You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
description: Information and steps to configure Customer-Managed Key (CMK) to encrypt data in your Log Analytics workspaces using an Azure Key Vault key.
This guide provides background information and steps to configure Customer-Managed Keys (CMK) for your Log Analytics workspaces. Once configured, any data sent to your workspaces is encrypted with your Azure Key Vault key.
15
+
This article provides background information and steps to configure Customer-Managed Keys (CMK) your Log Analytics workspaces and Application Insights components. Once configured, any data sent to your workspaces is encrypted with your Azure Key Vault key.
16
16
17
-
We recommend you review [Limitations and constraints](#Limitations and constraints) below before configuration.
17
+
We recommend you review [Limitations and constraints](#Limitations and constraints) below before configuration.
18
18
19
19
## Disclaimers
20
20
21
21
- Azure Monitor CMK is an early access feature and enabled for registered subscriptions
22
22
23
-
- The CMK deployment described in the guide is delivered in production quality and supported as such although it's an early access feature.
23
+
- The CMK deployment described in this article is delivered in production quality and supported as such although it's an early access feature.
24
24
25
-
- CMK capability is delivered on a dedicated data-store-cluster, aka ADX cluster and suitable for customers sending 1 TB per day.
25
+
- CMK capability is delivered on a dedicated data-store-cluster, which is an ADX cluster and suitable for customers sending 1 TB or more per day.
26
26
27
-
- CMK pricing model isn't available currently and it isn't covered in the guide -- A pricing model for dedicated data-store-cluster is expected in the second quarter of 2020 and will apply on any existing CMK deployments.
28
-
29
-
- The guide describes the CMK configuration for Log Analytics workspaces. CMK for Application Insights components is also supported using this guide while differences are listed in the Appendix.
27
+
- CMK pricing model isn't available currently and it isn't covered in this article. A pricing model for dedicated data-store-cluster is expected in the second quarter of calendar year (CY) 2020 and will apply to any existing CMK deployments.
30
28
29
+
- This article describes the CMK configuration for Log Analytics workspaces. CMK for Application Insights components is also supported using this article while differences are listed in the Appendix.
31
30
32
31
> [!NOTE]
33
-
> Log Analytics and Application Insights are using the same data-store platform and query engine.
34
-
> We are bringing these two stores together via integration of Application Insights into Log Analytics to create a single unified logs store under Azure Monitor. This change is planned for the second quarter of calendar year 2020. If you don’t have to deploy CMK for your Application Insight data by then, we recommend waiting for the completion of the consolidation since such deployments will be disrupted by the consolidation and you will have to re-configure CMK after the migration to Log Analytics workspace.
32
+
> Log Analytics and Application Insights are using the same data-store platform and query engine.
33
+
> We are bringing these two stores together via integration of Application Insights into Log Analytics to create a single unified logs store under Azure Monitor. This change is planned for the second quarter of calendar year 2020. If you don’t have to deploy CMK for your Application Insight data by then, we recommend waiting for the completion of the consolidation since such deployments will be disrupted by the consolidation and you will have to re-configure CMK after the migration to Log Analytics workspace. The 1 TB per day minimum applies at the cluster level, and until the consolidation completes during second quarter Application Insights and Log Analytics require separate clusters.
35
34
36
35
## Customer-managed key (CMK) overview
37
36
@@ -82,7 +81,8 @@ There are 3 types of keys involved in Storage data encryption:
82
81
-**DEK** - Data Encryption Key
83
82
84
83
The following rules apply:
85
-
- Azure Storage generates a unique encryption key for every storage account, which is known as the AEK
84
+
85
+
- The ADX storage account generates a unique encryption key for every storage account, which is known as the AEK
86
86
87
87
- The AEK is used to derive DEKs, which are the keys that are used to
88
88
encrypt each block of data written to disk.
@@ -117,20 +117,21 @@ The provisioning process includes these steps:
117
117
The procedure is not supported in the UI currently and the provisioning process is performed via REST API.
118
118
119
119
> [!IMPORTANT]
120
-
> Any API request must include a Bearer authorization token in the request header.
120
+
> Any API request must include a Bearer authorization token in the request header.
This guide applies to Application Insights Customer Managed Key (CMK) as
558
+
This article applies to Application Insights Customer Managed Key (CMK) as
558
559
well, though you should consider the upcoming change to help you plan
559
560
the deployment of CMK for your Application Insight components.
560
561
@@ -576,8 +577,7 @@ apply to your Application Insights data.
576
577
577
578
## Application Insights CMK configuration
578
579
579
-
The configuration of Application Insights CMK is identical to the process illustrated in this guide, including constraints and
580
-
troubleshooting except these steps:
580
+
The configuration of Application Insights CMK is identical to the process illustrated in this article, including constraints and troubleshooting except these steps:
581
581
582
582
- Create *Cluster* resource
583
583
@@ -586,12 +586,13 @@ troubleshooting except these steps:
586
586
When configuring CMK for Application Insights, use these steps instead
587
587
of the ones listed above.
588
588
589
-
### Create *Cluster* resource
589
+
### Create a *Cluster* resource
590
590
591
591
This resource is used as intermediate identity connection between your Key Vault and your components. AFTER you received a confirmation that your subscriptions were whitelisted, create a Log Analytics Cluster resource at the region where your components are located. The type of the Cluster resource is defined at creation time by setting the *clusterType* property to either *LogAnalytics*, or *ApplicationInsights*. It should be *ApplicationInsights* for Application Insights CMK. The *clusterType* setting can’t be altered after the configuration.
592
592
593
593
Create:
594
-
```
594
+
595
+
```json
595
596
PUT https://management.azure.com/subscriptions/{subscription-id}/resourceGroups/{resource-group-name}/providers/Microsoft.OperationalInsights/clusters/{cluster-name}?api-version=2019-08-01-preview
596
597
Authorization: Bearer <token>
597
598
Content-type: application/json
@@ -611,7 +612,7 @@ Response:
611
612
612
613
Identity is assigned to the Cluster at creation time.
613
614
614
-
```
615
+
```json
615
616
616
617
{
617
618
"identity": {
@@ -633,7 +634,7 @@ Identity is assigned to the Cluster at creation time.
633
634
634
635
### Associate a component to a Cluster resource
635
636
636
-
```
637
+
```json
637
638
PUT https://management.azure.com/subscriptions/{subscription-id}/resourceGroups/{resource-group-name}/providers/Microsoft.Insights/components/{component-name}?api-version=2015-05-01
0 commit comments