Custom Themes I will explain how to perform upgrades using Helm operators Run the following command: helm install wp bitnami/wordpress You will force an update of the image of the MariaDB container. Let’s first check the version of the current image: kubectl describe statefulset wp-mariadb | grep Image Getting the current image of the StatefulSet…
Read More →Category: azure
You will update your existing cluster to include Azure AD integration. You will do this using the Azure portal: Note: Once a cluster has been integrated with Azure AD, this functionality cannot be disabled. To start, you will need an Azure AD group. You will later give admin privileges for your AKS cluster to this…
Read More →Problem Statement: As a tenant administrator you can’t inspect KeyVault contents created by other people (“you are unauthorized to view these contents”). Solution: You can assign appropriate permission in access policies. Go to Azure portal>Key vaults>Settings>Access Policies Click “Add Access plocies” Key permissions: Select all under “Key Management Operations” and “Cryptographic Operations” Select yourself as…
Read More →App Service on Linux to host web apps natively on Linux for supported application stacks. To view the latest languages and supported versions Run az webapp list-runtimes –linux Currently supported featuresLimitationsTroubleshoot performance issuesContinuous deployment to Azure App Service Currently supported features Deployments FTP Local Git GitHub Bitbucket Languages and frameworks Node.js Java PHP Python .NET…
Read More →Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: Describe nodepools. System and user nodepools: what are they? How can I use Labels and nodeSelector to schedule application pods on a particular nodepool? How can Taints and Tolerations be used to schedule only certain application pods on a nodepool?…
Read More →Immutable storage for Azure blob that enables users to store business-critical data in a WORM (Write Once, Read Many) state. Immutable storage supports two types of policies:Time-based retention Legal holdSelect from Azure PortalTime-based retention Immutable storage supports two types of policies: Time-based retention Time-based retention allows users to add policies and store data for a…
Read More →Azure Kubernetes Service (AKS) now allows for Azure Active Directory (AAD) integrated clusters to be created without any local admin user account. By default, when you create a Kubernetes cluster, access to the cluster is through a local admin account. This is not desirable for security reasons as anyone can use a local account. It…
Read More →Researchers around the world have access to a greater variety and volume of genomics data than ever before. Genomics is now available to a vast majority of researchers, pushing forward the discovery at a tremendous pace and changing people’s lives. This growth is happening because of the perfect storm between genomic testing and technological improvements….
Read More →Today, we’re announcing the limited preview go-live of the DCsv3-series and DCdsv3-series Azure Virtual Machines, starting in the East US 2 region. These VMs dramatically improve the state-of-the-art for confidential workloads. Based on Intel’s 3rd Gen Xeon Scalable Processor, we’ve increased encrypted memory by 1000x and increased CPU cores (up to 48 cores) for more performance….
Read More →Over the last year, we have been improving the DNS over HTTPS (DoH) functionality in the Windows DNS client. Now we are pleased to introduce you to the different features now available through the Windows Insider program. To start with, we want to note that the registry key controls documented in our original DoH testing blog…
Read More →Hi IT Pro, The following is step-by-step document for Defender for Endpoint Linux (MD ATP for Linux) deployment. Let’s start your MD for Endpoint Linux deployment! ________________________________ Microsoft Defender for Endpoint Linux (MD ATP)support for Linux with kernel version 3.10.0-327 or later, including the following Linux flavours : Red Hat Enterprise Linux 7.2 or higher CentOS 7.2 or higher Ubuntu 16.04 LTS…
Read More →Intro Brad Watts here to explore monitoring of your Network Security Groups (NSGs). I was approached recently by a customer wanting to better understand changes being made to the many NSGs in their environment. Working with them, we came up with an Azure Workbook that provides a centralized view of both current settings on your NSGs along with any changes that have been…
Read More →Whether you are using Microsoft Azure for development, for production workloads, or for both, it’s important to consider the security of the connections to those cloud systems. Virtual private networks are often used to encrypt traffic between a device and Azure using a private tunnel over the public internet – especially for information and systems…
Read More →One of the most important questions customers ask when deploying Azure DDoS Protection Standard for the first time is how to manage the deployment at scale. A DDoS Protection Plan represents an investment in protecting the availability of resources, and this investment must be applied intentionally across an Azure environment. Creating a DDoS Protection Plan and…
Read More →This post will detail how to use Custom Rules on Azure WAF, including some examples of common use cases fulfilled by this rule type. Custom Rules provide a versatile way to build controls that fulfill security requirements and protect applications from attacks that are unique to your applications. WAF Rule Types and Processing Azure WAF…
Read More →Introduction Azure Security Center is a unified infrastructure security management system that strengthens the security posture of your data centers, and provides advanced threat protection across your hybrid workloads in the cloud – whether they’re in Azure or not – as well as on premises. Azure Firewall Manager is a security management service that provides…
Read More →Many of our customers use Azure DNS for name resolution when it comes to infrastructure they have in Azure. The setup with Azure DNS works like a charm and provides name resolution to Azure Infrastructure without doing any complex setup. One challenge you may have is that Azure DNS do not log DNS queries from…
Read More →Attribute-based access control (ABAC) is an authorization strategy that defines access levels based on attributes associated with security principals, resources, requests, and the environment. Azure ABAC builds on role-based access control (RBAC) by adding conditions to Azure role assignments in the existing identity and access management (IAM) system. This preview includes support for role assignment conditions on Blobs…
Read More →You can now leverage Azure Policy to enable Azure Site Recovery for your VMs at scale and ensure organizational standards. Once you have a disaster recovery policy created for a resource group, all the new virtual machines that are added to the Resource Group will have Site Recovery enabled for them automatically. Moreover, for all…
Read More →Azure Machine Learning (AML) is an enterprise grade service that provides compute infrastructure for your ML needs. Azure Machine Learning’s managed-compute infrastructure allows you to easily create a compute instance (CI) or a single or multi-node compute cluster. Starting 30 April 2021, Ubuntu is ending standard support for Ubuntu 16.04 LTS (read more on the Ubuntu release blog) and as a result, Microsoft will replace…
Read More →The Log Analytics Windows Agent for Winter 2021 is now available. This release contains a new troubleshooting tool andchanges to how the agent handles certificate changes in Azure Services. As always, we suggest using the latest agent available. If you have installed the Log Analytics Agent for Windows by using Azure extensions and have automatic extension updates turned on, this update…
Read More →Network connectivity issues are often hard to diagnose. There are multiple machines involved in a single data transfer; at least two endpoints and a complex network infrastructure in the middle. Lately, with the introduction of network virtualization, more of the infrastructure capabilities like routing and switching are being integrated into the endpoints. The additional complexity in…
Read More →AKS support for Kubernetes release 1.20 is now generally available. Kubernetes 1.20 delivers a total of 42 enhancements in various stages of maturity. These include capabilities such as CSI Volume Snapshot graduating to stable, Kubectl Debug to Beta, and introduction of new capabilities such as Graceful Node Shutdown in Alpha. Learn more about Kubernetes release 1.20…
Read More →In this blog we will look at using service principals with AzCopy and Azure CLI to connect to storage accounts and manage blob data. An Azure service principal is an identity created for use with applications, hosted services, and automated tools to access Azure resources. This access is restricted by the roles assigned to the…
Read More →This blog post was co-authored by Jessie Jia, Senior Program Manager The Internet is the new corporate network and the fabric that connects users, devices, and data to applications of all types. It is foundational to how organizations run their businesses, engage their customers, conduct commerce, operate their supply chain, and enable their employees to work from anywhere. However, while the Internet is highly scalable and ever expanding, it…
Read More →