You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#Customer intent: As an engineer responsible for business continuity, I want to understand the details of how Azure Key Vault works from a reliability perspective and plan disaster recovery strategies in alignment with the exact processes that Azure services follow during different kinds of situations.
11
11
---
12
12
@@ -20,58 +20,66 @@ Azure Key Vault is a cloud service that provides a secure store for secrets, suc
20
20
21
21
## Production deployment recommendations
22
22
23
-
For production deployments of Azure Key Vault, we recommend:
23
+
For production deployments of Azure Key Vault, we recommend that you:
24
24
25
-
-Using Standard or Premium tier key vaults
26
-
-Enabling soft delete and purge protection to prevent accidental or malicious deletion
25
+
-Use Standard or Premium tier key vaults
26
+
-Enable soft delete and purge protection to prevent accidental or malicious deletion
27
27
- For critical workloads, consider implementing multi-region strategies as described in this guide
28
28
29
29
## Reliability architecture overview
30
30
31
-
Azure Key Vault achieves redundancy by replicating your key vault and its contents within the region to ensure high durability and availability of your keys, secrets, and certificates.
31
+
To ensure high durability and availability of your keys, secrets, and certificates in the event of a hardware failure or network outage, Key Vault provides multiple layers of redundancy to maintain availability during:
32
32
33
-
By default, the contents of your key vault are replicated within the region. If the region has a [paired region](./regions-list.md) and that paired region is in the same geography as the primary region, the contents are also replicated to the paired region. This approach ensures high durability of your keys and secrets, protecting against hardware failures, network outages, or localized disasters.
34
-
35
-
Key Vault provides multiple layers of redundancy to maintain availability during:
36
33
- Hardware failures
37
34
- Network outages
38
35
- Localized disasters
39
36
- Maintenance activities
40
37
38
+
By default, Azure Key Vault achieves redundancy by replicating your key vault and its contents within the region.
39
+
40
+
In addition, if the region has a [paired region](./regions-list.md) and that paired region is in the same geography as the primary region, the contents are also replicated to the paired region. This approach ensures high durability of your keys and secrets, protecting against hardware failures, network outages, or localized disasters.
41
+
42
+
<!-- John: I am assuming that the paired region replication is by default as well?-->
Client applications should implement retry logic when interacting with Key Vault to handle any transient failures that might occur. Some best practices include:
50
+
To handle any transient failures that might occur, your client applications should implement retry logic when interacting with Key Vault. Some best practices include:
46
51
47
-
- Use the [Azure SDKs](https://azure.microsoft.com/downloads/), which typically include built-in retry mechanisms
48
-
- If your clients connect directly to Key Vault, implement exponential backoff retry policies
49
-
- Cache secrets in memory when possible to reduce direct requests to Key Vault
50
-
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling
52
+
- Use the [Azure SDKs](https://azure.microsoft.com/downloads/), which typically include built-in retry mechanisms.
53
+
- If your clients connect directly to Key Vault, implement exponential backoff retry policies.
54
+
- Cache secrets in memory when possible to reduce direct requests to Key Vault.
55
+
- Monitor for throttling errors, as exceeding Key Vault service limits will cause throttling.
51
56
52
57
If you're using Key Vault in high-throughput scenarios, consider distributing your operations across multiple key vaults to avoid throttling limits. Azure Key Vault has specific guidance for these scenarios:
53
58
54
-
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys)
55
-
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions
56
-
- A subscription-wide limit for all transaction types is five times the individual key vault limit
57
-
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults)
58
-
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material
59
+
- A high-throughput scenario is one that approaches or exceeds the [service limits](/azure/key-vault/general/service-limits) for Key Vault operations (for example, 200 operations per second for software-protected keys).
60
+
- For high-throughput workloads, divide your Key Vault traffic among multiple vaults and different regions.
61
+
- A subscription-wide limit for all transaction types is five times the individual key vault limit.
62
+
- Use a separate vault for each security/availability domain (for example, if you have five apps in two regions, consider using 10 vaults).
63
+
- For public-key operations such as encryption, wrapping, and verification, perform these operations locally by caching the public key material.
