Skip to content

Commit 7725f31

Browse files
committed
Added new ascynchronous states
1 parent 99259b5 commit 7725f31

File tree

1 file changed

+28
-9
lines changed

1 file changed

+28
-9
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 28 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -33,15 +33,11 @@ The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure
3333

3434
## How CMK works in Azure Monitor
3535

36-
Azure Monitor leverages system-assigned managed identity to grant access
37-
to your Azure Key Vault. System-assigned managed identity can only be
38-
associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level. This
39-
dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics
40-
*Cluster* resource performs as an intermediate identity connection
41-
between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the
42-
managed identity that\'s associated with the *Cluster* resource to
43-
authenticate to your Azure Key Vault via Azure Active Directory. 
44-
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault. You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
36+
Azure Monitor leverages system-assigned managed identity to grant access to your Azure Key Vault.
37+
System-assigned managed identity can only be associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level -- This dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics *Cluster* resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the managed identity that\'s associated with the *Cluster* resource to authenticate to your Azure Key Vault via Azure Active Directory.
38+
39+
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault. You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
40+
4541

4642
![CMK Overview](media/customer-managed-keys/cmk-overview-8bit.png)
4743

@@ -130,6 +126,29 @@ Operation is in progress
130126
}
131127
```
132128

129+
Key identifier update operation is in progress
130+
```json
131+
{
132+
"id": "Azure-AsyncOperation URL value from the GET operation",
133+
"name": "operation-id",
134+
"status" : "Updating",
135+
"startTime": "2017-01-06T20:56:36.002812+00:00",
136+
"endTime": "2017-01-06T20:56:56.002812+00:00",
137+
}
138+
```
139+
140+
*Cluster* resource delete is in progress -- When you delete a *Cluster* resource that has workspaces associated workspaces, a disassociation operation is performed for each of the workspaces in asynchronous operations that can take a while.
141+
This isn’t relevant when you delete a *Cluster* with no associated workspace -- In this case the *Cluster* resource is deleted immediately.
142+
```json
143+
{
144+
"id": "Azure-AsyncOperation URL value from the GET operation",
145+
"name": "operation-id",
146+
"status" : "Deleting",
147+
"startTime": "2017-01-06T20:56:36.002812+00:00",
148+
"endTime": "2017-01-06T20:56:56.002812+00:00",
149+
}
150+
```
151+
133152
Operation is completed
134153
```json
135154
{

0 commit comments

Comments
 (0)