Skip to content

Commit 70ca3f5

Browse files
Merge pull request #222233 from yossi-y/main
Added user-assigned managed identity
2 parents 6cc805d + 5d976b4 commit 70ca3f5

File tree

2 files changed

+35
-6
lines changed

2 files changed

+35
-6
lines changed

articles/azure-monitor/logs/customer-managed-keys.md

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,12 @@ Log Analytics Dedicated Clusters [pricing model](./logs-dedicated-clusters.md#cl
2929

3030
## How Customer-managed key works in Azure Monitor
3131

32-
Azure Monitor uses managed identity to grant access to your Azure Key Vault. The identity of the Log Analytics cluster is supported at the cluster level. To allow Customer-managed key on multiple workspaces, a Log Analytics *Cluster* resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The cluster's storage uses the managed identity that\'s associated with the *Cluster* resource to authenticate to your Azure Key Vault via Azure Active Directory.
32+
Azure Monitor uses managed identity to grant access to your Azure Key Vault. The identity of the Log Analytics cluster is supported at the cluster level. To allow Customer-managed key on multiple workspaces, a Log Analytics Cluster resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The cluster's storage uses the managed identity that\'s associated with the Cluster resource to authenticate to your Azure Key Vault via Azure Active Directory.
33+
34+
Clusters support two [managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types): System-assigned and User-assigned, while a single identity can be defined in a cluster depending on your scenario.
35+
36+
- System-assigned managed identity is simpler and being generated automatically with the cluster creation when identity `type` is set to "*SystemAssigned*". This identity can be used later to grant storage access to your Key Vault for wrap and unwrap operations.
37+
- User-assigned managed identity lets you configure Customer-managed key at cluster creation, when granting it permissions in your Key Vault before cluster creation.
3338

3439
You can apply Customer-managed key configuration to a new cluster, or existing cluster that has linked workspaces with data ingested to them. New data ingested to linked workspaces gets encrypted with your key, and older data ingested before the configuration, remains encrypted with Microsoft key. Your queries aren't affected by Customer-managed key configuration and query is performed across old and new data seamlessly. You can unlink workspaces from your cluster at any time, and new data ingested after the unlink gets encrypted with Microsoft key, and query is performed across old and new data seamlessly.
3540

@@ -99,7 +104,7 @@ Follow the procedure illustrated in [Dedicated Clusters article](./logs-dedicate
99104

100105
## Grant Key Vault permissions
101106

102-
There are two permission models in Key Vault to grants permissions to your cluster and underlay storage——Vault access policy, and Azure role-based access control.
107+
There are two permission models in Key Vault to grant permissions to your cluster and underlay storage——Vault access policy, and Azure role-based access control.
103108

104109
1. Vault access policy
105110

articles/azure-monitor/logs/logs-dedicated-clusters.md

Lines changed: 28 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ Capabilities that require dedicated clusters:
3636
| West US 3 | | | | |
3737

3838

39-
## Management
39+
## Cluster management
4040

4141
Dedicated clusters are managed with an Azure resource that represents Azure Monitor Log clusters. Operations are performed programmatically using [CLI](/cli/azure/monitor/log-analytics/cluster), [PowerShell](/powershell/module/az.operationalinsights) or the [REST](/rest/api/loganalytics/clusters).
4242

@@ -56,12 +56,36 @@ Provide the following properties when creating new dedicated cluster:
5656
- **ResourceGroupName**: You should use a central IT resource group because clusters are usually shared by many teams in the organization. For more design considerations, review Design a Log Analytics workspace configuration(../logs/workspace-design.md).
5757
- **Location**
5858
- **SkuCapacity**: The Commitment Tier (formerly called capacity reservations) can be set to 500, 1000, 2000 or 5000 GB/day. For more information on cluster costs, see [Dedicate clusters](./cost-logs.md#dedicated-clusters).
59+
- **Managed identity**: Clusters support two [managed identity types](../../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types): System-assigned and User-assigned managed identity, while a single identity can be defined in a cluster depending on your scenario.
60+
- System-assigned managed identity is simpler and being generated automatically with the cluster creation when identity `type` is set to "*SystemAssigned*". This identity can be used later to grant storage access to your Key Vault for wrap and unwrap operations.
61+
62+
*Identity in Cluster's REST Call*
63+
```json
64+
{
65+
"identity": {
66+
"type": "SystemAssigned"
67+
}
68+
}
69+
```
70+
- User-assigned managed identity lets you configure Customer-managed key at cluster creation, when granting it permissions in your Key Vault before cluster creation.
71+
72+
*Identity in Cluster's REST Call*
73+
```json
74+
{
75+
"identity": {
76+
"type": "UserAssigned",
77+
"userAssignedIdentities": {
78+
"subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/Microsoft.ManagedIdentity/UserAssignedIdentities/<cluster-assigned-managed-identity>"
79+
}
80+
}
81+
}
82+
```
5983

6084
The user account that creates the clusters must have the standard Azure resource creation permission: `Microsoft.Resources/deployments/*` and cluster write permission `Microsoft.OperationalInsights/clusters/write` by having in their role assignments this specific action or `Microsoft.OperationalInsights/*` or `*/write`.
6185

6286
After you create your cluster resource, you can edit additional properties such as *sku*, *keyVaultProperties, or *billingType*. See more details below.
6387

64-
You can have up to five active clusters per subscription per region. If the cluster is deleted, it is still reserved for 14 days. You can have up to seven reserved clusters per subscription per region (active or recently deleted).
88+
You can have up to five active clusters per subscription per region. If the cluster is deleted, it is still reserved for 14 days. You can have up to seven clusters per subscription and region, five active, plus two deleted in past 14 days.
6589

6690
> [!NOTE]
6791
> Cluster creation triggers resource allocation and provisioning. This operation can take a few hours to complete.
@@ -570,7 +594,7 @@ The cluster's billing stops when deleted, regardless the 30 days commitment tier
570594
If you delete your cluster while workspaces are linked, Workspaces get automatically unlinked from the cluster before the cluster delete, and new data sent to workspaces gets ingested to Log Analytics store instead. If the retention of data in workspaces older than the period it was linked to the cluster, you can query workspace for the time range before the link to cluster and after the unlink, and the service performs cross-cluster queries seamlessly.
571595

572596
> [!NOTE]
573-
> - There is a limit of seven clusters per subscription, five active, plus two deleted in past 14 days.
597+
> - There is a limit of seven clusters per subscription and region, five active, plus two deleted in past 14 days.
574598
> - Cluster's name remain reserved for 14 days after deletion, and can't be used for creating a new cluster.
575599
576600
Use the following commands to delete a cluster:
@@ -612,7 +636,7 @@ Authorization: Bearer <token>
612636

613637
- A maximum of five active clusters can be created in each region and subscription.
614638

615-
- A maximum number of seven reserved clusters (active or recently deleted) can exist in each region and subscription.
639+
- A maximum of seven cluster allowed per subscription and region, five active, plus two deleted in past 14 days.
616640

617641
- A maximum of 1,000 Log Analytics workspaces can be linked to a cluster.
618642

0 commit comments

Comments
 (0)