Skip to content

Commit 8527dc5

Browse files
authored
Update private-storage.md
1 parent 4329582 commit 8527dc5

File tree

1 file changed

+14
-14
lines changed

1 file changed

+14
-14
lines changed

articles/azure-monitor/logs/private-storage.md

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ For the storage account to successfully connect to your private link, it must:
5353

5454
* Be located on your virtual network or a peered network and connected to your virtual network over a private link.
5555
* Be located on the same region as the workspace it's linked to.
56-
* Allow Azure Monitor to access the storage account. If you chose to allow only select networks to access your storage account, select the exception **Allow trusted Microsoft services to access this storage account.**
56+
* Allow Azure Monitor to access the storage account. If you chose to allow only select networks to access your storage account, select the exception **Allow trusted Microsoft services to access this storage account**.
5757

5858
![Screenshot that shows Storage account trust Microsoft services.](./media/private-storage/storage-trust.png)
5959

@@ -62,24 +62,24 @@ If your workspace handles traffic from other networks, configure the storage acc
6262
Coordinate the TLS version between the agents and the storage account. We recommend that you send data to Log Analytics by using TLS 1.2 or higher. Review the [platform-specific guidance](./data-security.md#sending-data-securely-using-tls-12). If required, [configure your agents to use TLS 1.2](../agents/agent-windows.md#configure-agent-to-use-tls-12). If that's not possible, configure the storage account to accept TLS 1.0.
6363

6464
### Use a customer-managed storage account for CMK data encryption
65-
Azure Storage encrypts all data at rest in a storage account. By default, it uses Microsoft-managed keys (MMK) to encrypt the data. However, Azure Storage also allows you to use CMK from Azure Key Vault to encrypt your storage data. You can either import your own keys into Key Vault or use the Key Vault APIs to generate keys.
65+
Azure Storage encrypts all data at rest in a storage account. By default, it uses Microsoft-managed keys (MMKs) to encrypt the data. However, Azure Storage also allows you to use CMKs from Azure Key Vault to encrypt your storage data. You can either import your own keys into Key Vault or use the Key Vault APIs to generate keys.
6666

6767
#### CMK scenarios that require a customer-managed storage account
6868

6969
A customer-managed storage account is required for:
7070

71-
* Encrypting log-alert queries with CMK.
72-
* Encrypting saved queries with CMK.
71+
* Encrypting log-alert queries with CMKs.
72+
* Encrypting saved queries with CMKs.
7373

74-
#### Apply CMK to customer-managed storage accounts
74+
#### Apply CMKs to customer-managed storage accounts
7575

76-
Follow this guidance to apply CMK to customer-managed storage accounts.
76+
Follow this guidance to apply CMKs to customer-managed storage accounts.
7777

7878
##### Storage account requirements
7979
The storage account and the key vault must be in the same region, but they also can be in different subscriptions. For more information about Azure Storage encryption and key management, see [Azure Storage encryption for data at rest](../../storage/common/storage-service-encryption.md).
8080

81-
##### Apply CMK to your storage accounts
82-
To configure your Azure Storage account to use CMK with Key Vault, use the [Azure portal](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), [PowerShell](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), or the [Azure CLI](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json).
81+
##### Apply CMKs to your storage accounts
82+
To configure your Azure Storage account to use CMKs with Key Vault, use the [Azure portal](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), [PowerShell](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json), or the [Azure CLI](../../storage/common/customer-managed-keys-configure-key-vault.md?toc=%252fazure%252fstorage%252fblobs%252ftoc.json).
8383

8484
## Link storage accounts to your Log Analytics workspace
8585

@@ -92,7 +92,7 @@ To configure your Azure Storage account to use CMK with Key Vault, use the [Azur
9292
> - One storage account for saved log alert queries.
9393
9494
### Use the Azure portal
95-
On the Azure portal, open your workspace menu and select **Linked storage accounts**. A pane shows the linked storage accounts by the use cases previously mentioned (ingestion over Private Link, applying CMK to saved queries or to alerts).
95+
On the Azure portal, open your workspace menu and select **Linked storage accounts**. A pane shows the linked storage accounts by the use cases previously mentioned (ingestion over Private Link, applying CMKs to saved queries or to alerts).
9696

9797
![Screenshot that shows the Linked storage accounts pane.](./media/private-storage/all-linked-storage-accounts.png)
9898

@@ -106,9 +106,9 @@ You can also link a storage account to your workspace via the [Azure CLI](/cli/a
106106

107107
The applicable `dataSourceType` values are:
108108

109-
* `CustomLogs`: To use the storage account for custom logs and IIS logs ingestion
110-
* `Query`: To use the storage account to store saved queries (required for CMK encryption)
111-
* `Alerts`: To use the storage account to store log-based alerts (required for CMK encryption)
109+
* `CustomLogs`: To use the storage account for custom logs and IIS logs ingestion.
110+
* `Query`: To use the storage account to store saved queries (required for CMK encryption).
111+
* `Alerts`: To use the storage account to store log-based alerts (required for CMK encryption).
112112

113113
## Manage linked storage accounts
114114

@@ -126,8 +126,8 @@ To stop using a storage account, unlink the storage from the workspace. Unlinkin
126126
### Replace a storage account
127127
To replace a storage account used for ingestion:
128128

129-
1. **Create a link to a new storage account.** The logging agents will get the updated configuration and start sending data to the new storage. The process could take a few minutes.
130-
2. **Unlink the old storage account so agents will stop writing to the removed account.** The ingestion process keeps reading data from this account until it's all ingested. Don't delete the storage account until you see that all logs were ingested.
129+
1. **Create a link to a new storage account**. The logging agents will get the updated configuration and start sending data to the new storage. The process could take a few minutes.
130+
2. **Unlink the old storage account so agents will stop writing to the removed account**. The ingestion process keeps reading data from this account until it's all ingested. Don't delete the storage account until you see that all logs were ingested.
131131

132132
### Maintain storage accounts
133133

0 commit comments

Comments
 (0)