Loading...
Blogs 2018-03-08T09:36:45+00:00
206, 2017

Microsoft Azure Networking (Part-1)

By | June 2nd, 2017|Categories: Azure Networking, Azure Traffic Manager|

  Hello Everyone 🙂 As we all know Microsoft Azure is growing day by day and expanding its length and breadth. So, we are starting with few basic series of blogs which explains more on the basic terminology of the individual resource in most IaaS components of Azure which are Networking, Compute, etc. Today let's understand concepts and resources which are under Azure Networking. When you say Azure networking you typically deal with below resources: 1. Azure Traffic Manager 2. Azure Load Balancer 3. Azure Application Gateway 4. Static IP Reservations 5. Network Security Group 6. User Defined Routes Lets dig down into individual resource and see why anyone should use the Resource, Pros and Cons, and finally few examples

1205, 2017

Azure Key Vault Implementation

By | May 12th, 2017|Categories: Azure, Azure Key Vault|

  Continuing the previous blogs where we learned about Azure Key Vault Overview and also about Key Vault Lifecycle, lets do some hands on and understand how Key Vault is implemented in real world scenario. Today we will cover how to Authenticate a Client Application with Azure Key Vault using Azure Active Directory Application and how to set various access policies for the applications. Each application should be given minimum set of permissions that it requires to operate on. A Security Administrator would be given full permission so that it could modify the Vault Key/Secret as required and an Azure Developer will have limited permissions on Keys and Secrets. For Such a scenarios, it is best to have two or more AD applications created and have separate

112, 2016

Azure Key Vault in Action

By | December 1st, 2016|Categories: Azure|Tags: , , , , , |

  Most of people might have heard or have used Azure Key Vault in some ways mostly for Encrypting a Windows/Linux VM in Azure or some might have used for securing Connection Strings. In this post we will cover how to Authenticate a Client Application with Azure Key Vault using Azure Active Directory Application(AD App registrations) and how to set various access policies for the applications. As most organizations have different teams to manage Key Lifecycle(i.e, Creation, Distribution, Rotation and Retirement), a best practice to follow can be to use each AD Application with minimum set of permissions it requires to operate on. A Security Administrator would be given full permission so that they can modify the Vault Key/Secret as required and an Azure Developer will

1808, 2016

Docker and Containers.

By | August 18th, 2016|Categories: Docker|Tags: , , , |

What is Docker? Docker is an Open-source container technology that lets developers build, run and ship applications inside containers abstracting the virtual machines and Hypervisors and all of the overhead that is associated with it. The thing is, containers have been popularized by Docker Inc. So Docker and Containers seem to go hand in hand. But there is also another player in the market. Core OS have their own command line tool for containers that is called RKT (pronounced rocket). So the next question is what are containers? What is a container? Containers are a lightweight and efficient mechanism of abstracting away the hypervisor layer and the virtual machine layer. Also, they are way in which the run time

1608, 2016

Azure Site Recovery Supported Scenarios

By | August 16th, 2016|Categories: Azure, Azure Site Recovery|Tags: , , , , , , , , |

Azure Site Recovery is a very effective service that is offered by Microsoft in the purview of Disaster Recovery as a Service (DRaaS). While being able to migrate workloads from On-premises environments be it virtual or physical, if you want to move from one data center to another data center where Azure Site Recovery would act as a DR orchestrator or from your data center to the cloud and vice versa. The whole point being that you push the downtime in your businesses to near zero or zero if everything pans out very well. In this article, we will take a look at the various scenarios that Azure supports, the various workloads it can migrate. Also, I am going to

208, 2016

Microsoft Azure Key Vault Lifecycle

By | August 2nd, 2016|Categories: Azure Key Vault|Tags: , , , |

In the previous post of Introduction to Azure Key Vault, we learnt about the basics of Azure Key Vault, keys and Authentication mechanism. In this blog we will be continuing with Key Vault lifecycle i.e., go through the process of creating and managing Azure Key Vault with PowerShell. Key Vault lifecycle Azure Key Vault Lifecycle To use the Key Vault service we have to create the Key Vault which can be done by using the cmdlet New-AzureRmKeyVault. It is more than likely that this key vault would have been created for one or more applications to use. You must register those applications in Azure Active Directory. Also one must authorize them to use your vault with the cmdlet Set-AzureRmKeyVaultAccessPolicy. Optionally one can use

208, 2016

Azure Site recovery – Addressing Common issues

By | August 2nd, 2016|Categories: Azure, Recovery Service Vault|Tags: , , , |

Azure Site Recovery is a very effective service that is offered by Microsoft in the purview of Disaster Recovery as a Service (DRaaS). While being able to migrate workloads from On-premises environments be it virtual or physical, if you want to move from one data center to another data center where Azure Site Recovery would act as a DR orchestrator or from your data center to the cloud and vice versa. The whole point being that you push the downtime in your businesses to near zero or zero if everything pans out very well. It is not uncommon for anyone who is trying or testing ASR and run into errors. In this article I give you a glimpse at few

2907, 2016

Tagging Azure Resources

By | July 29th, 2016|Categories: Azure, Resource Manager|Tags: , , , , |

The Azure Resource manager model allows you to logically organize resources within a subscription. Read on to understand how tagging Azure Resources works. To help you manage your instances, images, and other Azure resources, you can assign your own metadata to each resource in the form of tags. A tag doesn’t stand by itself. It has to be applied to a resource once it’s created. Tagging in Azure Tags enable you to categorize your resources in different ways, for example, by purpose, owner, or environment. Each tag consists of a key and an optional value, both of which you define. For example, you could define a set of tags for your virtual machine instances that helps you track each

1807, 2016

VMWare and Hyper-V World

By | July 18th, 2016|Categories: Virtualization|Tags: , , , , , , |

In the world of virtualization, there are many platforms such as Integrity Virtual Machines, Oracle VM server for x86, Power VM etc. This blog focuses on VMWare and Hyper-V world of virtualization. VMWare vSphere: The world of VMWare and the way things work in VMWare can be really confusing at times, since it is a strenuous process and also confusing for new comers in this field. This document should at the least make you comfortable with the terminology if not familiar with these jargons very commonly used in the world of virtualization. VMWare’s workstation player or Oracle’s virtual box which are both decent virtualization platforms to begin with, but enterprises need more powerful platforms than those to run their workloads.

707, 2016

Azure Key Vault

By | July 7th, 2016|Categories: Azure, Security|Tags: , , , , |

Azure Key Vault is a service that enables us to store & manage cryptographic keys and secrets in one central secure vault. All the sensitive data is stored on physical hardware security modules (HSM) - FIPS 140-2 Level 2 certified - inside the datacenter where the data will be encrypted by VMs or directly on the HSM, more on this later. Pricing of Azure Key Vault can be found here. A Vault Owner can create a Key Vault gaining full access & control over the vault. A Vault Consumer can perform actions on the assets inside the Key Vault when the vault owner grants him/her access and depending on the permissions granted. This enables us to give the customers full