You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The procedure is not supported in the UI currently and the provisioning process is performed via REST API.
@@ -164,7 +164,7 @@ These settings are available via CLI and PowerShell:
164
164
165
165
### Create *Cluster* resource
166
166
167
-
This resource is used as intermediate identity connection between your Key Vault and your workspaces. After you receive confirmation that your subscriptions were whitelisted, create a Log Analytics *Cluster* resource at the region where your workspaces are located. Application Insights and Log Analytics require separate Cluster resources. The type of the Cluster resource is defined at creation time by setting the “clusterType” property to either ‘LogAnalytics’, or ‘ApplicationInsights’. The Cluster resource type can’t be altered.
167
+
This resource is used as intermediate identity connection between your Key Vault and your workspaces. After you receive confirmation that your subscriptions were whitelisted, create a Log Analytics *Cluster* resource at the region where your workspaces are located. Application Insights and Log Analytics require separate Cluster resources. The type of the *Cluster* resource is defined at creation time by setting the “clusterType” property to either ‘LogAnalytics’, or ‘ApplicationInsights’. The Cluster resource type can’t be altered.
168
168
169
169
For Application Insights CMK configuration, follow the Appendix content for this step.
During the early access period of the feature, the ADX cluster is
205
+
provisioned manually by the product team once the previous steps are
206
+
completed. Use the channel you have with Microsoft to provide the *Cluster* resource details. The JSON response can be retrieved using GET REST API:
207
+
208
+
```rst
209
+
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
210
+
Authorization: Bearer <token>
211
+
```
212
+
213
+
**Response**
194
214
```json
195
215
{
196
216
"identity": {
197
217
"type": "SystemAssigned",
198
218
"tenantId": "tenant-id",
199
-
"principalId": "principle-id"
200
-
},
219
+
"principalId": "principal-Id"
220
+
},
201
221
"properties": {
202
222
"provisioningState": "Succeeded",
203
223
"clusterType": "LogAnalytics",
204
224
"clusterId": "cluster-id"
205
-
},
206
-
"id": "/subscriptions/subscription-id/resourceGroups/resource-group-name/providers/Microsoft.OperationalInsights/clusters/cluster-name",//The cluster resource Id
Update your Key Vault and add access policy for the Cluster resource. Permissions to your Key Vault are then propagated to the underlaying Azure Monitor Storage to be used for data encryption.
228
-
Open your Key Vault in Azure portal and click “Access Policies” then “+ Add Access Policy” to create a new policy with these settings:
241
+
> [!IMPORTANT]
242
+
> This step should be carried ONLY after you received confirmation from the product group through your Microsoft channel that the Azure > Monitor data-store (ADX cluster) provisioning was fulfilled. Updating Key Vault access policy prior to this provisioning, the access policy update in Key Vault will fail.
243
+
244
+
Update your Key Vault and add access policy for the *Cluster* resource. Permissions to your Key Vault are then propagated to the underlaying Azure Monitor Storage to be used for data encryption.
245
+
Open your Key Vault in Azure portal and click "Access Policies" then "+ Add Access Policy" to create a new policy with these settings:
The *Get* permission is required to verify that your Key Vault is
237
254
configured as recoverable to protect your key and the access to your
238
255
Azure Monitor data.
239
256
240
-
It takes a few minutes until the *Cluster* resource is propagated in
241
-
Azure Resource Manager. When configuring this Access Policy
242
-
immediately after the *Cluster* resource creation, a transient error
243
-
may occur. In this case, try again after a few minutes.
244
-
245
257
### Update Cluster resource with Key identifier details
246
258
247
-
This step applies following future key version updates in your Key Vault. Update the *Cluster* resource with Key Vault *Key identifier* details, to allow Azure Monitor Storage to use the new key version. Select the current version of your key in Azure Key Vault to get the Key identifier details.
259
+
This step applies for future key version updates in your Key Vault. Update the *Cluster* resource with Key Vault *Key identifier* details, to allow Azure Monitor Storage to use the new key version. Select the current version of your key in Azure Key Vault to get the Key identifier details.
During the early access period of the feature, the ADX cluster is
306
-
provisioned manually by the product team once the previous steps are
307
-
completed. Use the channel you have with Microsoft to provide the
308
-
following details:
309
-
310
-
- Confirmation that the steps above where completed successfully.
311
-
312
-
- The JSON response from the previous step. It can be retrieved at any time using a Get API call:
313
-
314
-
```rst
315
-
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
0 commit comments