You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The procedure is not supported in the UI currently and the provisioning process is performed via REST API.
115
115
@@ -142,13 +142,13 @@ You can acquire the token using one of these methods:
142
142
CMK capability is an early access feature. The subscriptions where you plan to create *Cluster* resources must be whitelisted beforehand by the Azure product group. Use your contacts into Microsoft to provide your Subscriptions IDs.
143
143
144
144
> [!IMPORTANT]
145
-
> CMK capability is regional. Your Azure Key Vault, Storage Account, *Cluster* resource and associated Log Analytics workspaces must be in the same region, but they can be in different subscriptions.
145
+
> CMK capability is regional. Your Azure Key Vault, *Cluster* resource and associated Log Analytics workspaces must be in the same region, but they can be in different subscriptions.
146
146
147
147
### Storing encryption key (KEK)
148
148
149
-
Create an Azure Key Vault resource, then generate or import a key to be used for data encryption.
149
+
Create or use an Azure Key Vault that you already have, to generate or import a key to be used for data encryption.
150
150
151
-
The Azure Key Vault must be configured as recoverable to protect your key and the access to your Azure Monitor data.
151
+
The Azure Key Vault must be configured as recoverable to protect your key and the access to your data in Azure Monitor.
152
152
153
153
These settings are available via CLI and PowerShell:
@@ -157,9 +157,11 @@ These settings are available via CLI and PowerShell:
157
157
158
158
### Create *Cluster* resource
159
159
160
-
This resource is used as intermediate identity connection between your Key Vault and your workspaces. After you receive confirmation that your subscriptions were whitelisted, create a Log Analytics *Cluster* resource at the region where your workspaces are located. Application Insights and Log Analytics require separate Cluster resources. The type of the *Cluster* resource is defined at creation time by setting the “clusterType” property to either ‘LogAnalytics’, or ‘ApplicationInsights’. The Cluster resource type can’t be altered.
160
+
This resource is used as an intermediate identity connection between your Key Vault and your workspaces. After you receive confirmation that your subscriptions were whitelisted, create a Log Analytics *Cluster* resource at the region where your workspaces are located. Application Insights and Log Analytics require separate *Cluster* resources types. The type of the *Cluster* resource is defined at creation time by setting the "clusterType" property to either "LogAnalytics", or "ApplicationInsights". The Cluster resource type can’t be altered after.
161
161
162
-
For Application Insights CMK configuration, follow the Appendix content for this step.
162
+
For Application Insights CMK configuration, follow the Appendix content.
163
+
164
+
You must specify the capacity reservation level (sku) for the *Cluster* resource. The capacity reservation level can be in the range of 1000 to 2000 and in steps of 100. If you need capacity reservation level higher than 2000, reach your Microsoft contact to enable it. This property doesn’t affect billing currently -- once pricing model for dedicated cluster is introduced, billing will apply to any existing CMK deployments.
During the early access period of the feature, the ADX cluster is provisioned manually by the product team once the previous steps are completed. Use your Microsoft channel to provide the *Cluster* resource details. Copy the JSON response from the *Cluster* resource GET REST API:
202
+
During the early access period of the feature, the ADX cluster is provisioned manually by the product team once the previous steps are completed. Use your Microsoft channel to provide the *Cluster* resource details.
203
+
204
+
> [!IMPORTANT]
205
+
> Copy and provide the JSON response of the *Cluster* resource GET REST API
206
+
> You will need details from this response for later steps too
198
207
199
208
```rst
200
209
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
"principal-id" is a GUID generated by the managed identity service for the *Cluster* resource.
225
239
226
-
> [!IMPORTANT]
227
-
> Copy and keep the "principal-id" value since you will need it in next steps.
228
-
229
-
230
240
### Grant Key Vault permissions
231
241
232
-
> [!IMPORTANT]
233
-
> This step should be carried after you received confirmation from the product group through your Microsoft channel that the Azure Monitor data-store (ADX cluster) provisioning was fulfilled. Updating the Key Vault access policy prior to this provisioning may fail.
