You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/logs/private-storage.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -53,7 +53,7 @@ For the storage account to successfully connect to your private link, it must:
53
53
54
54
* Be located on your virtual network or a peered network and connected to your virtual network over a private link.
55
55
* Be located on the same region as the workspace it's linked to.
56
-
* Allow Azure Monitor to access the storage account. If you chose to allow only select networks to access your storage account, select the exception **Allow trusted Microsoft services to access this storage account.**
56
+
* Allow Azure Monitor to access the storage account. If you chose to allow only select networks to access your storage account, select the exception **Allow trusted Microsoft services to access this storage account**.
57
57
58
58

59
59
@@ -62,24 +62,24 @@ If your workspace handles traffic from other networks, configure the storage acc
62
62
Coordinate the TLS version between the agents and the storage account. We recommend that you send data to Log Analytics by using TLS 1.2 or higher. Review the [platform-specific guidance](./data-security.md#sending-data-securely-using-tls-12). If required, [configure your agents to use TLS 1.2](../agents/agent-windows.md#configure-agent-to-use-tls-12). If that's not possible, configure the storage account to accept TLS 1.0.
63
63
64
64
### Use a customer-managed storage account for CMK data encryption
65
-
Azure Storage encrypts all data at rest in a storage account. By default, it uses Microsoft-managed keys (MMK) to encrypt the data. However, Azure Storage also allows you to use CMK from Azure Key Vault to encrypt your storage data. You can either import your own keys into Key Vault or use the Key Vault APIs to generate keys.
65
+
Azure Storage encrypts all data at rest in a storage account. By default, it uses Microsoft-managed keys (MMKs) to encrypt the data. However, Azure Storage also allows you to use CMKs from Azure Key Vault to encrypt your storage data. You can either import your own keys into Key Vault or use the Key Vault APIs to generate keys.
66
66
67
67
#### CMK scenarios that require a customer-managed storage account
68
68
69
69
A customer-managed storage account is required for:
70
70
71
-
* Encrypting log-alert queries with CMK.
72
-
* Encrypting saved queries with CMK.
71
+
* Encrypting log-alert queries with CMKs.
72
+
* Encrypting saved queries with CMKs.
73
73
74
-
#### Apply CMK to customer-managed storage accounts
74
+
#### Apply CMKs to customer-managed storage accounts
75
75
76
-
Follow this guidance to apply CMK to customer-managed storage accounts.
76
+
Follow this guidance to apply CMKs to customer-managed storage accounts.
77
77
78
78
##### Storage account requirements
79
79
The storage account and the key vault must be in the same region, but they also can be in different subscriptions. For more information about Azure Storage encryption and key management, see [Azure Storage encryption for data at rest](../../storage/common/storage-service-encryption.md).
80
80
81
-
##### Apply CMK to your storage accounts
82
-
To configure your Azure Storage account to use CMK with Key Vault, use the [Azure portal](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), [PowerShell](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), or the [Azure CLI](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json).
81
+
##### Apply CMKs to your storage accounts
82
+
To configure your Azure Storage account to use CMKs with Key Vault, use the [Azure portal](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), [PowerShell](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), or the [Azure CLI](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json).
83
83
84
84
## Link storage accounts to your Log Analytics workspace
85
85
@@ -92,7 +92,7 @@ To configure your Azure Storage account to use CMK with Key Vault, use the [Azur
92
92
> - One storage account for saved log alert queries.
93
93
94
94
### Use the Azure portal
95
-
On the Azure portal, open your workspace menu and select **Linked storage accounts**. A pane shows the linked storage accounts by the use cases previously mentioned (ingestion over Private Link, applying CMK to saved queries or to alerts).
95
+
On the Azure portal, open your workspace menu and select **Linked storage accounts**. A pane shows the linked storage accounts by the use cases previously mentioned (ingestion over Private Link, applying CMKs to saved queries or to alerts).
96
96
97
97

98
98
@@ -106,9 +106,9 @@ You can also link a storage account to your workspace via the [Azure CLI](/cli/a
106
106
107
107
The applicable `dataSourceType` values are:
108
108
109
-
*`CustomLogs`: To use the storage account for custom logs and IIS logs ingestion
110
-
*`Query`: To use the storage account to store saved queries (required for CMK encryption)
111
-
*`Alerts`: To use the storage account to store log-based alerts (required for CMK encryption)
109
+
*`CustomLogs`: To use the storage account for custom logs and IIS logs ingestion.
110
+
*`Query`: To use the storage account to store saved queries (required for CMK encryption).
111
+
*`Alerts`: To use the storage account to store log-based alerts (required for CMK encryption).
112
112
113
113
## Manage linked storage accounts
114
114
@@ -126,8 +126,8 @@ To stop using a storage account, unlink the storage from the workspace. Unlinkin
126
126
### Replace a storage account
127
127
To replace a storage account used for ingestion:
128
128
129
-
1.**Create a link to a new storage account.** The logging agents will get the updated configuration and start sending data to the new storage. The process could take a few minutes.
130
-
2.**Unlink the old storage account so agents will stop writing to the removed account.** The ingestion process keeps reading data from this account until it's all ingested. Don't delete the storage account until you see that all logs were ingested.
129
+
1.**Create a link to a new storage account**. The logging agents will get the updated configuration and start sending data to the new storage. The process could take a few minutes.
130
+
2.**Unlink the old storage account so agents will stop writing to the removed account**. The ingestion process keeps reading data from this account until it's all ingested. Don't delete the storage account until you see that all logs were ingested.
0 commit comments