Skip to content

Commit 91317bb

Browse files
committed
fix naming issues
1 parent 7ab8166 commit 91317bb

File tree

2 files changed

+25
-25
lines changed

2 files changed

+25
-25
lines changed

articles/mysql/howto-data-encryption-troubleshoot.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,36 @@
11
---
2-
title: Troubleshoot data encryption on Azure Database for MySQL
3-
description: Learn how to troubleshoot data encryption for your Azure Database for MySQL
2+
title: Troubleshoot data encryption in Azure Database for MySQL
3+
description: Learn how to troubleshoot data encryption in Azure Database for MySQL
44
author: kummanish
55
ms.author: manishku
66
ms.service: mysql
77
ms.topic: conceptual
88
ms.date: 02/13/2020
99
---
1010

11-
# Troubleshoot data encryption with customer-managed keys in Azure Database for MySQL
11+
# Troubleshoot data encryption in Azure Database for MySQL
1212

13-
This article describes how to identify and resolve common issues that can occur on an Azure Database for MySQL configured with data encryption using a customer-managed key.
13+
This article describes how to identify and resolve common issues that can occur in Azure Database for MySQL when configured with data encryption using a customer-managed key.
1414

1515
## Introduction
1616

1717
When you configure data encryption to use a customer-managed key in Azure Key Vault, servers require continuous access to the key. If the server loses access to the customer-managed key in Azure Key Vault, it will deny all connections, return the appropriate error message, and change its state to ***Inaccessible*** in the Azure portal.
1818

19-
If you no longer need an inaccessible Azure Database for MySQL server, you can delete it to stop incurring costs. No other actions on the server are permitted until access to the Azure Key Vault has been restored and the server is available. It's also not possible to change the data encryption option from `Yes`(customer-managed) to `No` (service-managed) on an inaccessible server when it's encrypted with a customer-managed key. You'll have to revalidate the key manually before the server is accessible again. This action is necessary to protect the data from unauthorized access while permissions to the customer-managed key are revoked.
19+
If you no longer need an inaccessible Azure Database for MySQL server, you can delete it to stop incurring costs. No other actions on the server are permitted until access to the key vault has been restored and the server is available. It's also not possible to change the data encryption option from `Yes`(customer-managed) to `No` (service-managed) on an inaccessible server when it's encrypted with a customer-managed key. You'll have to revalidate the key manually before the server is accessible again. This action is necessary to protect the data from unauthorized access while permissions to the customer-managed key are revoked.
2020

2121
## Common errors that cause the server to become inaccessible
2222

23-
Most issues that occur when you use data encryption with Azure Key Vault are caused by one of the following misconfigurations:
23+
The following misconfigurations cause most issues with data encryption that use Azure Key Vault keys:
2424

2525
- The key vault is unavailable or doesn't exist:
2626
- The key vault was accidentally deleted.
2727
- An intermittent network error causes the key vault to be unavailable.
2828

2929
- You don't have permissions to access the key vault or the key doesn't exist:
3030
- The key expired or was accidentally deleted or disabled.
31-
- The Azure Database for MySQL instance-managed identity was accidentally deleted.
32-
- Permissions granted to the Azure Database for MySQL server-managed identity for the keys aren't sufficient. For example, the permissions don't include Get, Wrap, and Unwrap.
33-
- Permissions for the Azure Database for MySQL server instance-managed identity were revoked.
31+
- The managed identity of the Azure Database for MySQL instance was accidentally deleted.
32+
- Insufficient key permissions are granted to the managed identity of Azure Database for MySQL instance. For example, the permissions don't include Get, Wrap, and Unwrap.
33+
- The managed identity permissions to the Azure Database for MySQL instance were revoked or deleted.
3434

3535
## Identify and resolve common errors
3636

@@ -44,13 +44,13 @@ Most issues that occur when you use data encryption with Azure Key Vault are cau
4444
#### Missing key vault permissions
4545

4646
- `AzureKeyVaultMissingPermissionsMessage`
47-
- The server doesn't have the required Get, Wrap, and Unwrap permissions to the Azure Key Vault permissions. Grant any missing permissions to the service principal with ID.
47+
- **Explanation**: The server doesn't have the required Get, Wrap, and Unwrap permissions to the Azure Key Vault. Grant any missing permissions to the service principal with ID.
4848

4949
### Mitigation
5050

51-
- Confirm that the customer-managed key is present in Key Vault.
51+
- Confirm that the customer-managed key is present in the key vault.
5252
- Identify the key vault, then go to the key vault in the Azure portal.
53-
- Ensure that the key identified by the key URI is present.
53+
- Ensure that the key URI identifies a key that is present.
5454