234
-
235
-
Update your Key Vault with a new access policy that grant permissions to your *Cluster* resource. These permissions are used by the underlaying Azure Monitor Storage for data encryption.
236
-
Open your Key Vault in Azure portal and click "Access Policies" then "+ Add Access Policy" to create a new policy with these settings:
242
+
Update your Key Vault with a new access policy that grants permissions to your *Cluster* resource. These permissions are used by the underlay Azure Monitor Storage for data encryption. Open your Key Vault in Azure portal and click "Access Policies" then "+ Add Access Policy" to create a policy with these settings:
- Select principal: enter the principal-id value that returned in the response in the previous step.
@@ -244,7 +250,9 @@ The *Get* permission is required to verify that your Key Vault is configured as
244
250
245
251
### Update Cluster resource with Key identifier details
246
252
247
-
This step applies for future key version updates in your Key Vault. Update the *Cluster* resource with Key Vault *Key identifier* details, to allow Azure Monitor Storage to use the new key version. Select the current version of your key in Azure Key Vault to get the Key identifier details.
253
+
This step applies per initial and future key version updates in your Key Vault. It informs Azure Monitor Storage about the new key version.
254
+
255
+
To update the *Cluster* resource with your Key Vault *Key identifier* details, select the current version of your key in Azure Key Vault to get the Key identifier details.
> This step should be carried **ONLY** after you received confirmation
307
-
> from the product group through your Microsoft channel that the
308
-
> **Azure Monitor data-store (ADX cluster) provisioning** was
309
-
> fulfilled. If you associate workspaces and ingest data prior to this
310
-
> **provisioning**, the data will be dropped and won't be recoverable.
313
+
> [!IMPORTANT]
314
+
> This step should be carried after the ADX cluster provisioning. If you associate workspaces and ingest data prior to the provisioning, ingested data before the provisioning will be dropped and won't be recoverable.
315
+
> To verify that the ADX cluster is provisioned and you can start associating workspaces to it, execute the this REST API and check that "provisioningState" value in the response is "Succeeded".
316
+
317
+
```rst
318
+
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
For Application Insights CMK configuration, follow the Appendix content for this step.
313
348
314
-
You need to have ‘write’ permissions on both your workspace and *Cluster* resource to perform this operation, which include these actions:
349
+
You need to have 'write' permissions to both your workspace and *Cluster* resource to perform this operation, which include these actions:
315
350
316
351
- In workspace: Microsoft.OperationalInsights/workspaces/write
317
352
- In *Cluster* resource: Microsoft.OperationalInsights/clusters/write
318
353
354
+
**Associate a workspace**
319
355
```rst
320
356
PUT https://management.azure.com/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>/linkedservices/cluster?api-version=2019-08-01-preview
321
357
Authorization: Bearer <token>
@@ -595,11 +631,47 @@ Identity is assigned to the *Cluster* resource at creation time.
595
631
596
632
### Associate a component to a *Cluster* resource using [Components - Create Or Update](https://docs.microsoft.com/rest/api/application-insights/components/createorupdate) API
597
633
598
-
You need to have ‘write’ permissions on both your component and *Cluster* resource to perform this operation, which include these actions:
634
+
You need to have 'write' permissions on both your component and *Cluster* resource to perform this operation, which include these actions:
599
635
600
636
- In component: Microsoft.Insights/component/write
601
637
- In *Cluster* resource: Microsoft.OperationalInsights/clusters/write
602
638
639
+
> [!IMPORTANT]
640
+
> This step should be carried after the ADX cluster provisioning. If you associate a component and ingest data prior to the provisioning, ingested data before the provisioning will be dropped and won't be recoverable.
641
+
> To verify that the ADX cluster is provisioned and you can start associating component to it, execute the this REST API and check that "provisioningState" value in the response is "Succeeded".
642
+
643
+
```rst
644
+
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
PUT https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Insights/components/<component-name>?api-version=2015-05-01
0 commit comments