Loading...
Blogs2018-03-08T09:36:45+00:00
1009, 2017

Microsoft Azure Networking (Part-2)

By |September 10th, 2017|Categories: Azure Networking, Load Balancer|Tags: , |

  Hello again 🙂 Thanks for following the blog. As we know we have been covering Microsoft Azure Networking resources. This blog is Part - 2 where we continue the Networking resources. If you haven't read the Part 1, click here Lets understand about Azure Load Balancer and see why anyone should use, Pros and Cons, and finally few examples of the resource in real world. Azure Load Balancer Layer 4(transport) : TCP & UDP. Routing for virtual machines & cloud services. Support virtual & hybrid networks(on prem/-- -) Supports reserved IP Addresses. Routing based on tuple of source & destination IP addresses. Supports session affinity. Supports port forwarding. Internet Facing Load Balancer :- Load Balancer passes public IP request to Virtual

2207, 2017

Azure ARM VM Snapshot (unmanaged Disks)

By |July 22nd, 2017|Categories: Azure, Resource Manager|Tags: , , , |

There are some scenarios where the managed Azure Backup Services may not be a suitable fit. So let's discuss more on the custom backup strategy which uses snapshots behind the scenes.   Azure Storage provides the capability to take snapshots of blobs.   Before we dig into Snapshot strategy, lets understand, "What's a Snapshot ?" In Hyper-V Environment, the configuration, memory and supporting process information is saved and a differential disk is created to store future disk changes. When you delete a VM, all the snapshots are deleted. However, the virtual hard disk (VHD) is not deleted, which means all content stored in the differential disks associated with the snapshots must be merged with the original VHD, as the following diagram shows:

206, 2017

Microsoft Azure Networking (Part-1)

By |June 2nd, 2017|Categories: Azure Networking, Azure Traffic Manager|

  Hello Everyone 🙂 As we all know Microsoft Azure is growing day by day and expanding its length and breadth. So, we are starting with few basic series of blogs which explains more on the basic terminology of the individual resource in most IaaS components of Azure which are Networking, Compute, etc. Today let's understand concepts and resources which are under Azure Networking. When you say Azure networking you typically deal with below resources: 1. Azure Traffic Manager 2. Azure Load Balancer 3. Azure Application Gateway 4. Static IP Reservations 5. Network Security Group 6. User Defined Routes Lets dig down into individual resource and see why anyone should use the Resource, Pros and Cons, and finally few examples

1205, 2017

Azure Key Vault Implementation

By |May 12th, 2017|Categories: Azure, Azure Key Vault|

  Continuing the previous blogs where we learned about Azure Key Vault Overview and also about Key Vault Lifecycle, lets do some hands on and understand how Key Vault is implemented in real world scenario. Today we will cover how to Authenticate a Client Application with Azure Key Vault using Azure Active Directory Application and how to set various access policies for the applications. Each application should be given minimum set of permissions that it requires to operate on. A Security Administrator would be given full permission so that it could modify the Vault Key/Secret as required and an Azure Developer will have limited permissions on Keys and Secrets. For Such a scenarios, it is best to have two or more AD applications created and have separate

112, 2016

Azure Key Vault in Action

By |December 1st, 2016|Categories: Azure|Tags: , , , , , |

  Most of people might have heard or have used Azure Key Vault in some ways mostly for Encrypting a Windows/Linux VM in Azure or some might have used for securing Connection Strings. In this post we will cover how to Authenticate a Client Application with Azure Key Vault using Azure Active Directory Application(AD App registrations) and how to set various access policies for the applications. As most organizations have different teams to manage Key Lifecycle(i.e, Creation, Distribution, Rotation and Retirement), a best practice to follow can be to use each AD Application with minimum set of permissions it requires to operate on. A Security Administrator would be given full permission so that they can modify the Vault Key/Secret as required and an Azure Developer will

1808, 2016

Docker and Containers.

By |August 18th, 2016|Categories: Docker|Tags: , , , |

What is Docker? Docker is an Open-source container technology that lets developers build, run and ship applications inside containers abstracting the virtual machines and Hypervisors and all of the overhead that is associated with it. The thing is, containers have been popularized by Docker Inc. So Docker and Containers seem to go hand in hand. But there is also another player in the market. Core OS have their own command line tool for containers that is called RKT (pronounced rocket). So the next question is what are containers? What is a container? Containers are a lightweight and efficient mechanism of abstracting away the hypervisor layer and the virtual machine layer. Also, they are way in which the run time

1608, 2016

Azure Site Recovery Supported Scenarios

By |August 16th, 2016|Categories: Azure, Azure Site Recovery|Tags: , , , , , , , , |

Azure Site Recovery is a very effective service that is offered by Microsoft in the purview of Disaster Recovery as a Service (DRaaS). While being able to migrate workloads from On-premises environments be it virtual or physical, if you want to move from one data center to another data center where Azure Site Recovery would act as a DR orchestrator or from your data center to the cloud and vice versa. The whole point being that you push the downtime in your businesses to near zero or zero if everything pans out very well. In this article, we will take a look at the various scenarios that Azure supports, the various workloads it can migrate. Also, I am going to

208, 2016

Microsoft Azure Key Vault Lifecycle

By |August 2nd, 2016|Categories: Azure Key Vault|Tags: , , , |

In the previous post of Introduction to Azure Key Vault, we learnt about the basics of Azure Key Vault, keys and Authentication mechanism. In this blog we will be continuing with Key Vault lifecycle i.e., go through the process of creating and managing Azure Key Vault with PowerShell. Key Vault lifecycle Azure Key Vault Lifecycle To use the Key Vault service we have to create the Key Vault which can be done by using the cmdlet New-AzureRmKeyVault. It is more than likely that this key vault would have been created for one or more applications to use. You must register those applications in Azure Active Directory. Also one must authorize them to use your vault with the cmdlet Set-AzureRmKeyVaultAccessPolicy. Optionally one can use

208, 2016

Azure Site recovery – Addressing Common issues

By |August 2nd, 2016|Categories: Azure, Recovery Service Vault|Tags: , , , |

Azure Site Recovery is a very effective service that is offered by Microsoft in the purview of Disaster Recovery as a Service (DRaaS). While being able to migrate workloads from On-premises environments be it virtual or physical, if you want to move from one data center to another data center where Azure Site Recovery would act as a DR orchestrator or from your data center to the cloud and vice versa. The whole point being that you push the downtime in your businesses to near zero or zero if everything pans out very well. It is not uncommon for anyone who is trying or testing ASR and run into errors. In this article I give you a glimpse at few

2907, 2016

Tagging Azure Resources

By |July 29th, 2016|Categories: Azure, Resource Manager|Tags: , , , , |

The Azure Resource manager model allows you to logically organize resources within a subscription. Read on to understand how tagging Azure Resources works. To help you manage your instances, images, and other Azure resources, you can assign your own metadata to each resource in the form of tags. A tag doesn’t stand by itself. It has to be applied to a resource once it’s created. Tagging in Azure Tags enable you to categorize your resources in different ways, for example, by purpose, owner, or environment. Each tag consists of a key and an optional value, both of which you define. For example, you could define a set of tags for your virtual machine instances that helps you track each