You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/azure-monitor/platform/customer-managed-keys.md
+34-29Lines changed: 34 additions & 29 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,32 +14,34 @@ This article provides background information and steps to configure customer-Man
14
14
15
15
We recommend you review [Limitations and constraints](#limitations-and-constraints) below before configuration.
16
16
17
-
## Disclaimers
17
+
## Customer-managed key (CMK) overview
18
18
19
-
The CMK capability is delivered on dedicated Log Analytics clusters. The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#log-analytics-dedicated-clusters) uses Capacity Reservations starting at a 1000 GB/day level.
19
+
The CMK capability is delivered on dedicated Log Analytics clusters. To verify that we have the required capacity in your region, we require that your subscription is whitelisted beforehand. Use your Microsoft contact to get your subscription whitelisted before you start configuring CMK.
20
20
21
-
## Customer-managed key (CMK) overview
21
+
The [Log Analytics clusters pricing model](https://docs.microsoft.com/azure/azure-monitor/platform/manage-cost-storage#log-analytics-dedicated-clusters) uses Capacity Reservations starting at a 1000 GB/day level.
22
22
23
-
Encryption at Rest(https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest) is a common privacy and security requirement in organizations. You can let Azure completely manage Encryption at Rest, while you have various options to closely manage encryption or encryption keys.
23
+
[Encryption at Rest](https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest) is a common privacy and security requirement in organizations. You can let Azure completely manage Encryption at Rest, while you have various options to closely manage encryption or encryption keys.
24
24
25
25
Azure Monitor ensures that all data is encrypted at rest using Azure-managed keys. Azure Monitor also provides an option for data encryption using your own key that is stored in your [Azure Key Vault](https://docs.microsoft.com/azure/key-vault/key-vault-overview) and accessed by Storage using system-assigned [managed identity](https://docs.microsoft.com/azure/active-directory/managed-identities-azure-resources/overview) authentication. This key can be either [software or hardware-HSM protected](https://docs.microsoft.com/azure/key-vault/key-vault-overview).
26
26
27
-
Azure Monitor use of encryption is identical to the way [Azure Storage encryption](https://docs.microsoft.com/azure/storage/common/storage-service-encryption#about-azure-storage-encryption) operates.
27
+
When using CMK, you can control the access to your data and revoke it at any time. Azure Monitor Storage always respects changes in key permissions within an hour. Data ingested in the last 14 days is also kept in hot-cache (SSD-backed) for efficient query engine operation. This data remains encrypted with Microsoft keys regardless CMK configuration, but your control over SSD data adheres to [key revocation](#cmk-kek-revocation). We are working to have SSD data encrypted with CMK in the second half of 2020.
28
28
29
-
Data ingested in the last 14 days is also kept in hot-cache (SSD-backed) for efficient query engine operation. This data remains encrypted with Microsoft keys regardless CMK configuration, but your control over SSD data adheres to [key revocation](#cmk-kek-revocation). We are working to have SSD data encrypted with CMK in the second half of 2020.
30
-
31
-
The frequency that Azure Monitor Storage accesses Key Vault for wrap and unwrap operations is between 6 to 60 seconds. Azure Monitor Storage always respects changes in key permissions within an hour.
29
+
Azure Monitor use of encryption is identical to the way [Azure Storage encryption](https://docs.microsoft.com/azure/storage/common/storage-service-encryption#about-azure-storage-encryption) operates.
32
30
33
31
## How CMK works in Azure Monitor
34
32
35
33
Azure Monitor leverages system-assigned managed identity to grant access
36
-
to your Azure Key Vault.System-assigned managed identity can only be
37
-
associated with a single Azure resource. The identity of the Log Analytics cluster is supported at the cluster level and this
34
+
to your Azure Key Vault.System-assigned managed identity can only be
35
+
associated with a single Azure resource while the identity of the Log Analytics cluster is supported at the cluster level. This
38
36
dictates that the CMK capability is delivered on a dedicated Log Analytics cluster. To support CMK on multiple workspaces, a new Log Analytics
39
37
*Cluster* resource performs as an intermediate identity connection
40
-
between your Key Vault and your Log Analytics workspaces, which maintains the identity between the Log Analytics cluster and your Key Vault. The Log Analytics cluster storage uses the
38
+
between your Key Vault and your Log Analytics workspaces. The Log Analytics cluster storage uses the
41
39
managed identity that\'s associated with the *Cluster* resource to
42
-
authenticate and access your Azure Key Vault via Azure Active Directory.
40
+
authenticate to your Azure Key Vault via Azure Active Directory.
