Skip to content

Commit 8246005

Browse files
authored
Merge pull request #211765 from msmbaldwin/akv-misc
Akv misc
2 parents 248236d + e7e4e65 commit 8246005

File tree

8 files changed

+37
-57
lines changed

8 files changed

+37
-57
lines changed

articles/databox-online/azure-stack-edge-gpu-troubleshoot-activation.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,8 @@ The following table summarizes the errors related to device activation and the c
4848

4949
| Error message| Recommended resolution |
5050
|------------------------------------------------------|--------------------------------------|
51-
| If the diagnostic setting creation fails for your key vault, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | This is not a blocking error and the activation key will be generated. <br> You can manually [Create a diagnostic setting to store your audit logs](../key-vault/general/howto-logging.md#create-a-storage-account-for-your-logs). |
52-
| If the storage account creation fails, for example, because an account already exists for the name you specified, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | You can manually create a storage account and link it to the diagnostic setting on your key vault. This account is then used to store audit logs. <br> For more information, see [Create a storage account for your logs](../key-vault/general/howto-logging.md#create-a-storage-account-for-your-logs). |
51+
| If the diagnostic setting creation fails for your key vault, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | This is not a blocking error and the activation key will be generated. <br>You can manually [Create a diagnostic setting to store your audit logs](../key-vault/general/howto-logging.md). |
52+
| If the storage account creation fails, for example, because an account already exists for the name you specified, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | You can manually create a storage account and link it to the diagnostic setting on your key vault. This account is then used to store audit logs. <br> For more information, see [Create a storage account for your logs](../key-vault/general/howto-logging.md). |
5353
|If the system assigned managed identity for your Azure Stack Edge resource is deleted, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | You'll see an alert in the Security blade for your Azure Stack Edge resource. Select this alert to [Create a new managed identity through the Recover key vault blade](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault) |
5454
| If the managed identity doesn't have access to the key vault, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | You'll see an alert in the Security blade for your Azure Stack Edge resource. Select this alert to [Grant managed identity access to the key vault through the Recover key vault blade](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault). |
5555

@@ -59,7 +59,7 @@ The following table summarizes the errors related to device activation and the c
5959
|------------------------------------------------------|--------------------------------------|
6060
| If the key vault resource is moved across resource groups or subscriptions, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | The key vault resource move is treated the same way as key vault deletion. You can restore the key vault if the vault is in purge-protection duration. If the purge-protection duration has elapsed, then you'll need to create a new key vault. For more information on either of the above cases, see [Recover a key vault](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault). |
6161
| If the subscription you are using, is moved across tenants, you'll see this error. <!--<br> ![Key vault error 3](./media/azure-stack-edge-gpu-activation-key-vault/placeholder.png)--> | Reconfigure managed identity and create a new key vault. You can also move the key vault resource in which case only the managed identity will need to be reconfigured. In each of the above cases, see [Recover a key vault](azure-stack-edge-gpu-activation-key-vault.md#recover-key-vault). |
62-
| If the storage account resource that is used for audit logs, is moved across resource groups or subscriptions, you won't see an error. | You can [Create a new storage account and configure it to store the audit logs](../key-vault/general/howto-logging.md#create-a-storage-account-for-your-logs). |
62+
| If the storage account resource that is used for audit logs, is moved across resource groups or subscriptions, you won't see an error. | You can [Create a new storage account and configure it to store the audit logs](../key-vault/general/howto-logging.md). |
6363

6464
## Other errors
6565

articles/key-vault/certificates/about-certificates.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -110,10 +110,10 @@ The following table represents the mapping of x509 key usage policy to effective
110110
|----------|--------|--------|
111111
|DataEncipherment|encrypt, decrypt| N/A |
112112
|DecipherOnly|decrypt| N/A |
113-
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
113+
|DigitalSignature|sign, verify| Key Vault default without a usage specification at certificate creation time |
114114
|EncipherOnly|encrypt| N/A |
115115
|KeyCertSign|sign, verify|N/A|
116-
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
116+
|KeyEncipherment|wrapKey, unwrapKey| Key Vault default without a usage specification at certificate creation time |
117117
|NonRepudiation|sign, verify| N/A |
118118
|crlsign|sign, verify| N/A |
119119

@@ -134,7 +134,7 @@ Before a certificate issuer can be created in a Key Vault, following prerequisit
134134

135135
- An organization administrator must on-board their company (ex. Contoso) with at least one CA provider.
136136

137-
2. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
137+
1. Admin creates requester credentials for Key Vault to enroll (and renew) TLS/SSL certificates
138138

139139
- Provides the configuration to be used to create an issuer object of the provider in the key vault
140140

@@ -155,7 +155,6 @@ Certificate contacts contain contact information to send notifications triggered
155155

156156
Access control for certificates is managed by Key Vault, and is provided by the Key Vault that contains those certificates. The access control policy for certificates is distinct from the access control policies for keys and secrets in the same Key Vault. Users may create one or more vaults to hold certificates, to maintain scenario appropriate segmentation and management of certificates. For more information on certificate access control, see [here](certificate-access-control.md)
157157

