specific configuration from customers.
5867

59-
The service is designed to be resilient to zone failures without any specific configuration required by customers. Key Vault automatically manages the redundancy across availability zones in regions where zones are available. For more information, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
68+
The service is designed to be resilient to zone failures without any specific configuration required by customers. Key Vault automatically manages the redundancy across multiple availability zones in regions where zones are available. When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability. For more information, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
6069

6170
### Region support
6271

@@ -72,7 +81,7 @@ While Azure Key Vault is resilient to zone failures, certain aspects should be c
7281

7382
- During a zone failure, some write operations might be temporarily unavailable
7483
- Read operations typically remain available during zone failures
75-
- You should monitor your key vault's availability using Azure Monitor metrics and alerts
84+
- You can monitor the status of your key vault during service degradation events through [Azure Resource Health](/azure/service-health/resource-health-overview) and [Azure Service Health](/azure/service-health/service-health-overview), which provide notifications about any service issues
7685

7786
### Cost
7887

@@ -114,6 +123,7 @@ Exceptions to cross-region replication include:
114123
- Brazil South region
115124
- Brazil Southeast region
116125
- West US 3 region
126+
- Any region that doesn't have a paired region
117127

118128
When you create key vaults in these regions, they aren't replicated across regions.
119129

@@ -129,10 +139,11 @@ There are no additional requirements to enable multi-region replication for Key
129139

130140
### Considerations
131141

132-
- Key vaults in Brazil South, Brazil Southeast, and West US 3 don't have cross-region replication
133-
- During failover, your key vault is in read-only mode with limited operations supported
134-
- You can't change key vault properties during failover
135-
- Access policy and firewall configurations can't be modified during failover
142+
- Key vaults in Brazil South, Brazil Southeast, West US 3, and any region without a paired region don't have cross-region replication
143+
- While the failover is in progress, your key vault might be unavailable for a few minutes
144+
- After failover has completed, your key vault operates in read-only mode with limited operations supported
145+
- You can't change key vault properties while operating in the secondary region
146+
- Access policy and firewall configurations can't be modified while operating in the secondary region
136147

137148
### Cost
138149

@@ -146,7 +157,7 @@ There are no additional costs for the built-in multi-region replication capabili
146157

147158
### Region-down experience
148159

149-
- **Detection and response:** The Key Vault service is responsible for detecting a region failure and automatically failing over to the secondary region.
160+
- **Detection and response:** The Key Vault service is responsible for detecting a region failure and automatically failing over to the secondary region. The failover process is initiated automatically by the Azure platform without requiring any customer intervention.
150161

151162
- **Notification:** You can monitor the status of your key vault through Azure Resource Health and Azure Service Health notifications.
152163

@@ -174,7 +185,7 @@ If you need a multi-region strategy for regions that don't support cross-region
174185
2. Using the backup and restore functionality to maintain consistent secrets across regions
175186
3. Implementing application-level logic to failover between key vaults
176187

177-
For example approaches to multi-region architectures, see [Highly available multi-region web application](/azure/architecture/web-apps/app-service/architectures/multi-region).
188+
For detailed instructions on backing up and restoring Key Vault objects across regions, see [Azure Key Vault backup](/azure/key-vault/general/backup).
178189

179190
## Backups
180191

@@ -189,7 +200,7 @@ Key points about the backup functionality:
189200

190201
> For most solutions, you shouldn't rely exclusively on backups. Instead, use the other capabilities described in this guide to support your resiliency requirements. However, backups protect against some risks that other approaches don't, such as accidental deletion of specific secrets.
191202
192-
For detailed instructions on how to back up and restore Key Vault objects, see [Azure Key Vault backup](/azure/key-vault/general/backup). For guidance on when to use backups, see [When to use backups](/azure/key-vault/general/backup#when-to-use-backups), and for important limitations, refer to [Backup limitations](/azure/key-vault/general/backup#limitations).
203+
For detailed instructions, guidance on when to use backups, and important limitations, see [Azure Key Vault backup](/azure/key-vault/general/backup).
193204

194205
## Recovery features
195206

0 commit comments

Comments
 (0)