41
+
42
+
After CMK configuration, any data ingested to workspaces associated to your *Cluster* resource gets encrypted with your key in Key Vault.
43
+
44
+
You can disassociate workspaces from the *Cluster* resource at any time. New data gets ingested to Log Analytics storage and encrypted with Microsoft key, while you can query your new and old data seamlessly.
1. Subscription whitelisting -- To assure that we have the required capacity in your region to provision a Log Analytics cluster, we need to verify and whitelist your subscription beforehand
77
79
2. Creating Azure Key Vault and storing key
78
80
3. Creating a *Cluster* resource
79
-
5. Granting permissions to your Key Vault
80
-
6. Associating Log Analytics workspaces
81
+
4. Granting permissions to your Key Vault
82
+
5. Associating Log Analytics workspaces
81
83
82
84
The procedure is not supported in the UI currently and the provisioning process is performed via REST API.
83
85
@@ -281,7 +283,7 @@ details.
281
283
282
284
This Resource Manager request is asynchronous operation when updating Key identifier details, while it is synchronous when updating Capacity value.
283
285
284
-
> [!Note]
286
+
> [!NOTE]
285
287
> You can provide partial body in *Cluster* resource to update a *sku*, *keyVaultProperties* or *billingType*.
@@ -400,7 +402,7 @@ GET https://management.azure.com/subscriptions/<subscription-id>/resourcegroups/
400
402
"name": "pricing-tier-name",
401
403
"lastSkuUpdate": "Tue, 28 Jan 2020 12:26:30 GMT"
402
404
},
403
-
"retentionInDays": days,
405
+
"retentionInDays": 31,
404
406
"features": {
405
407
"legacy": 0,
406
408
"searchVersion": 1,
@@ -440,7 +442,7 @@ All your data remains accessible after the key rotation operation including data
440
442
441
443
- The max number of *Cluster* resources per region and subscription is 2
442
444
443
-
- You can associate a workspace to your *Cluster* resource and then disassociate it when CMK for its data is no longer needed or any other reason. The number of workspace association that you can perform on a workspace in a period of 30 days is limited to 2
445
+
- You can associate a workspace to your *Cluster* resource and then disassociate it if CMK isn't required for the workspace. The number of workspace association on particular workspace in a period of 30 days is limited to 2
444
446
445
447
- Workspace association to *Cluster* resource should be carried ONLY after you have verified that the Log Analytics cluster provisioning was completed. Data sent to your workspace prior to the completion will be dropped and won't be recoverable.
446
448
@@ -464,7 +466,7 @@ All your data remains accessible after the key rotation operation including data
464
466
associated to another *Cluster* resource
465
467
466
468
467
-
## Management
469
+
## CMK Management
468
470
469
471
-**Get all *Cluster* resources for a resource group**
470
472
@@ -491,9 +493,9 @@ All your data remains accessible after the key rotation operation including data
@@ -592,7 +595,9 @@ All your data remains accessible after the key rotation operation including data
592
595
593
596
- Transient connection errors -- Storage handles transient errors (timeouts, connection failures, DNS issues) by allowing keys to stay in cache for a short while longer and this overcomes any small blips in availability. The query and ingestion capabilities continue without interruption.
594
597
595
-
- Live site -- unavailability of about 30 minutes will cause the Storage account to become unavailable. The query capability is unavailable and ingested data is cached for several hours using Microsoft key to avoid data loss. When access to Key Vault is restored, query becomes available and the temporary cached data is ingested to the data-store and encrypted with CMK.
598
+
- Live site -- Unavailability of about 30 minutes will cause the Storage account to become unavailable. The query capability is unavailable and ingested data is cached for several hours using Microsoft key to avoid data loss. When access to Key Vault is restored, query becomes available and the temporary cached data is ingested to the data-store and encrypted with CMK.
599
+
600
+
- Key Vault access rate -- The frequency that Azure Monitor Storage accesses Key Vault for wrap and unwrap operations is between 6 to 60 seconds.
596
601
597
602
- If you create a *Cluster* resource and specify the KeyVaultProperties immediately, the operation may fail since the
598
603
access policy can't be defined until system identity is assigned to the *Cluster* resource.
@@ -609,5 +614,5 @@ All your data remains accessible after the key rotation operation including data
609
614
610
615
- If you update your key version in Key Vault and don't update the new key identifier details in the *Cluster* resource, the Log Analytics cluster will keep using your previous key and your data will become inaccessible. Update new key identifier details in the *Cluster* resource to resume data ingestion and ability to query data.
611
616
612
-
- For support and help related to customer managed key, use your contacts into Microsoft.
617
+
- For questions and support related to CMK, use your Microsoft account.
0 commit comments