158-
159158
## Certificate Use Cases
160159

161160
### Secure communication and authentication
@@ -166,6 +165,7 @@ TLS certificates can help encrypt communications over the internet and establish
166165
* Cloud/Multi-Cloud: secure cloud-based applications on-prem, cross-cloud, or in your cloud provider's tenant.
167166

168167
### Code signing
168+
169169
A certificate can help secure the code/script of software, thereby ensuring that the author can share the software over the internet without being changed by malicious entities. Furthermore, once the author signs the code using a certificate leveraging the code signing technology, the software is marked with a stamp of authentication displaying the author and their website. Therefore, the certificate used in code signing helps validate the software's authenticity, promoting end-to-end security.
170170

171171
## Next steps

articles/key-vault/certificates/tutorial-import-certificate.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ In this case, we will create a certificate called **ExampleCertificate**, or imp
5656

5757
# [Azure portal](#tab/azure-portal)
5858

59-
1. On the Key Vault properties pages, select **Certificates**.
59+
1. On the page for your key vault, select **Certificates**.
6060
2. Click on **Generate/Import**.
6161
3. On the **Create a certificate** screen choose the following values:
6262
- **Method of Certificate Creation**: Import.

articles/key-vault/general/howto-logging.md

Lines changed: 27 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -30,13 +30,27 @@ What is logged:
3030

3131
## Prerequisites
3232

33-
To complete this tutorial, you must have the following:
33+
To complete this tutorial, you will need an Azure key vault. You can create a new key vault using one of these methods:
34+
- [Create a key vault using the Azure CLI](quick-create-cli.md)
35+
- [Create a key vault using Azure PowerShell](quick-create-powershell.md)
36+
- [Create a key vault using the Azure portal](quick-create-portal.md)
3437

35-
* An existing key vault that you have been using.
36-
* [Azure Cloud Shell](https://shell.azure.com) - Bash environment.
37-
* Sufficient storage on Azure for your Key Vault logs.
38+
You will also need a destination for your logs. This can be an existing or new Azure storage account and/or Log Analytics workspace.
3839

39-
In this article, commands are formatted for [Cloud Shell](https://shell.azure.com) with Bash as an environment.
40+
> [!IMPORTANT]
41+
> If you use an existing Azure storage account or Log Analytics workspace, it must be in the same subscription as your key vault. It must also use the Azure Resource Manager deployment model, rather than the classic deployment model.
42+
>
43+
> If you create a new Azure storage account or Log Analytics workspace, we recommend you create it in the same resource group as your key vault, for ease of management.
44+
45+
You can create a new Azure storage account using one of these methods:
46+
- [Create a storage account using the Azure CLI](../../storage/common/storage-account-create.md?tabs=azure-cli)
47+
- [Create a storage account using Azure PowerShell](../../storage/common/storage-account-create.md?tabs=azure-powershell)
48+
- [Create a storage account using the Azure portal](../../storage/common/storage-account-create.md?tabs=azure-portal)
49+
50+
You can create a new Log Analytics workspace using one of these methods:
51+
- [Create a Log Analytics workspace using the Azure CLI](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-cli)
52+
- [Create a Log Analytics workspace using Azure PowerShell](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-powershell)
53+
- [Create a Log Analytics workspace the Azure portal](../../azure-monitor/logs/quick-create-workspace.md?tabs=azure-portal)
4054