59
64
60
65
For comprehensive throttling guidance, see [Azure Key Vault throttling guidance](/azure/key-vault/general/overview-throttling).
61
66
62
67
## Availability zone support
63
68
64
69
[!INCLUDE [AZ support description](includes/reliability-availability-zone-description-include.md)]
65
70
66
-
Azure Key Vault automatically provides zone redundancy in regions with availability zones available, providing high availability within a region without requiring any specific configuration. When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability. For more information, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
71
+
Azure Key Vault automatically provides zone redundancy in [regions that support availability zones](./regions-list.md), providing high availability within a region without requiring any specific configuration.
72
+
73
+
74
+
When an availability zone becomes unavailable, Azure Key Vault automatically redirects your requests to other healthy availability zones to ensure high availability.
67
75
68
76
### Region support
69
77
70
-
Azure Key Vault is available in [all Azure regions that support availability zones](./regions-list.md). Key Vault enables zone redundancy automatically in these regions.
78
+
Azure Key Vault enables zone redundancy by default in [all Azure regions that support availability zones](./regions-list.md).
71
79
72
80
### Requirements
73
81
74
-
All Key Vault SKUs (Standard and Premium) support the same level of availability and resiliency. There are no specific tier requirements to achieve zone resilience with Azure Key Vault.
82
+
All Key Vault SKUs (Standard and Premium) support the same level of availability and resiliency. There aren't any tier-specific requirements to achieve zone resilience.
75
83
76
84
### Cost
77
85
@@ -99,7 +107,10 @@ The following section describes what to expect when key vaults are in a region w
99
107
100
108
-**Expected downtime:** For read operations, there should be minimal to no downtime during a zone failure. Write operations might experience temporary unavailability while the service adjusts to the zone failure. Read operations are expected to remain available during zone failures.
101
109
102
-
-**Traffic rerouting:** Key Vault automatically reroutes traffic away from the affected zone to healthy zones without requiring any customer intervention.
110
+
-**Traffic rerouting:** Key Vault automatically reroutes traffic away from the affected zone to healthy zones without requiring any customer intervention.
111
+
112
+
113
+
For more information on the zone-down experience, see [Failover within a region](/azure/key-vault/general/disaster-recovery-guidance#failover-within-a-region) in the Key Vault availability and redundancy documentation.
103
114
104
115
### Failback
105
116
@@ -171,20 +182,20 @@ There are situations where the Microsoft-managed cross-region failover capabilit
171
182
172
183
You can design a custom cross-region failover solution. One approach is to:
173
184
174
-
1. Create separate key vaults in different regions
175
-
1. Use the backup and restore functionality to maintain consistent secrets across regions
176
-
1. Implement application-level logic to fail over between key vaults
185
+
1. Create separate key vaults in different regions.
186
+
1. Use the backup and restore functionality to maintain consistent secrets across regions.
187
+
1. Implement application-level logic to fail over between key vaults.
177
188
178
189
## Backups
179
190
180
191
Azure Key Vault provides the ability to back up and restore individual secrets, keys, and certificates. Backups are intended to provide you with an offline copy of your secrets in the unlikely event that you lose access to your key vault.
181
192
182
193
Key points about the backup functionality:
183
194
184
-
- Backups create encrypted blobs that can't be decrypted outside of Azure
185
-
- Backups can only be restored to a key vault within the same Azure subscription and Azure geography
186
-
- There's a limitation of backing up no more than 500 past versions of a key, secret, or certificate object
187
-
- Backups are point-in-time snapshots and don't automatically update when secrets change
195
+
- Backups create encrypted blobs that can't be decrypted outside of Azure.
196
+
- Backups can only be restored to a key vault within the same Azure subscription and Azure geography.
197
+
- There's a limitation of backing up no more than 500 past versions of a key, secret, or certificate object.
198
+
- Backups are point-in-time snapshots and don't automatically update when secrets change.
188
199
189
200
For most solutions, you shouldn't rely exclusively on backups. Instead, use the other capabilities described in this guide to support your resiliency requirements. However, backups protect against some risks that other approaches don't, such as accidental deletion of specific secrets.
0 commit comments