You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/customer-managed-keys.md
+28-9Lines changed: 28 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,15 +31,11 @@ The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure
31
31
32
32
## How CMK works in Azure Monitor
33
33
34
-
Azure Monitor leverages system-assigned managed identity to grant access
35
-
to your Azure Key Vault. System-assigned managed identity can only be
36
-
associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level. This
37
-
dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics
38
-
*Cluster* resource performs as an intermediate identity connection
39
-
between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the
40
-
managed identity that\'s associated with the *Cluster* resource to
41
-
authenticate to your Azure Key Vault via Azure Active Directory.
42
-
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault. You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
34
+
Azure Monitor leverages system-assigned managed identity to grant access to your Azure Key Vault.
35
+
System-assigned managed identity can only be associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level -- This dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics *Cluster* resource performs as an intermediate identity connection between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the managed identity that\'s associated with the *Cluster* resource to authenticate to your Azure Key Vault via Azure Active Directory.
36
+
37
+
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault. You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
"id": "Azure-AsyncOperation URL value from the GET operation",
131
+
"name": "operation-id",
132
+
"status" : "Updating",
133
+
"startTime": "2017-01-06T20:56:36.002812+00:00",
134
+
"endTime": "2017-01-06T20:56:56.002812+00:00",
135
+
}
136
+
```
137
+
138
+
*Cluster* resource delete is in progress -- When you delete a *Cluster* resource that has workspaces associated workspaces, a disassociation operation is performed for each of the workspaces in asynchronous operations that can take a while.
139
+
This isn’t relevant when you delete a *Cluster* with no associated workspace -- In this case the *Cluster* resource is deleted immediately.
140
+
```json
141
+
{
142
+
"id": "Azure-AsyncOperation URL value from the GET operation",
0 commit comments