4155
## Connect to your Key Vault subscription
4256

@@ -58,41 +72,11 @@ Get-AzSubscription
5872
Set-AzContext -SubscriptionId "<subscriptionID>"
5973
```
6074

61-
## Create a storage account for your logs
62-
63-
Although you can use an existing storage account for your logs, here you create a new storage account dedicated to Key Vault logs.
64-
65-
For additional ease of management, you'll also use the same resource group as the one that contains the key vault. In the [Azure CLI quickstart](quick-create-cli.md) and [Azure PowerShell quickstart](quick-create-powershell.md), this resource group is named **myResourceGroup**, and the location is *eastus*. Replace these values with your own, as applicable.
66-
67-
You also need to provide a storage account name. Storage account names must be unique, between 3 and 24 characters in length, and use numbers and lowercase letters only. Lastly, you create a storage account of the `Standard_LRS` SKU.
68-
69-
With the Azure CLI, use the [az storage account create](/cli/azure/storage/account#az-storage-account-create) command.
70-
71-
```azurecli-interactive
72-
az storage account create --name "<your-unique-storage-account-name>" -g "myResourceGroup" --sku "Standard_LRS"
73-
```
74-
75-
With Azure PowerShell, use the [New-AzStorageAccount](/powershell/module/az.storage/new-azstorageaccount) cmdlet. You will need to provide the location that corresponds to the resource group.
75+
## Obtain resource IDs
7676

77-
```powershell
78-
New-AzStorageAccount -ResourceGroupName myResourceGroup -Name "<your-unique-storage-account-name>" -Type "Standard_LRS" -Location "eastus"
79-
```
80-
81-
In either case, note the ID of the storage account. The Azure CLI operation returns the ID in the output. To obtain the ID with Azure PowerShell, use [Get-AzStorageAccount](/powershell/module/az.storage/get-azstorageaccount), and assign the output to the variable `$sa`. You can then see the storage account with `$sa.id`. (The `$sa.Context` property is also used later in this article.)
82-
83-
```powershell-interactive
84-
$sa = Get-AzStorageAccount -Name "<your-unique-storage-account-name>" -ResourceGroup "myResourceGroup"
85-
$sa.id
86-
```
87-
88-
The ID of the storage account is in the following format: "/subscriptions/*your-subscription-ID*/resourceGroups/myResourceGroup/providers/Microsoft.Storage/storageAccounts/*your-unique-storage-account-name*".
89-
90-
> [!NOTE]
91-
> If you decide to use an existing storage account, it must use the same subscription as your key vault. It must use the Azure Resource Manager deployment model, rather than the classic deployment model.
77+
To enable logging on a key vault, you will need the resource ID of the key vault, as well as the destination (Azure Storage or Log Analytics account).
9278

93-
## Obtain your key vault resource ID
94-
95-
In the [CLI quickstart](quick-create-cli.md) and [PowerShell quickstart](quick-create-powershell.md), you created a key with a unique name. Use that name again in the following steps. If you can't remember the name of your key vault, you can use the Azure CLI [az keyvault list](/cli/azure/keyvault#az-keyvault-list) command, or the Azure PowerShell [Get-AzKeyVault](/powershell/module/az.keyvault/get-azkeyvault) cmdlet, to list them.
79+
If you can't remember the name of your key vault, you can use the Azure CLI [az keyvault list](/cli/azure/keyvault#az-keyvault-list) command, or the Azure PowerShell [Get-AzKeyVault](/powershell/module/az.keyvault/get-azkeyvault) cmdlet, to find it.
9680

9781
Use the name of your key vault to find its resource ID. With the Azure CLI, use the [az keyvault show](/cli/azure/keyvault#az-keyvault-show) command.
9882

@@ -150,23 +134,19 @@ Set-AzDiagnosticSetting "<key-vault-resource-id>" -StorageAccountId $sa.id -Enab
150134

151135
To configure diagnostic settings in the Azure portal, follow these steps:
152136

153-
1. From the **Resource** pane menu, select **Diagnostic settings**.
137+
1. From the **Resource** pane menu, select **Diagnostic settings**, and then **Add diagnostic setting**
154138

155139
:::image type="content" source="../media/diagnostics-portal-1.png" alt-text="Screenshot that shows how to select diagnostic settings.":::
156140

157-
1. Select **+ Add diagnostic setting**.
158-
159-
:::image type="content" source="../media/diagnostics-portal-2.png" alt-text="Screenshot that shows adding a diagnostic setting.":::
160-
161-
1. Select a name for your diagnostic setting. To configure logging for Azure Monitor for Key Vault, select **AuditEvent** and **Send to Log Analytics workspace**. Then choose the subscription and Log Analytics workspace to which you want to send your logs. You can also select the option to **Archive to a storage account**.
141+
1. Under **Category groups**, select both **audit** and **allLogs**.
142+
1. If Azure Log Analytics is the destination, select **Send to Log Analytics workspace** and choose your subscription and workspace from the drop-down menus. You may also select **Archive to a storage account** and choose your subscription and storage account from the drop-down menus.
162143

163-
:::image type="content" source="../media/diagnostics-portal-3.png" alt-text="Screenshot of diagnostic settings options.":::
144+
:::image type="content" source="../media/diagnostics-portal-2.png" alt-text="Screenshot of diagnostic settings options.":::
164145

165-
Otherwise, select the options that pertain to the logs that you want to select.
166146

167147
1. When you have selected your desired options, select **Save**.
168148

169-
:::image type="content" source="../media/diagnostics-portal-4.png" alt-text="Screenshot that shows how to save the options you selected.":::
149+
:::image type="content" source="../media/diagnostics-portal-3.png" alt-text="Screenshot that shows how to save the options you selected.":::
170150

171151
---
172152

articles/key-vault/general/private-link-service.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,15 +50,15 @@ After configuring the key vault basics, select the Networking tab and follow the
5050
1. Click the "+ Add" Button to add a private endpoint.
5151

5252
![Screenshot that shows the 'Networking' tab on the 'Create key vault' page.](../media/private-link-service-1.png)
53-
53+
5454
1. In the "Location" field of the Create Private Endpoint Blade, select the region in which your virtual network is located.
5555
1. In the "Name" field, create a descriptive name that will allow you to identify this private endpoint.
5656
1. Select the virtual network and subnet you want this private endpoint to be created in from the dropdown menu.
5757
1. Leave the "integrate with the private zone DNS" option unchanged.
5858
1. Select "Ok".
5959

6060
![Screenshot that shows the 'Create private endpoint' page with settings selected.](../media/private-link-service-8.png)
61-
61+
6262
You will now be able to see the configured private endpoint. You now have the option to delete and edit this private endpoint.
6363
Select the "Review + Create" button and create the key vault. It will take 5-10 minutes for the deployment to complete.
6464

26.5 KB
Loading
-141 KB
Loading
-189 KB
Loading

0 commit comments

Comments
 (0)