You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The procedure is not supported in the UI currently and the provisioning process is performed via REST API.
115
115
@@ -142,13 +142,13 @@ You can acquire the token using one of these methods:
142
142
CMK capability is an early access feature. The subscriptions where you plan to create *Cluster* resources must be whitelisted beforehand by the Azure product group. Use your contacts into Microsoft to provide your Subscriptions IDs.
143
143
144
144
> [!IMPORTANT]
145
-
> CMK capability is regional. Your Azure Key Vault, Storage Account, *Cluster* resource and associated Log Analytics workspaces must be in the same region, but they can be in different subscriptions.
145
+
> CMK capability is regional. Your Azure Key Vault, *Cluster* resource and associated Log Analytics workspaces must be in the same region, but they can be in different subscriptions.
146
146
147
147
### Storing encryption key (KEK)
148
148
149
-
Create an Azure Key Vault resource, then generate or import a key to be used for data encryption.
149
+
Create or use an Azure Key Vault that you already have, to generate or import a key to be used for data encryption.
150
150
151
-
The Azure Key Vault must be configured as recoverable to protect your key and the access to your Azure Monitor data.
151
+
The Azure Key Vault must be configured as recoverable to protect your key and the access to your data in Azure Monitor.
152
152
153
153
These settings are available via CLI and PowerShell:
@@ -157,9 +157,11 @@ These settings are available via CLI and PowerShell:
157
157
158
158
### Create *Cluster* resource
159
159
160
-
This resource is used as intermediate identity connection between your Key Vault and your workspaces. After you receive confirmation that your subscriptions were whitelisted, create a Log Analytics *Cluster* resource at the region where your workspaces are located. Application Insights and Log Analytics require separate Cluster resources. The type of the *Cluster* resource is defined at creation time by setting the “clusterType” property to either ‘LogAnalytics’, or ‘ApplicationInsights’. The Cluster resource type can’t be altered.
160
+
This resource is used as an intermediate identity connection between your Key Vault and your workspaces. After you receive confirmation that your subscriptions were whitelisted, create a Log Analytics *Cluster* resource at the region where your workspaces are located. Application Insights and Log Analytics require separate *Cluster* resources types. The type of the *Cluster* resource is defined at creation time by setting the "clusterType" property to either "LogAnalytics", or "ApplicationInsights". The Cluster resource type can’t be altered after.
161
161
162
-
For Application Insights CMK configuration, follow the Appendix content for this step.
162
+
For Application Insights CMK configuration, follow the Appendix content.
163
+
164
+
You must specify the capacity reservation level (sku) for the *Cluster* resource. The capacity reservation level can be in the range of 1000 to 2000 and in steps of 100. If you need capacity reservation level higher than 2000, reach your Microsoft contact to enable it. This property doesn’t affect billing currently -- once pricing model for dedicated cluster is introduced, billing will apply to any existing CMK deployments.
During the early access period of the feature, the ADX cluster is provisioned manually by the product team once the previous steps are completed. Use your Microsoft channel to provide the *Cluster* resource details. Copy the JSON response from the *Cluster* resource GET REST API:
202
+
During the early access period of the feature, the ADX cluster is provisioned manually by the product team once the previous steps are completed. Use your Microsoft channel to provide the *Cluster* resource details.
203
+
204
+
> [!IMPORTANT]
205
+
> Copy and provide the JSON response of the *Cluster* resource GET REST API
206
+
> You will need details from this response for later steps too
198
207
199
208
```rst
200
209
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
"principal-id" is a GUID generated by the managed identity service for the *Cluster* resource.
225
239
226
-
> [!IMPORTANT]
227
-
> Copy and keep the "principal-id" value since you will need it in next steps.
228
-
229
-
230
240
### Grant Key Vault permissions
231
241
232
-
> [!IMPORTANT]
233
-
> This step should be carried after you received confirmation from the product group through your Microsoft channel that the Azure Monitor data-store (ADX cluster) provisioning was fulfilled. Updating the Key Vault access policy prior to this provisioning may fail.
234
-
235
-
Update your Key Vault with a new access policy that grant permissions to your *Cluster* resource. These permissions are used by the underlaying Azure Monitor Storage for data encryption.
236
-
Open your Key Vault in Azure portal and click "Access Policies" then "+ Add Access Policy" to create a new policy with these settings:
242
+
Update your Key Vault with a new access policy that grants permissions to your *Cluster* resource. These permissions are used by the underlay Azure Monitor Storage for data encryption. Open your Key Vault in Azure portal and click "Access Policies" then "+ Add Access Policy" to create a policy with these settings:
- Select principal: enter the principal-id value that returned in the response in the previous step.
@@ -244,7 +250,9 @@ The *Get* permission is required to verify that your Key Vault is configured as
244
250
245
251
### Update Cluster resource with Key identifier details
246
252
247
-
This step applies for future key version updates in your Key Vault. Update the *Cluster* resource with Key Vault *Key identifier* details, to allow Azure Monitor Storage to use the new key version. Select the current version of your key in Azure Key Vault to get the Key identifier details.
253
+
This step applies per initial and future key version updates in your Key Vault. It informs Azure Monitor Storage about the new key version.
254
+
255
+
To update the *Cluster* resource with your Key Vault *Key identifier* details, select the current version of your key in Azure Key Vault to get the Key identifier details.
