Skip to content

Commit a2b5b2d

Browse files
authored
Merge pull request #116343 from yossi-y/master
Added new asynchronous states
2 parents 4a385a8 + 7725f31 commit a2b5b2d

File tree

1 file changed

+28
-9
lines changed

1 file changed

+28
-9
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 28 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -31,15 +31,11 @@ The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure
3131

3232
## How CMK works in Azure Monitor
3333

34-
Azure Monitor leverages system-assigned managed identity to grant access
35-
to your Azure Key Vault. System-assigned managed identity can only be
36-
associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level. This
37-
dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics
38-
*Cluster* resource performs as an intermediate identity connection
39-
between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the
40-
managed identity that\'s associated with the *Cluster* resource to
41-
authenticate to your Azure Key Vault via Azure Active Directory. 
42-
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault. You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
34+
Azure Monitor leverages system-assigned managed identity to grant access to your Azure Key Vault.
35+
System-assigned managed identity can only be associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level -- This dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics *Cluster* resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the managed identity that\'s associated with the *Cluster* resource to authenticate to your Azure Key Vault via Azure Active Directory.
36+
37+
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault. You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
38+
4339

4440
![CMK Overview](media/customer-managed-keys/cmk-overview-8bit.png)
4541

@@ -128,6 +124,29 @@ Operation is in progress
128124
}
129125
```
130126

127+
Key identifier update operation is in progress
128+
```json
129+
{
130+
"id": "Azure-AsyncOperation URL value from the GET operation",
131+
"name": "operation-id",
132+
"status" : "Updating",
133+
"startTime": "2017-01-06T20:56:36.002812+00:00",
134+
"endTime": "2017-01-06T20:56:56.002812+00:00",
135+
}
136+
```
137+
138+
*Cluster* resource delete is in progress -- When you delete a *Cluster* resource that has workspaces associated workspaces, a disassociation operation is performed for each of the workspaces in asynchronous operations that can take a while.
139+
This isn’t relevant when you delete a *Cluster* with no associated workspace -- In this case the *Cluster* resource is deleted immediately.
140+
```json
141+
{
142+
"id": "Azure-AsyncOperation URL value from the GET operation",
143+
"name": "operation-id",
144+
"status" : "Deleting",
145+
"startTime": "2017-01-06T20:56:36.002812+00:00",
146+
"endTime": "2017-01-06T20:56:56.002812+00:00",
147+
}
148+
```
149+
131150
Operation is completed
132151
```json
133152
{

0 commit comments

Comments
 (0)