You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This article provides background information and steps to configure Customer-Managed Keys (CMK) your Log Analytics workspaces and Application Insights components. Once configured, any data sent to your workspaces is encrypted with your Azure Key Vault key.
@@ -50,7 +49,7 @@ The Azure Monitor use of encryption is identical to the way
50
49
operates.
51
50
52
51
The frequency that Azure Monitor Storage accesses Key Vault for wrap and
53
-
unwrap operations is between 6 to 60 seconds. Azure Monitor Storage
52
+
unwrap operations is between 6 to 60 seconds. Azure Monitor Storage
54
53
always respects changes in key permissions within an hour.
55
54
56
55
## How CMK works in Azure Monitor
@@ -424,45 +423,44 @@ with Key Identifier details" step.
424
423
in Azure Monitor shortly after, the key won't be accessible by Azure
425
424
Monitor Storage.
426
425
427
-
Limitations and constraints
428
-
===========================
426
+
## Limitations and constraints
429
427
430
-
-The CMK feature is supported at ADX cluster level and requires a
428
+
- The CMK feature is supported at ADX cluster level and requires a
431
429
dedicated Azure Monitor ADX cluster
432
430
433
-
-The max number of *Cluster* resources per subscription is limited to 5
431
+
- The max number of *Cluster* resources per subscription is limited to 5
434
432
435
-
-*Cluster* resource association to workspace should be carried ONLY
433
+
-*Cluster* resource association to workspace should be carried ONLY
436
434
after you received a confirmation from the product group that the
437
435
ADX cluster provisioning was fulfilled. Data that is sent prior to
438
436
this provisioning will be dropped and won't be recoverable.
439
437
440
-
-CMK encryption applies to newly ingested data after the CMK
438
+
- CMK encryption applies to newly ingested data after the CMK
441
439
configuration. Data that was ingested prior to the CMK
442
440
configuration, remained encrypted with Microsoft key. You can query
443
441
data before and after the configuration seamlessly.
444
442
445
-
-CMK capability is regional -- your Azure Key Vault, *Cluster*
443
+
- CMK capability is regional -- your Azure Key Vault, *Cluster*
446
444
resource and associated workspaces must be in the same region but
447
445
can be in different subscriptions.
448
446
449
-
-Once workspace is associated to a *Cluster* resource, it cannot be
447
+
- Once workspace is associated to a *Cluster* resource, it cannot be
450
448
de-associated from the *Cluster* resource, since data is encrypted
451
449
with your key and isn't accessible without your KEK in Azure Key
452
450
Vault.
453
451
454
-
-The Azure Key Vault must be configured as recoverable. These
452
+
- The Azure Key Vault must be configured as recoverable. These
0 commit comments