Skip to content

Commit ff913c6

Browse files
committed
fixing build warnings
1 parent 39694aa commit ff913c6

File tree

1 file changed

+7
-8
lines changed

1 file changed

+7
-8
lines changed

articles/event-hubs/configure-customer-managed-key.md

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,8 @@ After you enable customer-managed keys, you need to associate the customer manag
3333

3434
### Create key vault or key vault managed HSM
3535

36-
37-
> [!IMPORTANT]
38-
> Using customer-managed keys with Azure Event Hubs requires that the key vault have two required properties configured. They are: **Soft Delete** and **Do Not Purge**. These properties are enabled by default when you create a new key vault in the Azure portal. However, if you need to enable these properties on an existing key vault, you must use either PowerShell or Azure CLI.
36+
> [!IMPORTANT]
37+
> Using customer-managed keys with Azure Event Hubs requires that the key vault have two required properties configured. They are: **Soft Delete** and **Do Not Purge**. These properties are enabled by default when you create a new key vault in the Azure portal. However, if you need to enable these properties on an existing key vault, you must use either PowerShell or Azure CLI.
3938
4039
# [Key Vault](#tab/Key-Vault)
4140

@@ -671,10 +670,10 @@ You can rotate your key in the key vault by using the Azure Key Vaults rotation
671670
### Revoke access to keys
672671
Revoking access to the encryption keys won't purge the data from Event Hubs. However, the data can't be accessed from the Event Hubs namespace. You can revoke the encryption key through access policy or by deleting the key. Learn more about access policies and securing your key vault from [Secure access to a key vault](/azure/key-vault/general/security-features).
673672

674-
Once the encryption key is revoked, the Event Hubs service on the encrypted namespace becomes inoperable. If the access to the key is enabled or the delete key is restored, Event Hubs service will pick the key so you can access the data from the encrypted Event Hubs namespace.
673+
Once the encryption key is revoked, the Event Hubs service on the encrypted namespace becomes inoperable. If the access to the key is enabled or the delete key is restored, Event Hubs service picks the key so you can access the data from the encrypted Event Hubs namespace.
675674

676675
### Caching of keys
677-
The Event Hubs instance (event hub) polls its listed encryption keys every 5 minutes. It caches and uses them until the next poll, which is after 5 minutes. As long as at least one key is available, the event hub is accessible. If all listed keys are inaccessible when it polls, all event hubs will become unavailable.
676+
The Event Hubs instance (event hub) polls its listed encryption keys every 5 minutes. It caches and uses them until the next poll, which is after 5 minutes. As long as at least one key is available, the event hub is accessible. If all listed keys are inaccessible when it polls, all event hubs become unavailable.
678677

679678
Here are more details:
680679

@@ -693,12 +692,12 @@ To enable encryption of Microsoft-managed key with a customer managed key, an [a
693692

694693
Due to this:
695694

696-
- If [Geo disaster recovery](event-hubs-geo-dr.md) is already enabled for the Event Hubs namespace and you are looking to enable customer managed key, then
695+
- If [Geo disaster recovery](event-hubs-geo-dr.md) is already enabled for the Event Hubs namespace and you're looking to enable customer managed key, then
697696
- Break the pairing.
698697
- [Set up the access policy](/azure/key-vault/general/assign-access-policy-portal) for the system-assigned managed identity for both the primary and secondary namespaces to the key vault.
699698
- Set up encryption on the primary namespace.
700699
- Re-pair the primary and secondary namespaces.
701-
- If you are looking to enable Geo-DR on an Event Hubs namespace where customer-managed key is already set up, then follow these steps:
700+
- If you're looking to enable Geo-DR on an Event Hubs namespace where customer-managed key is already set up, then follow these steps:
702701
- [Set up the access policy](/azure/key-vault/general/assign-access-policy-portal) for the managed identity for the secondary namespace to the key vault.
703702
- Pair the primary and secondary namespaces.
704703

@@ -711,7 +710,7 @@ Here are a few recommendations:
711710

712711
Conditions for enabling Geo-DR and Encryption with User-Assigned Identities:
713712

714-
1. Secondary namespace must already have Encryption enabled with a User-Assigned identity if it is to be paired with a primary namespace that has Encryption enabled.
713+
1. Secondary namespace must already have Encryption enabled with a User-Assigned identity if it's to be paired with a primary namespace that has Encryption enabled.
715714
2. It isn't possible to enable Encryption on an already paired primary, even if the secondary has a User-Assigned identity associated with the namespace.
716715

717716
## Set up diagnostic logs

0 commit comments

Comments
 (0)