Skip to content

Commit f674cbe

Browse files
authored
Resolved comments
1 parent d913348 commit f674cbe

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/azure-monitor/logs/customer-managed-keys.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -272,9 +272,9 @@ Key rotation has two modes:
272272

273273
All your data remains accessible after the key rotation operation, since data always encrypted with Account Encryption Key (AEK) while AEK is now being encrypted with your new Key Encryption Key (KEK) version in Key Vault.
274274

275-
## Customer-managed key for saved queries and alerts
275+
## Customer-managed key for saved queries and log alerts
276276

277-
The query language used in Log Analytics is expressive and can contain sensitive information in comments you add to queries or in the query syntax. Some organizations require that such information is kept protected under Customer-managed key policy and you need save your queries encrypted with your key. Azure Monitor enables you to store *saved-searches* and *log-alerts* queries encrypted with your key in your own storage account when connected to your workspace.
277+
The query language used in Log Analytics is expressive and can contain sensitive information in comments you add to queries or in the query syntax. Some organizations require that such information is kept protected under Customer-managed key policy and you need save your queries encrypted with your key. Azure Monitor enables you to store *saved-searches* and *log alerts* queries encrypted with your key in your own storage account when connected to your workspace.
278278

279279
> [!NOTE]
280280
> Log Analytics queries can be saved in various stores depending on the scenario used. Queries remain encrypted with Microsoft key (MMK) in the following scenarios regardless Customer-managed key configuration: Workbooks in Azure Monitor, Azure dashboards, Azure Logic App, Azure Notebooks and Automation Runbooks.
@@ -287,9 +287,9 @@ When you Bring Your Own Storage (BYOS) and link it to your workspace, the servic
287287
* The *saves searches* in storage is considered as service artifacts and their format may change
288288
* Existing *saves searches* are removed from your workspace. Copy and any *saves searches* that you need before the configuration. You can view your *saved-searches* using [PowerShell](/powershell/module/az.operationalinsights/get-azoperationalinsightssavedsearch)
289289
* Query history isn't supported and you won't be able to see queries that you ran
290-
* You can link a single storage account to workspace for the purpose of saving queries, but is can be used fro both *saved-searches* and *log-alerts* queries
290+
* You can link a single storage account to workspace for the purpose of saving queries, but is can be used fro both *saved-searches* and *log alerts* queries
291291
* Pin to dashboard isn't supported
292-
* Fired alerts will not contains search results or alert query. You can use [alert dimensions](../alerts/alerts-unified-log.md#split-by-alert-dimensions) to get context in the fired alerts.
292+
* Fired log alerts will not contains search results or alert query. You can use [alert dimensions](../alerts/alerts-unified-log.md#split-by-alert-dimensions) to get context in the fired alerts.
293293

294294
**Configure BYOS for saved-searches queries**
295295

@@ -335,9 +335,9 @@ Content-type: application/json
335335

336336
After the configuration, any new *saved search* query will be saved in your storage.
337337

338-
**Configure BYOS for log-alerts queries**
338+
**Configure BYOS for log alerts queries**
339339

340-
Link a storage account for *Alerts* to your workspace -- *log-alerts* queries are saved in your storage account.
340+
Link a storage account for *Alerts* to your workspace -- *log alerts* queries are saved in your storage account.
341341

342342
# [Azure portal](#tab/portal)
343343

0 commit comments

Comments
 (0)