Throughout the digital machine lifecycle in Microsoft Azure, you’ll have to validate the place the restoration keys are of any given VM that has its disks being encrypted and saved in an Azure Key Vault. Additionally, you will need to do that train when removing/moving Key Vaults round in your subscriptions.
In case you have no clue which Key Vaults are in use, then wanting on the disk properties/encryption of the specified VM will provide you with the Azure Key Vault title. It’s on the finish of the Key Vault subject.
Going to the Key Vault (and you need to have permissions to learn the secrets and techniques), you most likely will discover an avalanche of disk encryption keys being listed. We are able to click on any entry from the listing. Within the new blade, click on on the present model, after which Tags, on the appropriate facet it a listing of the quantity letter, label, and machine title will give the data that you’re on the lookout for.
As you will have seen, the method is tedious, however PowerShell to the rescue!
$vSecrets = Get-AzKeyVaultSecret -VaultName <KeyVaultName> $vSecrets.Tags
Put up Views: