Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: Describe nodepools. System and user nodepools: what are they? How can I use Labels and nodeSelector to schedule application pods on a particular nodepool? How can Taints and Tolerations be used to schedule only certain application pods on a nodepool?…
Read More →Author: learn2skills
In this post, we will walk through the steps for using awsvpc network mode for Windows containers running in Amazon ECS. Background: Previously, Windows tasks on Amazon ECS supported only default network mode, which relied on Docker’s default networking to set up the network stack for the containers. In the default network mode, all the containers are…
Read More →Immutable storage for Azure blob that enables users to store business-critical data in a WORM (Write Once, Read Many) state. Immutable storage supports two types of policies:Time-based retention Legal holdSelect from Azure PortalTime-based retention Immutable storage supports two types of policies: Time-based retention Time-based retention allows users to add policies and store data for a…
Read More →Kubernetes runtime changes and EKS In version 1.20, Kubernetes deprecated Dockershim, which allows Kubernetes to use Docker as a container runtime. Docker is still fully functional, but users will need to migrate to a different container runtime before support is removed in a future Kubernetes release. We’ve been hard at work making sure there is a…
Read More →Azure Kubernetes Service (AKS) now allows for Azure Active Directory (AAD) integrated clusters to be created without any local admin user account. By default, when you create a Kubernetes cluster, access to the cluster is through a local admin account. This is not desirable for security reasons as anyone can use a local account. It…
Read More →Researchers around the world have access to a greater variety and volume of genomics data than ever before. Genomics is now available to a vast majority of researchers, pushing forward the discovery at a tremendous pace and changing people’s lives. This growth is happening because of the perfect storm between genomic testing and technological improvements….
Read More →Today, we’re announcing the limited preview go-live of the DCsv3-series and DCdsv3-series Azure Virtual Machines, starting in the East US 2 region. These VMs dramatically improve the state-of-the-art for confidential workloads. Based on Intel’s 3rd Gen Xeon Scalable Processor, we’ve increased encrypted memory by 1000x and increased CPU cores (up to 48 cores) for more performance….
Read More →Over the last year, we have been improving the DNS over HTTPS (DoH) functionality in the Windows DNS client. Now we are pleased to introduce you to the different features now available through the Windows Insider program. To start with, we want to note that the registry key controls documented in our original DoH testing blog…
Read More →App Mesh is a fully managed service mesh and provides a logical boundary for network traffic between the services that reside within it. App Mesh standardizes how your services communicate, giving you end-to-end visibility and ensuring high availability for your applications. App Mesh, along with enabling a rich set of capabilities to manage east-west, inter-service…
Read More →Hi IT Pro, The following is step-by-step document for Defender for Endpoint Linux (MD ATP for Linux) deployment. Let’s start your MD for Endpoint Linux deployment! ________________________________ Microsoft Defender for Endpoint Linux (MD ATP)support for Linux with kernel version 3.10.0-327 or later, including the following Linux flavours : Red Hat Enterprise Linux 7.2 or higher CentOS 7.2 or higher Ubuntu 16.04 LTS…
Read More →Intro Brad Watts here to explore monitoring of your Network Security Groups (NSGs). I was approached recently by a customer wanting to better understand changes being made to the many NSGs in their environment. Working with them, we came up with an Azure Workbook that provides a centralized view of both current settings on your NSGs along with any changes that have been…
Read More →Whether you are using Microsoft Azure for development, for production workloads, or for both, it’s important to consider the security of the connections to those cloud systems. Virtual private networks are often used to encrypt traffic between a device and Azure using a private tunnel over the public internet – especially for information and systems…
Read More →One of the most important questions customers ask when deploying Azure DDoS Protection Standard for the first time is how to manage the deployment at scale. A DDoS Protection Plan represents an investment in protecting the availability of resources, and this investment must be applied intentionally across an Azure environment. Creating a DDoS Protection Plan and…
Read More →This post will detail how to use Custom Rules on Azure WAF, including some examples of common use cases fulfilled by this rule type. Custom Rules provide a versatile way to build controls that fulfill security requirements and protect applications from attacks that are unique to your applications. WAF Rule Types and Processing Azure WAF…
Read More →Introduction Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud – whether they’re in Azure or not – as well as on premises. Azure Firewall Manager is a security management service that provides…
Read More →Many of our customers use Azure DNS for name resolution when it comes to infrastructure they have in Azure. The setup with Azure DNS works like a charm and provides name resolution to Azure Infrastructure without doing any complex setup. One challenge you may have is that Azure DNS do not log DNS queries from…
Read More →App Runner provides per-second execution billing and everything you need to run secure production workloads. With a few clicks, you can have a container running with a public endpoint, verified TLS certificate, and automatic scaling. Through App Runner, you can bring your existing containers, or use the integrated container build service to go directly from…
Read More →Attribute-based access control (ABAC) is an authorization strategy that defines access levels based on attributes associated with security principals, resources, requests, and the environment. Azure ABAC builds on role-based access control (RBAC) by adding conditions to Azure role assignments in the existing identity and access management (IAM) system. This preview includes support for role assignment conditions on Blobs…
Read More →You can now leverage Azure Policy to enable Azure Site Recovery for your VMs at scale and ensure organizational standards. Once you have a disaster recovery policy created for a resource group, all the new virtual machines that are added to the Resource Group will have Site Recovery enabled for them automatically. Moreover, for all…
Read More →Azure Machine Learning (AML) is an enterprise grade service that provides compute infrastructure for your ML needs. Azure Machine Learning’s managed-compute infrastructure allows you to easily create a compute instance (CI) or a single or multi-node compute cluster. Starting 30 April 2021, Ubuntu is ending standard support for Ubuntu 16.04 LTS (read more on the Ubuntu release blog) and as a result, Microsoft will replace…
Read More →The Log Analytics Windows Agent for Winter 2021 is now available. This release contains a new troubleshooting tool andchanges to how the agent handles certificate changes in Azure Services. As always, we suggest using the latest agent available. If you have installed the Log Analytics Agent for Windows by using Azure extensions and have automatic extension updates turned on, this update…
Read More →Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the infrastructure capabilities like routing and switching are being integrated into the endpoints. The additional complexity in…
Read More →AKS support for Kubernetes release 1.20 is now generally available. Kubernetes 1.20 delivers a total of 42 enhancements in various stages of maturity. These include capabilities such as CSI Volume Snapshot graduating to stable, Kubectl Debug to Beta, and introduction of new capabilities such as Graceful Node Shutdown in Alpha. Learn more about Kubernetes release 1.20…
Read More →VPC Traffic Mirroring is an AWS feature used to copy network traffic from the elastic network interface of an EC2 instance to a target for analysis. This makes a variety of network-based monitoring and analytics solutions possible on AWS. By capturing the raw packet data required for content inspection, VPC Traffic Mirroring enables agentless methods for…
Read More →In this blog we will look at using service principals with AzCopy and Azure CLI to connect to storage accounts and manage blob data. An Azure service principal is an identity created for use with applications, hosted services, and automated tools to access Azure resources. This access is restricted by the roles assigned to the…
Read More →