You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/reliability/reliability-key-vault.md
+21-10Lines changed: 21 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -48,15 +48,24 @@ Azure Key Vault is designed to handle most transient errors automatically. Howev
48
48
- Use the Azure SDK libraries which typically include built-in retry mechanisms
49
49
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling
50
50
51
-
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits.
51
+
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits. Azure Key Vault has specific guidance for these scenarios:
52
+
53
+
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys)
54
+
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions
55
+
- A subscription-wide limit for all transaction types is five times the individual key vault limit
56
+
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults)
57
+
- Cache secrets in memory when possible to reduce direct requests to Key Vault
58
+
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material
59
+
60
+
For comprehensive throttling guidance, see [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
52
61
53
62
## Availability zone support
54
63
55
64
[!INCLUDE [AZ support description](includes/reliability-availability-zone-description-include.md)]
56
65
57
66
Azure Key Vault automatically leverages availability zones in regions where they're available, providing high availability within a region without requiring any specific configuration from customers.
58
67
59
-
The service is designed to be resilient to zone failures without any specific configuration required by customers. Key Vault automatically manages the redundancy across availability zones in regions where zones are available. For more information, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
68
+
The service is designed to be resilient to zone failures without any specific configuration required by customers. Key Vault automatically manages the redundancy across multiple availability zones in regions where zones are available. When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability. For more information, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
60
69
61
70
### Region support
62
71
@@ -72,7 +81,7 @@ While Azure Key Vault is resilient to zone failures, certain aspects should be c
72
81
73
82
- During a zone failure, some write operations might be temporarily unavailable
74
83
- Read operations typically remain available during zone failures
75
-
- You should monitor your key vault's availability using Azure Monitor metrics and alerts
84
+
- You can monitor the status of your key vault during service degradation events through [Azure Resource Health](/azure/service-health/resource-health-overview) and [Azure Service Health](/azure/service-health/service-health-overview), which provide notifications about any service issues
76
85
77
86
### Cost
78
87
@@ -114,6 +123,7 @@ Exceptions to cross-region replication include:
114
123
- Brazil South region
115
124
- Brazil Southeast region
116
125
- West US 3 region
126
+
- Any region that doesn't have a paired region
117
127
118
128
When you create key vaults in these regions, they aren't replicated across regions.
119
129
@@ -129,10 +139,11 @@ There are no additional requirements to enable multi-region replication for Key
129
139
130
140
### Considerations
131
141
132
-
- Key vaults in Brazil South, Brazil Southeast, and West US 3 don't have cross-region replication
133
-
- During failover, your key vault is in read-only mode with limited operations supported
134
-
- You can't change key vault properties during failover
135
-
- Access policy and firewall configurations can't be modified during failover
142
+
- Key vaults in Brazil South, Brazil Southeast, West US 3, and any region without a paired region don't have cross-region replication
143
+
- While the failover is in progress, your key vault might be unavailable for a few minutes
144
+
- After failover has completed, your key vault operates in read-only mode with limited operations supported
145
+
- You can't change key vault properties while operating in the secondary region
146
+
- Access policy and firewall configurations can't be modified while operating in the secondary region
136
147
137
148
### Cost
138
149
@@ -146,7 +157,7 @@ There are no additional costs for the built-in multi-region replication capabili
146
157
147
158
### Region-down experience
148
159
149
-
-**Detection and response:** The Key Vault service is responsible for detecting a region failure and automatically failing over to the secondary region.
160
+
-**Detection and response:** The Key Vault service is responsible for detecting a region failure and automatically failing over to the secondary region. The failover process is initiated automatically by the Azure platform without requiring any customer intervention.
150
161
151
162
-**Notification:** You can monitor the status of your key vault through Azure Resource Health and Azure Service Health notifications.
152
163
@@ -174,7 +185,7 @@ If you need a multi-region strategy for regions that don't support cross-region
174
185
2. Using the backup and restore functionality to maintain consistent secrets across regions
175
186
3. Implementing application-level logic to failover between key vaults
176
187
177
-
For example approaches to multi-region architectures, see [Highly available multi-region web application](/azure/architecture/web-apps/app-service/architectures/multi-region).
188
+
For detailed instructions on backing up and restoring Key Vault objects across regions, see [Azure Key Vault backup](/azure/key-vault/general/backup).
178
189
179
190
## Backups
180
191
@@ -189,7 +200,7 @@ Key points about the backup functionality:
189
200
190
201
> For most solutions, you shouldn't rely exclusively on backups. Instead, use the other capabilities described in this guide to support your resiliency requirements. However, backups protect against some risks that other approaches don't, such as accidental deletion of specific secrets.
191
202
192
-
For detailed instructions on how to back up and restore Key Vault objects, see [Azure Key Vault backup](/azure/key-vault/general/backup). For guidance on when to use backups, see [When to use backups](/azure/key-vault/general/backup#when-to-use-backups), and for important limitations, refer to [Backup limitations](/azure/key-vault/general/backup#limitations).
203
+
For detailed instructions, guidance on when to use backups, and important limitations, see [Azure Key Vault backup](/azure/key-vault/general/backup).
0 commit comments