Skip to content

Commit c8eb0e1

Browse files
committed
fix H1 problem.
1 parent d12aa4a commit c8eb0e1

File tree

1 file changed

+13
-15
lines changed

1 file changed

+13
-15
lines changed

articles/azure-monitor/platform/customer-managed-keys.md

Lines changed: 13 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ ms.author: yossiy
99
ms.date: 01/07/2020
1010

1111
---
12-
1312
# Azure Monitor customer-managed key configuration
1413

1514
This article provides background information and steps to configure Customer-Managed Keys (CMK) your Log Analytics workspaces and Application Insights components. Once configured, any data sent to your workspaces is encrypted with your Azure Key Vault key.
@@ -50,7 +49,7 @@ The Azure Monitor use of encryption is identical to the way
5049
operates.
5150

5251
The frequency that Azure Monitor Storage accesses Key Vault for wrap and
53-
unwrap operations is between 6 to 60 seconds. Azure Monitor Storage
52+
unwrap operations is between 6 to 60 seconds. Azure Monitor Storage
5453
always respects changes in key permissions within an hour.
5554

5655
## How CMK works in Azure Monitor
@@ -424,45 +423,44 @@ with Key Identifier details" step.
424423
in Azure Monitor shortly after, the key won't be accessible by Azure
425424
Monitor Storage.
426425

427-
Limitations and constraints
428-
===========================
426+
## Limitations and constraints
429427

430-
- The CMK feature is supported at ADX cluster level and requires a
428+
- The CMK feature is supported at ADX cluster level and requires a
431429
dedicated Azure Monitor ADX cluster
432430

433-
- The max number of *Cluster* resources per subscription is limited to 5
431+
- The max number of *Cluster* resources per subscription is limited to 5
434432

435-
- *Cluster* resource association to workspace should be carried ONLY
433+
- *Cluster* resource association to workspace should be carried ONLY
436434
after you received a confirmation from the product group that the
437435
ADX cluster provisioning was fulfilled. Data that is sent prior to
438436
this provisioning will be dropped and won't be recoverable.
439437

440-
- CMK encryption applies to newly ingested data after the CMK
438+
- CMK encryption applies to newly ingested data after the CMK
441439
configuration. Data that was ingested prior to the CMK
442440
configuration, remained encrypted with Microsoft key. You can query
443441
data before and after the configuration seamlessly.
444442

445-
- CMK capability is regional -- your Azure Key Vault, *Cluster*
443+
- CMK capability is regional -- your Azure Key Vault, *Cluster*
446444
resource and associated workspaces must be in the same region but
447445
can be in different subscriptions.
448446

449-
- Once workspace is associated to a *Cluster* resource, it cannot be
447+
- Once workspace is associated to a *Cluster* resource, it cannot be
450448
de-associated from the *Cluster* resource, since data is encrypted
451449
with your key and isn't accessible without your KEK in Azure Key
452450
Vault.
453451

454-
- The Azure Key Vault must be configured as recoverable. These
452+
- The Azure Key Vault must be configured as recoverable. These
455453
properties aren't enabled by default:
456454

457-
- [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
455+
- [Soft Delete](https://docs.microsoft.com/azure/key-vault/key-vault-ovw-soft-delete)
458456
is turned on
459-
- 'Do Not Purge' is turned on to guard against force deletion of
457+
- 'Do Not Purge' is turned on to guard against force deletion of
460458
the secret / vault even after soft delete
461459

462-
- *Cluster* resource move to another resource group or subscription
460+
- *Cluster* resource move to another resource group or subscription
463461
isn't supported currently.
464462

465-
- Workspace association to *Cluster* resource will fail if the
463+
- Workspace association to *Cluster* resource will fail if the
466464
*Cluster* resource is in a different tenant.
467465

468466
- Workspace association to *Cluster* resource will fail if it is

0 commit comments

Comments
 (0)