Skip to content

Latest commit

 

History

History
47 lines (39 loc) · 2.35 KB

key-vault-disaster-recovery-guidance.md

File metadata and controls

47 lines (39 loc) · 2.35 KB
title description services documentationcenter author manager editor ms.assetid ms.service ms.workload ms.tgt_pltfrm ms.devlang ms.topic ms.date ms.author
What to do in the event of an Azure service disruption that affects Azure Key Vault | Microsoft Docs
Learn what to do in the event of an Azure service disruption that affects Azure Key Vault.
key-vault
adamglick
mbaldwin
19a9af63-3032-447b-9d1a-b0125f384edb
key-vault
key-vault
na
na
article
01/07/2017
sumedhb;aglick

Azure Key Vault availability and redundancy

Azure Key Vault features multiple layers of redundancy to make sure that your keys and secrets remain available to your application even if individual components of the service fail.

The contents of your key vault are replicated within the region and to a secondary region at least 150 miles away but within the same geography. This maintains high durability of your keys and secrets. See the Azure paired regions document for details on specific region pairs.

If individual components within the key vault service fail, alternate components within the region step in to serve your request to make sure that there is no degradation of functionality. You do not need to take any action to trigger this. It happens automatically and will be transparent to you.

In the rare event that an entire Azure region is unavailable, the requests that you make of Azure Key Vault in that region are automatically routed (failed over) to a secondary region. When the primary region is available again, requests are routed back (failed back) to the primary region. Again, you do not need to take any action because this happens automatically.

There are a few caveats to be aware of:

  • In the event of a region failover, it may take a few minutes for the service to fail over. Requests that are made during this time may fail until the failover completes.
  • After a failover is complete, your key vault is in read-only mode. Requests that are supported in this mode are:
    • List key vaults
    • Get properties of key vaults
    • List secrets
    • Get secrets
    • List keys
    • Get (properties of) keys
    • Encrypt
    • Decrypt
    • Wrap
    • Unwrap
    • Verify
    • Sign
    • Backup
  • After a failover is failed back, all request types (including read and write requests) are available.