You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/relational-databases/security/encryption/troubleshoot-tde.md
+45-24Lines changed: 45 additions & 24 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ In the Azure portal, go to the key vault, and then go to **Access policies**. Co
82
82
To learn more, see [Assign an Azure AD identity to your server](/azure/sql-database/transparent-data-encryption-byok-azure-sql-configure#assign-an-azure-ad-identity-to-your-server).
83
83
84
84
> [!IMPORTANT]
85
-
> If the logical SQL Server instance was moved to a new tenant after the initial configuration of TDE with Key Vault, repeat the step to configure the Azure AD identity to create a new AppId. Then, add the AppId to the key vault and assign the correct permissions to the key.
85
+
> If the logical SQL Server or managed instance was moved to a new tenant after the initial configuration of TDE with Key Vault, repeat the step to configure the Azure AD identity to assign a new managed identity (system-assigned or user-assigned) to the server. Then, add the managed identity to the key vault and assign the correct permissions to the key.
86
86
>
87
87
88
88
### Missing key vault
@@ -95,7 +95,7 @@ _503 AzureKeyVaultConnectionFailed - The operation could not be completed on the
95
95
96
96
To identify the key URI and the key vault:
97
97
98
-
1. Use the following cmdlet or command to get the key URI of a specific logical SQL Server instance:
98
+
1. Use the following cmdlet or command to get the key URI of a specific server instance:
@@ -111,7 +111,7 @@ To identify the key URI and the key vault:
111
111
112
112
Confirm that the key vault is available:
113
113
114
-
- Ensure that the key vault is available and that the logical SQL Server instance has access.
114
+
- Ensure that the key vault is available and that the server has access.
115
115
- If the key vault is behind a firewall, ensure that the check box to allow Microsoft services to access the key vault is selected.
116
116
- If the key vault has been accidentally deleted, you must complete the configuration from the start.
117
117
@@ -151,36 +151,31 @@ To identify the key URI and key vault:
151
151
152
152
**Mitigation**
153
153
154
-
Confirm that the logical SQL Server instance has permissions to the key vault and the correct permissions to access the key:
154
+
Confirm that the server has permissions to the key vault and the correct permissions to access the key:
155
155
156
-
- In the Azure portal, go to the key vault > **Access policies**. Find the logical SQL Server instance AppId.
157
-
- If the AppId is present, ensure that the AppID has the following key permissions: Get, Wrap, and Unwrap.
158
-
- If the AppId isn't present, add it by using the **Add New** button.
156
+
- In the Azure portal, go to the key vault > **Access policies**. Find the server's managed identity (system-assigned or user-assigned).
157
+
- If the server identity is present, ensure that it has the following key permissions: Get, WrapKey, and UnwrapKey.
158
+
- If the server identity isn't present, add it by using the **Add New** button.
159
159
160
160
## Getting TDE status from the Activity log
161
161
162
162
To allow for monitoring of the database status due to Azure Key Vault key access issues, the following events will be logged to the [Activity Log](/azure/service-health/alerts-activity-log-service-notifications) for the resource ID based on the Azure Resource Manager URL and Subscription+ResourceGroup+ServerName+DatabaseName:
163
163
164
164
**Event when the service loses access to the Azure Key Vault key**
Description: Database is waiting for Azure key vault key access to be reestablished by user within 8 hours.
181
-
182
-
176
+
Description: Database <name> on managed server <name> has lost access to Azure Key Vault Key and is now transitioning to inaccessible state.
183
177
178
+
184
179
**Event when the database has automatically come back online**
185
180
186
181
EventName: MakeDatabaseAccessible
@@ -189,18 +184,28 @@ Status: Succeeded
189
184
190
185
Description: Database access to Azure key vault key has been reestablished and database is now online.
191
186
192
-
187
+
EventName: MakeManagedDbAccessible
193
188
194
-
**Event when the issue wasn’t resolved within 8 hours and Azure Key Vault key access has to be validated manually**
189
+
Status: Succeeded
190
+
191
+
Description: Access to Azure Key Vault Key has been re-established, operation to make all databases accessible in managed server <name> started.
192
+
193
+
194
+
**Event when the issue wasn’t resolved within 30 minutes and Azure Key Vault key access has to be validated manually**
195
195
196
196
EventName: MakeDatabaseInaccessible
197
197
198
198
Status: Succeeded
199
199
200
200
Description: Database is inaccessible and requires user to resolve Azure key vault errors and reestablish access to Azure key vault key using Re-validate key.
201
201
202
-
202
+
EventName: MakeManagedDbInaccessible
203
203
204
+
Status: Succeeded
205
+
206
+
Description: Database <name> on managed server <name> is inaccessible and requires user to re-establish access to Azure Key Vault Key.
207
+
208
+
204
209
**Event when db comes online after manual key re-validation**
205
210
206
211
EventName: MakeDatabaseAccessible
@@ -209,7 +214,12 @@ Status: Succeeded
209
214
210
215
Description: Database access to Azure key vault key has been reestablished and database is now online.
211
216
212
-
217
+
EventName: MakeManagedDbAccessible
218
+
219
+
Status: Succeeded
220
+
221
+
Description: Access to Azure Key Vault Key has been re-established and all managed databases in server <name> is now online.
222
+
213
223
214
224
**Event when re-validation of Azure Key Vault key access has succeeded and the db is coming back online**
215
225
@@ -219,7 +229,12 @@ Status: Started
219
229
220
230
Description: Restoring database access to Azure key vault key has started.
221
231
222
-
232
+
EventName: MakeManagedDbAccessible
233
+
234
+
Status: Started
235
+
236
+
Description: Access to Azure Key Vault Key has been re-established, operation to make all databases accessible in managed server <name> started
237
+
223
238
224
239
**Event when re-validation of Azure Key Vault key access has failed**
225
240
@@ -229,6 +244,12 @@ Status: Failed
229
244
230
245
Description: Restoring database access to Azure key vault key has failed.
231
246
247
+
EventName: MakeManagedDbAccessible
248
+
249
+
Status: Failed
250
+
251
+
Description: Restoring database access to Azure key vault key has failed.
0 commit comments