You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/key-vault/general/alert.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ author: msmbaldwin
7
7
ms.service: azure-key-vault
8
8
ms.subservice: general
9
9
ms.topic: how-to
10
-
ms.date: 04/16/2025
10
+
ms.date: 04/10/2026
11
11
ms.author: mbaldwin
12
12
ms.custom: sfi-image-nochange
13
13
# Customer intent: As a key vault administrator, I want to learn the options available to monitor the health of my vaults.
@@ -37,23 +37,23 @@ This article focuses on alerts for Key Vault. For information about Key Vault in
37
37
An action group is a configurable list of notifications and properties. The first step in configuring alerts is to create an action group and choose an alert type:
38
38
39
39
1. Sign in to the Azure portal.
40
-
2. Search for **Alerts** in the search box.
41
-
3. Select **Manage actions**.
40
+
1. Search for **Alerts** in the search box.
41
+
1. Select **Manage actions**.
42
42
43
43
> [!div class="mx-imgBorder"]
44
44
> 
45
45
46
-
4. Select **+ Add action group**.
46
+
1. Select **+ Add action group**.
47
47
48
48
> [!div class="mx-imgBorder"]
49
49
> 
50
50
51
-
5. Choose the **Action Type** value for your action group. In this example, we'll create an email and SMS alert. Select **Email/SMS/Push/Voice**.
51
+
1. Choose the **Action Type** value for your action group. In this example, we'll create an email and SMS alert. Select **Email/SMS/Push/Voice**.
52
52
53
53
> [!div class="mx-imgBorder"]
54
54
> 
55
55
56
-
6. In the dialog, enter email and SMS details, and then select **OK**.
56
+
1. In the dialog, enter email and SMS details, and then select **OK**.
57
57
58
58
> [!div class="mx-imgBorder"]
59
59
> 
@@ -67,20 +67,20 @@ Next, create a rule and configure the thresholds that will trigger an alert:
67
67
> [!div class="mx-imgBorder"]
68
68
> 
69
69
70
-
2. Select **New alert rule**.
70
+
1. Select **New alert rule**.
71
71
72
72
> [!div class="mx-imgBorder"]
73
73
> 
74
74
75
-
3. Select the scope of your alert rule. You can select a single vault or multiple vaults.
75
+
1. Select the scope of your alert rule. You can select a single vault or multiple vaults.
76
76
77
77
> [!IMPORTANT]
78
78
> When you're selecting multiple vaults for the scope of your alerts, all selected vaults must be in the same region. You have to configure separate alert rules for vaults in different regions.
79
79
80
80
> [!div class="mx-imgBorder"]
81
81
> 
82
82
83
-
4. Select the thresholds that define the logic for your alerts, and then select **Add**. The Key Vault team recommends configuring the following thresholds for most applications, but you can adjust them based on your application needs:
83
+
1. Select the thresholds that define the logic for your alerts, and then select **Add**. The Key Vault team recommends configuring the following thresholds for most applications, but you can adjust them based on your application needs:
Copy file name to clipboardExpand all lines: articles/key-vault/general/apps-api-keys-secrets.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ author: orin-thomas
6
6
ms.service: azure-key-vault
7
7
ms.subservice: general
8
8
ms.topic: overview
9
-
ms.date: 03/26/2026
9
+
ms.date: 04/10/2026
10
10
ms.author: orthomas
11
11
---
12
12
@@ -46,7 +46,7 @@ az keyvault secret set \
46
46
47
47
The following uses the Azure PowerShell [Set-AzKeyVaultSecret](/powershell/module/az.keyvault/set-azkeyvaultsecret) cmdlet to add a secret named MyApiKey to the keyvault and sets the secret to expire after 180 days:
@@ -73,7 +73,7 @@ az role assignment create --role "Key Vault Secrets User" \
73
73
74
74
To do this configure an Azure role-based access control (Azure RBAC) role using the Azure PowerShell [New-AzRoleAssignment](/powershell/module/az.resources/new-azroleassignment) cmdlet:
@@ -101,7 +101,7 @@ az monitor diagnostic-settings create \
101
101
102
102
To enable Azure Key Vault Logging and Alerts, use the Azure PowerShell [Set-AzDiagnosticSetting](/powershell/module/az.monitor/set-azdiagnosticsetting) cmdlet:
@@ -129,7 +129,7 @@ az monitor scheduled-query create \
129
129
130
130
You can run the Azure PowerShell [New-AzScheduledQueryRule](/powershell/module/az.monitor/new-azscheduledqueryrule) cmdlet to monitor logs in the specified Log Analytics workspace for unauthorized access attempts to Azure Key Vault secrets and trigger an alert if any matching unauthorized access attempt is detected:
You can create firewall rules on the Azure Key Vault instance using the Azure PowerShell [Add-AzKeyVaultNetworkRule](/powershell/module/az.keyvault/add-azkeyvaultnetworkrule) cmdlet, substituting the appropriate key vault names, resource groups, subnet, and subnet mask information:
Here are the suffixes of the URLs used to access each type of object
@@ -29,7 +29,6 @@ Here are the suffixes of the URLs used to access each type of object
29
29
|HSM-protected keys| /keys |
30
30
|Secrets|/secrets|
31
31
|Certificates| /certificates|
32
-
|Storage account keys|/storageaccounts
33
32
34
33
Azure Key Vault supports JSON formatted requests and responses. Requests to the Azure Key Vault are directed to a valid Azure Key Vault URL using HTTPS with some URL parameters and JSON encoded request and response bodies.
0 commit comments