There could be security risks with these images due to potential flaws. To remove security risks in your clusters, you can clean these unreferenced images. Manually cleaning images can be time intensive. Image Cleaner performs automatic image identification and removal, which mitigates the risk of stale images and reduces the time required to clean them…
Read More →Category: azure
The AKS releases are referred to as AKS initiated maintenance. These releases are your clusters’ weekly rounds of bug fixes, feature updates, and component upgrades. The kinds of routine maintenance that you carry out are cluster auto-upgrades and Node OS automatic security updates. Prior to starting Setting up a time for maintenance To create a maintenance window,…
Read More →You can now restore your Azure VMs to another subscription within the same tenant of the subscription where source VM is present, provided you have the relevant permissions to restore in that secondary subscription. By default, restore happens in the same subscription where the source virtual machine is present. This feature is only allowed if…
Read More →Using private endpoints, Azure Private Link enables you to securely connect Azure PaaS services to your virtual network. You only need to set up one endpoint per resource for several services. As a result, you may use Azure Arc to connect your on-premises or multi-cloud servers and send all traffic through a site-to-site VPN connection…
Read More →The geo-redundant High Availability scenarios that can be enabled using Azure Standard Load Balancing include: Your cross-region load balancer’s frontend IP setup is static and advertised in the majority of Azure regions. A list of participating regions There are limitations: A cross-region (global) load balancer can only be deployed to a home region. Make sure…
Read More →The cluster nodes are deployed into an Azure Virtual Network (VNet) subnet when using Azure CNI Overlay, but IP addresses for pods are obtained from a private CIDR that is logically separate from the VNet hosting the cluster nodes. The Overlay network is used for pod and node traffic inside the cluster, while Network Address…
Read More →You must establish a connection to the private AKS cluster either through the cluster virtual network, a peer network, or a configured private endpoint in order to access the cluster. Required prerequisites Run a single command with command invoke As an example: If you want to run a command on your cluster, run az aks…
Read More →For the #Azure Database for PostgreSQL Flexible server, data encryption with customer-managed passwords is configured at the server level. The data encryption key for the service is encrypted for a specific server using a customer-managed secret known as the key encryption key (KEK). (DEK). An encrypted key called the KEK is kept in a customer-owned…
Read More →A supported Windows Remote Desktop client and session host can establish a direct UDP-based connection by using the RDP Shortpath functionality of Azure Virtual Desktop. To activate RDP Shortpath, you must first fulfill the requirements. For your situation, choose one of the tabs below. Prerequisites Public Networks scenario If networks and firewalls permit the traffic…
Read More →With vSphere 7.0, VMware launched a feature called vSphere Lifecycle Manager Images (vLCM), which uses a declarative model, to holistically define the desired state of the ESXi host image, including the target ESXi version, firmware & drivers. This feature enables all the ESXi hosts, to adhere to the desired state; by enforcing consistency across the…
Read More →Developers may quickly create and deploy microservices and containerized apps with Azure Container Apps. Without having to deal with Kubernetes’ complexity, developers can take advantage of the highly optimized developer productivity features of Azure Container Apps, while operators can offer developers a platform that is extremely productive while still maintaining ultimate control over the Kubernetes…
Read More →Quick overview of #VMware Cloud Director Availability 4.5 Quick overview of VMware Cloud Director… Learn more about the exciting new features that are part of VMware Cloud Director Availability 4.5. VMware Social Media Advocacy
Read More →#VMware President Sumit Dhawan Previews the Next Multi-Cloud Briefing VMware President Sumit Dhawan Previews the Next… Our next Multi-Cloud briefing is here – don’t miss it on Dec. 5 to learn more about drivers of complexity, cost overruns, configuration headaches, security concerns, and the escalating silos between developers and operators. VMware Social Media Advocacy
Read More →Why vSAN and vVols are Best for #VMware Cloud Foundation Why vSAN and vVols are Best for VMware Cloud… This document covers the value that HCI with vSAN, vSphere Virtual Volumes (vVols)-enabled SAN/NAS, and traditional SAN/NAS bring to Cloud Foundation. The best way to summarize it is “good, better, best” where traditional SAN/NAS is good,…
Read More →If you want to resize an existing node pool, called nodepool01, from SKU size Standard_DS3_v2 to Standard_DS4_v2. To complete this task, you’ll need to create a new node pool using Standard_DS4_v2, move workloads from nodepool01 to the new node pool, and remove nodepool01. In this example, call this new node pool testnodepool. View Existing nodes in AKS: Create a new…
Read More →You can add a node pool to your AKS cluster with CVM using the generally available confidential VM sizes (DCav5/ECav5). Confidential VMs with AMD SEV-SNP support introduces a new set of security features, including full VM memory encryption, to protect data in use. These features enable CVM-enabled node pools to migrate highly sensitive container workloads…
Read More →#Azure Service Fabric is a distributed systems platform that makes scalable and reliable microservices and containers easy to package, deploy, and manage. A Service Fabric cluster is a network-connected collection of virtual machines where you can deploy and manage your microservices. We will explain and Required pre-requisites Create client certificate using Azure Key Vault Create…
Read More →Azure Service Fabric is a distributed systems platform that makes scalable and reliable microservices and containers easy to package, deploy, and manage. A Service Fabric cluster is a network-connected collection of virtual machines where you can deploy and manage your microservices. We will explain and Required pre-requisites Create client certificate using Azure Key Vault Create…
Read More →Function accelerators make it easy to create and build HTTP or event-driven applications that are portable across cloud providers and on-premises Kubernetes environments. Function workloads can quickly scale horizontally based on burst traffic, and minimize the application code needed to perform common tasks. How to create and deploy an HTTP or CloudEvent function from an…
Read More →Azure Container Apps enables you to connect to cloud services in just a few steps by using Service Connector. Service Connector manages network configuration and connection information between different services. The requirements before creating Service Connector Container Apps that are deployed to a region that is supported by a service connector, Service Connector region supported…
Read More →Soft delete policies are available in Azure Container Registry (ACR) to recover accidentally deleted artifacts. The feature is available to all service tiers (SKUs) The Soft delete policy can be enable/disable at your discretion. When you enable the soft delete policy, ACR treats deleted artifacts as soft deleted artifacts with a specified retention period. As…
Read More →Azure Data Explorer offering: the Kusto Emulator is a local environment Docker Container that encapsulating the Kusto Query Engine, it doesn’t require provisioning Azure services or incurring any cost. Prerequisites The host operating system must be either: Windows Server 2022 Windows Server 2019 Version 10.0.17763.2928 or newer Windows 11 2 gigabytes (GB) of RAM minimum;…
Read More →Container Apps offer integrated secret management that you can use to store your secrets. You can use the secrets for storing connection strings for KEDA-based scale triggers or pass them as environment variables to the containers you deploy. Never store the secret value in the repository. Store the secrets as GitHub secrets, HashiCorp Vault, or Azure Key…
Read More →Deploying Horizon with Azure VMware Solution This section covers specific information for deploying Horizon on Azure VMware Solution. Configuring Azure VMware Solution for Horizon Deployment At a high-level, the following steps are required to deploy Horizon with Azure VMware Solution: Create a Private Cloud. See the Azure VMware Solution documentation. The recommendation for a production environment is to…
Read More →vSphere with Tanzu uses several components to integrate with vSphere storage. Cloud Native Storage (CNS) on vCenter ServerThe CNS component resides in vCenter Server. It is an extension of vCenter Server management that implements provisioning and lifecycle operations for persistent volumes. When provisioning container volumes, the component interacts with the vSphere First Class Disk functionality to create virtual disks that…
Read More →