You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
## How Customer-managed key works in Azure Monitor
31
31
32
-
Azure Monitor uses managed identity to grant access to your Azure Key Vault. The identity of the Log Analytics cluster is supported at the cluster level. To allow Customer-managed key on multiple workspaces, a Log Analytics *Cluster* resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The cluster's storage uses the managed identity that\'s associated with the *Cluster* resource to authenticate to your Azure Key Vault via Azure Active Directory.
32
+
Azure Monitor uses managed identity to grant access to your Azure Key Vault. The identity of the Log Analytics cluster is supported at the cluster level. To allow Customer-managed key on multiple workspaces, a Log Analytics Cluster resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The cluster's storage uses the managed identity that\'s associated with the Cluster resource to authenticate to your Azure Key Vault via Azure Active Directory.
33
+
34
+
Clusters support two [managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types): System-assigned and User-assigned, while a single identity can be defined in a cluster depending on your scenario.
35
+
36
+
- System-assigned managed identity is simpler and being generated automatically with the cluster creation when identity `type` is set to "*SystemAssigned*". This identity can be used later to grant storage access to your Key Vault for wrap and unwrap operations.
37
+
- User-assigned managed identity lets you configure Customer-managed key at cluster creation, when granting it permissions in your Key Vault before cluster creation.
33
38
34
39
You can apply Customer-managed key configuration to a new cluster, or existing cluster that has linked workspaces with data ingested to them. New data ingested to linked workspaces gets encrypted with your key, and older data ingested before the configuration, remains encrypted with Microsoft key. Your queries aren't affected by Customer-managed key configuration and query is performed across old and new data seamlessly. You can unlink workspaces from your cluster at any time, and new data ingested after the unlink gets encrypted with Microsoft key, and query is performed across old and new data seamlessly.
35
40
@@ -99,7 +104,7 @@ Follow the procedure illustrated in [Dedicated Clusters article](./logs-dedicate
99
104
100
105
## Grant Key Vault permissions
101
106
102
-
There are two permission models in Key Vault to grants permissions to your cluster and underlay storage——Vault access policy, and Azure role-based access control.
107
+
There are two permission models in Key Vault to grant permissions to your cluster and underlay storage——Vault access policy, and Azure role-based access control.
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/logs-dedicated-clusters.md
+28-4Lines changed: 28 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ Capabilities that require dedicated clusters:
36
36
| West US 3 |||||
37
37
38
38
39
-
## Management
39
+
## Cluster management
40
40
41
41
Dedicated clusters are managed with an Azure resource that represents Azure Monitor Log clusters. Operations are performed programmatically using [CLI](/cli/azure/monitor/log-analytics/cluster), [PowerShell](/powershell/module/az.operationalinsights) or the [REST](/rest/api/loganalytics/clusters).
42
42
@@ -56,12 +56,36 @@ Provide the following properties when creating new dedicated cluster:
56
56
-**ResourceGroupName**: You should use a central IT resource group because clusters are usually shared by many teams in the organization. For more design considerations, review Design a Log Analytics workspace configuration(../logs/workspace-design.md).
57
57
-**Location**
58
58
-**SkuCapacity**: The Commitment Tier (formerly called capacity reservations) can be set to 500, 1000, 2000 or 5000 GB/day. For more information on cluster costs, see [Dedicate clusters](./cost-logs.md#dedicated-clusters).
59
+
-**Managed identity**: Clusters support two [managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types): System-assigned and User-assigned managed identity, while a single identity can be defined in a cluster depending on your scenario.
60
+
- System-assigned managed identity is simpler and being generated automatically with the cluster creation when identity `type` is set to "*SystemAssigned*". This identity can be used later to grant storage access to your Key Vault for wrap and unwrap operations.
61
+
62
+
*Identity in Cluster's REST Call*
63
+
```json
64
+
{
65
+
"identity": {
66
+
"type": "SystemAssigned"
67
+
}
68
+
}
69
+
```
70
+
- User-assigned managed identity lets you configure Customer-managed key at cluster creation, when granting it permissions in your Key Vault before cluster creation.
The user account that creates the clusters must have the standard Azure resource creation permission: `Microsoft.Resources/deployments/*` and cluster write permission `Microsoft.OperationalInsights/clusters/write` by having in their role assignments this specific action or `Microsoft.OperationalInsights/*` or `*/write`.
61
85
62
86
After you create your cluster resource, you can edit additional properties such as *sku*, *keyVaultProperties, or *billingType*. See more details below.
63
87
64
-
You can have up to five active clusters per subscription per region. If the cluster is deleted, it is still reserved for 14 days. You can have up to seven reserved clusters per subscription per region (active or recently deleted).
88
+
You can have up to five active clusters per subscription per region. If the cluster is deleted, it is still reserved for 14 days. You can have up to seven clusters per subscription and region, five active, plus two deleted in past 14 days.
65
89
66
90
> [!NOTE]
67
91
> Cluster creation triggers resource allocation and provisioning. This operation can take a few hours to complete.
@@ -570,7 +594,7 @@ The cluster's billing stops when deleted, regardless the 30 days commitment tier
570
594
If you delete your cluster while workspaces are linked, Workspaces get automatically unlinked from the cluster before the cluster delete, and new data sent to workspaces gets ingested to Log Analytics store instead. If the retention of data in workspaces older than the period it was linked to the cluster, you can query workspace for the time range before the link to cluster and after the unlink, and the service performs cross-cluster queries seamlessly.
571
595
572
596
> [!NOTE]
573
-
> - There is a limit of seven clusters per subscription, five active, plus two deleted in past 14 days.
597
+
> - There is a limit of seven clusters per subscription and region, five active, plus two deleted in past 14 days.
574
598
> - Cluster's name remain reserved for 14 days after deletion, and can't be used for creating a new cluster.
575
599
576
600
Use the following commands to delete a cluster:
@@ -612,7 +636,7 @@ Authorization: Bearer <token>
612
636
613
637
- A maximum of five active clusters can be created in each region and subscription.
614
638
615
-
- A maximum number of seven reserved clusters (active or recently deleted) can exist in each region and subscription.
639
+
- A maximum of seven cluster allowed per subscription and region, five active, plus two deleted in past 14 days.
616
640
617
641
- A maximum of 1,000 Log Analytics workspaces can be linked to a cluster.
0 commit comments