Skip to content

Commit 5d493c8

Browse files
authored
Update troubleshoot-tde.md
1 parent 22f47fe commit 5d493c8

1 file changed

Lines changed: 45 additions & 24 deletions

File tree

docs/relational-databases/security/encryption/troubleshoot-tde.md

Lines changed: 45 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ In the Azure portal, go to the key vault, and then go to **Access policies**. Co
8282
To learn more, see [Assign an Azure AD identity to your server](/azure/sql-database/transparent-data-encryption-byok-azure-sql-configure#assign-an-azure-ad-identity-to-your-server).
8383

8484
> [!IMPORTANT]
85-
> If the logical SQL Server instance was moved to a new tenant after the initial configuration of TDE with Key Vault, repeat the step to configure the Azure AD identity to create a new AppId. Then, add the AppId to the key vault and assign the correct permissions to the key.
85+
> If the logical SQL Server or managed instance was moved to a new tenant after the initial configuration of TDE with Key Vault, repeat the step to configure the Azure AD identity to assign a new managed identity (system-assigned or user-assigned) to the server. Then, add the managed identity to the key vault and assign the correct permissions to the key.
8686
>
8787
8888
### Missing key vault
@@ -95,7 +95,7 @@ _503 AzureKeyVaultConnectionFailed - The operation could not be completed on the
9595

9696
To identify the key URI and the key vault:
9797

98-
1. Use the following cmdlet or command to get the key URI of a specific logical SQL Server instance:
98+
1. Use the following cmdlet or command to get the key URI of a specific server instance:
9999

100100
- Azure PowerShell: [Get-AzureRmSqlServerKeyVaultKey](/powershell/module/azurerm.sql/get-azurermsqlserverkeyvaultkey)
101101

@@ -111,7 +111,7 @@ To identify the key URI and the key vault:
111111

112112
Confirm that the key vault is available:
113113

114-
- Ensure that the key vault is available and that the logical SQL Server instance has access.
114+
- Ensure that the key vault is available and that the server has access.
115115
- If the key vault is behind a firewall, ensure that the check box to allow Microsoft services to access the key vault is selected.
116116
- If the key vault has been accidentally deleted, you must complete the configuration from the start.
117117

@@ -151,36 +151,31 @@ To identify the key URI and key vault:
151151

152152
**Mitigation**
153153

154-
Confirm that the logical SQL Server instance has permissions to the key vault and the correct permissions to access the key:
154+
Confirm that the server has permissions to the key vault and the correct permissions to access the key:
155155

156-
- In the Azure portal, go to the key vault > **Access policies**. Find the logical SQL Server instance AppId.
157-
- If the AppId is present, ensure that the AppID has the following key permissions: Get, Wrap, and Unwrap.
158-
- If the AppId isn't present, add it by using the **Add New** button.
156+
- In the Azure portal, go to the key vault > **Access policies**. Find the server's managed identity (system-assigned or user-assigned).
157+
- If the server identity is present, ensure that it has the following key permissions: Get, WrapKey, and UnwrapKey.
158+
- If the server identity isn't present, add it by using the **Add New** button.
159159

160160
## Getting TDE status from the Activity log
161161

162162
To allow for monitoring of the database status due to Azure Key Vault key access issues, the following events will be logged to the [Activity Log](/azure/service-health/alerts-activity-log-service-notifications) for the resource ID based on the Azure Resource Manager URL and Subscription+ResourceGroup+ServerName+DatabaseName:
163163

164164
**Event when the service loses access to the Azure Key Vault key**
165165

166-
EventName: MakeDatabaseInaccessible
166+
EventName: MakeDatabaseInaccessible (Azure SQL Database)
167167

168168
Status: Started
169169

170-
Description: Database has lost access to Azure key vault key and is now inaccessible: \<error message\>
171-
172-
173-
174-
**Event when the 8-hour wait time for self-healing begins**
170+
Description: Database has lost access to Azure key vault key and is now inaccessible.
171+
172+
EventName: MakeManagedDbInaccessible (Azure SQL Managed Instance)
175173

176-
EventName: MakeDatabaseInaccessible
177-
178-
Status: InProgress
174+
Status: Started
179175

180-
Description: Database is waiting for Azure key vault key access to be reestablished by user within 8 hours. 
181-
182-
176+
Description: Database <name> on managed server <name> has lost access to Azure Key Vault Key and is now transitioning to inaccessible state.
183177

178+
184179
**Event when the database has automatically come back online**
185180

186181
EventName: MakeDatabaseAccessible
@@ -189,18 +184,28 @@ Status: Succeeded
189184

190185
Description: Database access to Azure key vault key has been reestablished and database is now online.
191186

192-
187+
EventName: MakeManagedDbAccessible
193188

194-
**Event when the issue wasn’t resolved within 8 hours and Azure Key Vault key access has to be validated manually**
189+
Status: Succeeded
190+
191+
Description: Access to Azure Key Vault Key has been re-established, operation to make all databases accessible in managed server <name> started.
192+
193+
194+
**Event when the issue wasn’t resolved within 30 minutes and Azure Key Vault key access has to be validated manually**
195195

196196
EventName: MakeDatabaseInaccessible
197197

198198
Status: Succeeded
199199

200200
Description: Database is inaccessible and requires user to resolve Azure key vault errors and reestablish access to Azure key vault key using Re-validate key.
201201

202-
202+
EventName: MakeManagedDbInaccessible
203203

204+
Status: Succeeded
205+
206+
Description: Database <name> on managed server <name> is inaccessible and requires user to re-establish access to Azure Key Vault Key.
207+
208+
204209
**Event when db comes online after manual key re-validation**
205210

206211
EventName: MakeDatabaseAccessible
@@ -209,7 +214,12 @@ Status: Succeeded
209214

210215
Description: Database access to Azure key vault key has been reestablished and database is now online.
211216

212-
217+
EventName: MakeManagedDbAccessible
218+
219+
Status: Succeeded
220+
221+
Description: Access to Azure Key Vault Key has been re-established and all managed databases in server <name> is now online.
222+
213223

214224
**Event when re-validation of Azure Key Vault key access has succeeded and the db is coming back online**
215225

@@ -219,7 +229,12 @@ Status: Started
219229

220230
Description: Restoring database access to Azure key vault key has started.
221231

222-
232+
EventName: MakeManagedDbAccessible
233+
234+
Status: Started
235+
236+
Description: Access to Azure Key Vault Key has been re-established, operation to make all databases accessible in managed server <name> started
237+
223238

224239
**Event when re-validation of Azure Key Vault key access has failed**
225240

@@ -229,6 +244,12 @@ Status: Failed
229244

230245
Description: Restoring database access to Azure key vault key has failed.
231246

247+
EventName: MakeManagedDbAccessible
248+
249+
Status: Failed
250+
251+
Description: Restoring database access to Azure key vault key has failed.
252+
232253

233254
## Next steps
234255

0 commit comments

Comments
 (0)