5555
## Next steps
5656

articles/postgresql/howto-data-encryption-troubleshoot.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,36 +1,36 @@
11
---
2-
title: Troubleshoot data encryption on Azure Database for PostgreSQL - single server
3-
description: Learn how to troubleshoot the data encryption on your Azure Database for PostgreSQL - single server
2+
title: Troubleshoot data encryption in Azure Database for PostgreSQL (single-server deployment)
3+
description: Learn how to troubleshoot the data encryption on your Azure Database for PostgreSQL (single-server deployment)
44
author: kummanish
55
ms.author: manishku
66
ms.service: postgresql
77
ms.topic: conceptual
88
ms.date: 02/13/2020
99
---
1010

11-
# Troubleshoot data encryption with customer-managed keys in Azure Database for PostgreSQL - single server
11+
# Troubleshoot data encryption in Azure Database for PostgreSQL (single-server deployment)
1212

13-
This article describes how to identify and resolve common issues that can occur on an Azure Database for PostgreSQL - single server configured with data encryption using customer-managed key.
13+
This article describes how to identify and resolve common issues that can occur in Azure Database for PostgreSQL (single-server deployment) when configured with data encryption using a customer-managed key.
1414

1515
## Introduction
1616

17-
When you configure data encryption to use a customer-managed key in Azure Key Vault, servers require continuous access to the key. If the server loses access to the customer-managed key in Azure Key Vault, it will deny all connections, return the appropriate error message, and change its state to ***Inaccessible*** in the Azure portal.
17+
When you configure data encryption to use a customer-managed key in Azure Key Vault, the server requires continuous access to the key. If the server loses access to the customer-managed key in Azure Key Vault, it will deny all connections, return the appropriate error message, and change its state to ***Inaccessible*** in the Azure portal.
1818

19-
If you no longer need an inaccessible Azure Database for PostgreSQL - single server, you can delete it to stop incurring costs. No other actions on the server are permitted until access to the Azure Key Vault has been restored and the server is available. It's also not possible to change the data encryption option from `Yes`(customer-managed) to `No` (service-managed) on an inaccessible server when it's encrypted with a customer-managed key. You'll have to revalidate the key manually before the server is accessible again. This action is necessary to protect the data from unauthorized access while permissions to the customer-managed key are revoked.
19+
If you no longer need an inaccessible Azure Database for PostgreSQL server, you can delete it to stop incurring costs. No other actions on the server are permitted until access to the key vault has been restored and the server is available. It's also not possible to change the data encryption option from `Yes`(customer-managed) to `No` (service-managed) on an inaccessible server when it's encrypted with a customer-managed key. You'll have to revalidate the key manually before the server is accessible again. This action is necessary to protect the data from unauthorized access while permissions to the customer-managed key are revoked.
2020

2121
## Common errors causing server to become inaccessible
2222

23-
Most issues that occur when you use data encryption with Azure Key Vault are caused by one of the following misconfigurations:
23+
The following misconfigurations cause most issues with data encryption that use Azure Key Vault keys:
2424

2525
- The key vault is unavailable or doesn't exist:
2626
- The key vault was accidentally deleted.
2727
- An intermittent network error causes the key vault to be unavailable.
2828

2929
- You don't have permissions to access the key vault or the key doesn't exist:
3030
- The key expired or was accidentally deleted or disabled.
31-
- The Azure Database for PostgreSQL - single server instance-managed identity was accidentally deleted.
32-
- Permissions granted to the Azure Database for PostgreSQL managed identity for the keys aren't sufficient. For example, the permissions don't include Get, Wrap, and Unwrap.
33-
- Permissions for the Azure Database for PostgreSQL - single-server instance-managed identity were revoked or deleted.
31+
- The managed identity of the Azure Database for PostgreSQL instance was accidentally deleted.
32+
- Insufficient key permissions are granted to the managed identity of the Azure Database for PostgreSQL instance. For example, the permissions don't include Get, Wrap, and Unwrap.
33+
- The managed identity permissions to the Azure Database for PostgreSQL instance were revoked or deleted.
3434

3535
## Identify and resolve common errors
3636

@@ -44,13 +44,13 @@ Most issues that occur when you use data encryption with Azure Key Vault are cau
4444
#### Missing key vault permissions
4545

4646
- `AzureKeyVaultMissingPermissionsMessage`
47-
- The server doesn't have the required Get, Wrap, and Unwrap permissions to the Azure Key Vault permissions. Grant any missing permissions to the service principal with ID.
47+
- **Explanation**: The server doesn't have the required Get, Wrap, and Unwrap permissions to the Azure Key Vault. Grant any missing permissions to the service principal with ID.
4848

4949
### Mitigation
5050

51-
- Confirm that the customer-managed key is present in Key Vault.
51+
- Confirm that the customer-managed key is present in the key vault.
5252
- Identify the key vault, then go to the key vault in the Azure portal.
53-
- Ensure that the key identified by the key URI is present.
53+
- Ensure that the key URI identifies a key that is present.
5454

5555
## Next steps
5656

0 commit comments

Comments
 (0)