Skip to content

Commit 90b4b7f

Browse files
author
Thomas Weiss
committed
Additional adjustments
1 parent 5e45b08 commit 90b4b7f

File tree

2 files changed

+6
-5
lines changed

2 files changed

+6
-5
lines changed

articles/cosmos-db/how-to-setup-cmk.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: Learn how to configure customer-managed keys for your Azure Cosmos
44
author: ThomasWeiss
55
ms.service: cosmos-db
66
ms.topic: how-to
7-
ms.date: 01/24/2022
7+
ms.date: 02/08/2022
88
ms.author: thweiss
99
ms.custom: devx-track-azurepowershell
1010
---
@@ -402,7 +402,7 @@ Azure Cosmos DB takes [regular and automatic backups](./online-backup-and-restor
402402
403403
The following conditions are necessary to successfully restore a periodic backup:
404404
- The encryption key that you used at the time of the backup is required and must be available in Azure Key Vault. This means that no revocation was made and the version of the key that was used at the time of the backup is still enabled.
405-
- If you [used a system-assigned managed identity in the Azure Key Vault access policy](#to-use-a-system-assigned-managed-identity) of the source account, you must temporarily grant access to the Azure Cosmos DB first-party identity in that access policy as described [here](#add-access-policy) before restoring your data. Once the data is fully restored to the target account, you can remove the first-party identity from the Key Vault access policy and set your desired identity configuration.
405+
- If you [used a system-assigned managed identity in the Azure Key Vault access policy](#to-use-a-system-assigned-managed-identity) of the source account, you must temporarily grant access to the Azure Cosmos DB first-party identity in that access policy as described [here](#add-access-policy) before restoring your data. This is because a system-assigned managed identity is specific to an account and cannot be re-used in the target account. Once the data is fully restored to the target account, you can set your desired identity configuration and remove the first-party identity from the Key Vault access policy.
406406
407407
### How do customer-managed keys affect continuous backups?
408408
@@ -413,7 +413,7 @@ The following conditions are necessary to successfully perform a point-in-time r
413413
- You must ensure that the user-assigned managed identity originally used on the source account is still declared in the Key Vault access policy.
414414
415415
> [!IMPORTANT]
416-
> If you revoke the encryption key before deleting your account, your account's backup may miss the data written after the revocation has been made.
416+
> If you revoke the encryption key before deleting your account, your account's backup may miss the data written up to 1 hour before the revocation was made.
417417
418418
### How do I revoke an encryption key?
419419

articles/cosmos-db/migrate-continuous-backup.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,8 +30,9 @@ The following are the key reasons to migrate into continuous mode:
3030
>
3131
> * If the account is of type SQL API or API for MongoDB.
3232
> * If the account has a single write region.
33-
> * If the account isn't enabled with customer managed keys(CMK).
3433
> * If the account isn't enabled with analytical store.
34+
>
35+
> If the account is using [customer-managed keys](./how-to-setup-cmk.md), a user-assigned managed identity must be declared in the Key Vault access policy.
3536
3637
## Permissions
3738

@@ -169,7 +170,7 @@ Yes.
169170
#### Which accounts can be targeted for backup migration?
170171
Currently, SQL API and API for MongoDB accounts with single write region, that have shared, provisioned, or autoscale provisioned throughput support migration.
171172

172-
Accounts enabled with analytical storage, multiple-write regions, and Customer Managed Keys(CMK) are not supported for migration.
173+
Accounts enabled with analytical storage and multiple-write regions are not supported for migration.
173174

174175
#### Does the migration take time? What is the typical time?
175176
Migration takes time and it depends on the size of data and the number of regions in your account. You can get the migration status using Azure CLI or PowerShell commands. For large accounts with 10s of terabytes of data, the migration can take up to few days to complete.

0 commit comments

Comments
 (0)