You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/cosmos-db/continuous-backup-restore-introduction.md
+7-2Lines changed: 7 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -95,14 +95,19 @@ For example, if you have 1-TB of data in two regions then:
95
95
96
96
* Restore cost is calculated as (1000 * 0.15) = $150 per restore
97
97
98
+
## Customer-managed keys
99
+
100
+
See [How do customer-managed keys affect continuous backups?](./how-to-setup-cmk.md#how-do-customer-managed-keys-affect-continuous-backups) to learn:
101
+
102
+
- How to configure your Azure Cosmos DB account when using customer-managed keys in conjunction with continous backups.
103
+
- How do customer-managed keys affect restores.
104
+
98
105
## Current limitations
99
106
100
107
Currently the point in time restore functionality has the following limitations:
101
108
102
109
* Only Azure Cosmos DB APIs for SQL and MongoDB are supported for continuous backup. Cassandra, Table, and Gremlin APIs are not yet supported.
103
110
104
-
* Accounts with customer-managed keys are not supported to use continuous backup.
105
-
106
111
* Multi-regions write accounts are not supported.
107
112
108
113
* Azure Synapse Link and periodic backup mode can coexist in the same database account. However, analytical store data isn't included in backups and restores. When Synapse Link is enabled, Azure Cosmos DB will continue to automatically take backups of your data in the transactional store at a scheduled backup interval.
Copy file name to clipboardExpand all lines: articles/cosmos-db/how-to-setup-cmk.md
+23-3Lines changed: 23 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -269,6 +269,9 @@ Because a system-assigned managed identity can only be retrieved after the creat
269
269
270
270
### To use a user-assigned managed identity
271
271
272
+
> [!IMPORTANT]
273
+
> When using a user-assigned managed identity, firewall rules on the Azure Key Vault account aren't currently supported. You must keep your Azure Key Vault account accessible from all networks.
274
+
272
275
1. When creating the new access policy in your Azure Key Vault account as described [above](#add-access-policy), use the `Object ID` of the managed identity you wish to use instead of Azure Cosmos DB's first-party identity.
273
276
274
277
1. When creating your Azure Cosmos DB account, you must enable the user-assigned managed identity and specify that you want to use this identity when accessing your encryption keys in Azure Key Vault. You can do this:
@@ -393,11 +396,28 @@ From the Azure portal, go to your Azure Cosmos account and watch for the **Data
393
396
394
397
You can also programmatically fetch the details of your Azure Cosmos account and look for the presence of the `keyVaultKeyUri` property. See above for ways to do that [in PowerShell](#using-powershell) and [using the Azure CLI](#using-azure-cli).
395
398
396
-
### How do customer-managed keys affect a backup?
399
+
### How do customer-managed keys affect periodic backups?
400
+
401
+
Azure Cosmos DB takes [regular and automatic backups](./online-backup-and-restore.md) of the data stored in your account. This operation backs up the encrypted data.
397
402
398
-
Azure Cosmos DB takes [regular and automatic backups](./online-backup-and-restore.md) of the data stored in your account. This operation backs up the encrypted data. The following conditions are necessary to successfully restore a backup:
403
+
The following conditions are necessary to successfully restore a periodic backup:
399
404
- The encryption key that you used at the time of the backup is required and must be available in Azure Key Vault. This means that no revocation was made and the version of the key that was used at the time of the backup is still enabled.
400
-
- If you [used managed identities in the Azure Key Vault access policy](#using-managed-identity), the identity configured on the source account must not have been deleted and must still be declared in the access policy of the Azure Key Vault instance.
405
+
- If you [used managed identities in the Azure Key Vault access policy](#using-managed-identity) of the source account, you must ensure that the target account will be allowed to access Key Vault as well.
406
+
- If you used a system-assigned managed identity on the source account, the same identity can't be assigned to the target account. You should enable a system-assigned or user-assigned managed identity on the destination account, set this identity as the destination account's default identity, and declare this identity in the Azure Key Vault access policy.
407
+
- If you used a user-assigned managed identity on the source account, assign the same identity to the destination account and set this identity as the destination account's default identity.
408
+
409
+
### How do customer-managed keys affect continuous backups?
410
+
411
+
Azure Cosmos DB gives you the option to configure [continuous backups](./continuous-backup-restore-introduction.md) on your account. With continuous backups, you can restore your data to any point in time within the past 30 days. To use continuous backups on an account where customer-managed keys are enabled, you must [use a user-assigned managed identity](#to-use-a-user-assigned-managed-identity) in the Key Vault access policy; the Azure Cosmos DB first-party identity or a system-assigned managed identity aren't currently supported.
412
+
413
+
The following conditions are necessary to successfully perform a point-in-time restore:
414
+
- The encryption key that you used at the time of the backup is required and must be available in Azure Key Vault. This means that no revocation was made and the version of the key that was used at the time of the backup is still enabled.
415
+
- You must ensure that the target account will be allowed to access Key Vault as well.
416
+
- If you used a system-assigned managed identity on the source account, the same identity can't be assigned to the target account. You should enable a system-assigned or user-assigned managed identity on the destination account, set this identity as the destination account's default identity, and declare this identity in the Azure Key Vault access policy.
417
+
- If you used a user-assigned managed identity on the source account, assign the same identity to the destination account and set this identity as the destination account's default identity.
418
+
419
+
> [!IMPORTANT]
420
+
> If you revoke the encryption key before deleting your account, your account's backup may miss the data written after the revocation has been made.
0 commit comments