> This step should be carried **ONLY** after you received confirmation
307
-
> from the product group through your Microsoft channel that the
308
-
> **Azure Monitor data-store (ADX cluster) provisioning** was
309
-
> fulfilled. If you associate workspaces and ingest data prior to this
310
-
> **provisioning**, the data will be dropped and won't be recoverable.
313
+
> [!IMPORTANT]
314
+
> This step should be carried after the ADX cluster provisioning. If you associate workspaces and ingest data prior to the provisioning, ingested data before the provisioning will be dropped and won't be recoverable.
315
+
> To verify that the ADX cluster is provisioned and you can start associating workspaces to it, execute the this REST API and check that "provisioningState" value in the response is "Succeeded".
316
+
317
+
```rst
318
+
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
For Application Insights CMK configuration, follow the Appendix content for this step.
313
348
314
-
You need to have ‘write’ permissions on both your workspace and *Cluster* resource to perform this operation, which include these actions:
349
+
You need to have 'write' permissions to both your workspace and *Cluster* resource to perform this operation, which include these actions:
315
350
316
351
- In workspace: Microsoft.OperationalInsights/workspaces/write
317
352
- In *Cluster* resource: Microsoft.OperationalInsights/clusters/write
318
353
354
+
**Associate a workspace**
319
355
```rst
320
356
PUT https://management.azure.com/subscriptions/<subscription-id>/resourcegroups/<resource-group-name>/providers/microsoft.operationalinsights/workspaces/<workspace-name>/linkedservices/cluster?api-version=2019-08-01-preview
321
357
Authorization: Bearer <token>
@@ -414,7 +450,7 @@ All your data is accessible after the key rotation operation including data inge
414
450
415
451
- CMK encryption applies to newly ingested data after the CMK
416
452
configuration. Data that was ingested prior to the CMK
417
-
configuration, remaines encrypted with Microsoft key. You can query
453
+
configuration, remains encrypted with Microsoft key. You can query
418
454
data before and after the CMK configuration seamlessly.
419
455
420
456
- Once workspace is associated to a *Cluster* resource, it cannot be
@@ -455,7 +491,7 @@ All your data is accessible after the key rotation operation including data inge
455
491
456
492
- If you try to delete a *Cluster* resource that is associated to a workspace, the delete operation will fail.
457
493
458
-
-Use this API to get all *Cluster* resources for a resource group:
494
+
-Get all *Cluster* resources for a resource group:
459
495
460
496
```rst
461
497
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters?api-version=2019-08-01-preview
@@ -492,7 +528,7 @@ All your data is accessible after the key rotation operation including data inge
492
528
}
493
529
```
494
530
495
-
-Use this API call to Get all *Cluster* resources for a subscription:
531
+
- Get all *Cluster* resources for a subscription:
496
532
497
533
```rst
498
534
GET https://management.azure.com/subscriptions/<subscription-id>/providers/Microsoft.OperationalInsights/clusters?api-version=2019-08-01-preview
@@ -503,8 +539,7 @@ All your data is accessible after the key rotation operation including data inge
503
539
504
540
The same response as for '*Cluster* resources for a resource group', but in subscription scope.
505
541
506
-
- Use this API call to delete a *Cluster* resource -- You need to delete all the associated workspaces before you can delete
507
-
your *Cluster* resource:
542
+
- Delete a *Cluster* resource -- a soft-delete operation is performed to allow the recovery of your *Cluster* resource, your data and associated workspaces within 14 days, whether the deletion was accidental or intentional. After the soft-delete period, your *Cluster* resource and data are non-recoverable. The *Cluster* resource name remains reserved during the soft-delete period and you can’t create a new cluster with that name.
508
543
509
544
```rst
510
545
DELETE
@@ -516,6 +551,8 @@ your *Cluster* resource:
516
551
517
552
200 OK
518
553
554
+
- Recover your *Cluster* resource and your data -- during the soft-delete period, create a *Cluster* resource with the same name and in the same subscription, resource group and region. Follow the **Create *Cluster* resource** step to recover your *Cluster* resource.
555
+
519
556
520
557
## Appendix
521
558
@@ -595,11 +632,47 @@ Identity is assigned to the *Cluster* resource at creation time.
595
632
596
633
### Associate a component to a *Cluster* resource using [Components - Create Or Update](https://docs.microsoft.com/rest/api/application-insights/components/createorupdate) API
597
634
598
-
You need to have ‘write’ permissions on both your component and *Cluster* resource to perform this operation, which include these actions:
635
+
You need to have 'write' permissions on both your component and *Cluster* resource to perform this operation, which include these actions:
599
636
600
637
- In component: Microsoft.Insights/component/write
601
638
- In *Cluster* resource: Microsoft.OperationalInsights/clusters/write
602
639
640
+
> [!IMPORTANT]
641
+
> This step should be carried after the ADX cluster provisioning. If you associate a component and ingest data prior to the provisioning, ingested data before the provisioning will be dropped and won't be recoverable.
642
+
> To verify that the ADX cluster is provisioned and you can start associating component to it, execute the this REST API and check that "provisioningState" value in the response is "Succeeded".
643
+
644
+
```rst
645
+
GET https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.OperationalInsights/clusters/<cluster-name>?api-version=2019-08-01-preview
PUT https://management.azure.com/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.Insights/components/<component-name>?api-version=2015-05-01
0 commit comments