Skip to content

Commit d402ebe

Browse files
Merge pull request #221452 from ntrogh/alt-cmk-metrics
[Azure Load Testing] Add note that metrics data is not encrypted by CMK
2 parents 9aaffad + 6b59746 commit d402ebe

File tree

1 file changed

+11
-8
lines changed

1 file changed

+11
-8
lines changed

articles/load-testing/how-to-configure-customer-managed-keys.md

Lines changed: 11 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ Azure Load Testing uses the customer-managed key to encrypt the following data i
2222
- Secrets
2323
- Environment variables
2424

25+
> [!NOTE]
26+
> Azure Load Testing does not encrypt metrics data for a test run with your customer-managed key. This also includes the JMeter sampler names that you use in the JMeter script.
27+
2528
> [!IMPORTANT]
2629
> Azure Load Testing is currently in preview. For legal terms that apply to Azure features that are in beta, in preview, or otherwise not yet released into general availability, see the [Supplemental Terms of Use for Microsoft Azure Previews](https://azure.microsoft.com/support/legal/preview-supplemental-terms/).
2730
@@ -35,14 +38,14 @@ Azure Load Testing uses the customer-managed key to encrypt the following data i
3538

3639
- Customer-managed keys are only available for new Azure Load Testing resources. You should configure the key during resource creation.
3740

38-
- Azure Load Testing cannot automatically rotate the customer-managed key to use the latest version of the encryption key. You should update the key URI in the resource after the key is rotated in the Azure Key Vault.
41+
- Azure Load Testing can't automatically rotate the customer-managed key to use the latest version of the encryption key. You should update the key URI in the resource after the key is rotated in the Azure Key Vault.
3942

40-
- Once customer-managed key encryption is enabled on a resource, it cannot be disabled.
43+
- Once customer-managed key encryption is enabled on a resource, it can't be disabled.
4144

4245
## Configure your Azure Key Vault
4346
You can use a new or existing key vault to store customer-managed keys. The Azure Load Testing resource and key vault may be in different regions or subscriptions in the same tenant.
4447

45-
You have to set the **Soft Delete** and **Purge Protection** properties on your Azure Key Vault instance to use customer-managed keys with Azure Load Testing. Soft delete is enabled by default when you create a new key vault and cannot be disabled. You can enable purge protection at any time.
48+
You have to set the **Soft Delete** and **Purge Protection** properties on your Azure Key Vault instance to use customer-managed keys with Azure Load Testing. Soft delete is enabled by default when you create a new key vault and can't be disabled. You can enable purge protection at any time.
4649

4750
# [Azure portal](#tab/portal)
4851

@@ -119,7 +122,7 @@ az keyvault key create \
119122

120123
## Add an access policy to your Azure Key Vault
121124

122-
The user-assigned managed identity that you will use to configure customer-managed keys on Azure Load Testing resource must have appropriate permissions to access the key vault.
125+
The user-assigned managed identity that you use to configure customer-managed keys on Azure Load Testing resource must have appropriate permissions to access the key vault.
123126

124127
1. From the Azure portal, go to the Azure Key Vault instance that you plan to use to host your encryption keys. Select **Access Policies** from the left menu:
125128

@@ -133,7 +136,7 @@ The user-assigned managed identity that you will use to configure customer-manag
133136

134137
1. Under **Select principal**, select **None selected**.
135138

136-
1. Search for the user-assigned managed identity you created and select it.
139+
1. Search for the user-assigned managed identity you created, and then select it from the list.
137140

138141
1. Choose **Select** at the bottom.
139142

@@ -270,7 +273,7 @@ You can change the managed identity for customer-managed keys for an existing Az
270273

271274
To learn more about each type of managed identity, see [Managed identity types](../active-directory/managed-identities-azure-resources/overview.md#managed-identity-types).
272275

273-
- If you select System-assigned, the system-assigned managed identity needs to be enabled on the resource and granted access to the AKV before changing the identity for customer-managed keys.
276+
- If you select **System-assigned**, the system-assigned managed identity needs to be enabled on the resource and granted access to the AKV before changing the identity for customer-managed keys.
274277
- If you select **User-assigned**, you must select an existing user-assigned identity that has permissions to access the key vault. To learn how to create a user-assigned identity, see [Use managed identities for Azure Load Testing Preview](how-to-use-a-managed-identity.md).
275278

276279
1. Save your changes.
@@ -282,7 +285,7 @@ You can change the managed identity for customer-managed keys for an existing Az
282285

283286
## Change the key
284287

285-
You can change the key that you are using for Azure Load Testing encryption at any time. To change the key with the Azure portal, follow these steps:
288+
You can change the key that you're using for Azure Load Testing encryption at any time. To change the key with the Azure portal, follow these steps:
286289

287290
1. Navigate to your Azure Load Testing resource.
288291

@@ -316,7 +319,7 @@ This feature is currently only available for new Azure Load Testing resources.
316319

317320
You can revoke a key by disabling the latest version of the key in Azure Key Vault. Alternatively, to revoke all keys from an Azure Key Vault instance, you can delete the access policy granted to the managed identity of the Azure Load Testing resource.
318321

319-
When you revoke the encryption key you may be able to run tests for about 10 minutes, after which the only available operation is resource deletion. It is recommended to rotate the key instead of revoking it to manage resource security and retain your data.
322+
When you revoke the encryption key you may be able to run tests for about 10 minutes, after which the only available operation is resource deletion. It's recommended to rotate the key instead of revoking it to manage resource security and retain your data.
320323

321324
## Next steps
322325

0 commit comments

Comments
 (0)