With NSX Advanced Load Balancer (NSX ALB), enterprise-class applications with local load balancing, global server load balancing (GSLB), and Web Application Firewall (WAF) for workloads running on Azure VMware Solution. You can deploy the delivery service. As your data center grows or migrates from on-premises to Azure VMware Solution, NSX ALB’s full-featured load balancer enables customers…
Read More →PurposeThe following information provides a sample configuration on how to get an LDAP setup with Usage Meter. Resolution Pre-requisites: A configured LDAP server. Procedure Below is the sample configuration of a user LDAP authentication with Usage Meter. Replace the contents of /ec/nslcd.conf with information from your environment. See the example below: root@photon-machine [ /etc ]# cat /etc/nslcd.conf…
Read More →Available in Preview- Azure Virtual networks can freely resize without any downtime now with this feature existing peerings on the virtual network do not need to be deleted prior to adding or deleting an address prefix on the Azure virtual network. How to add or remove address space on peered virtual networks You can add…
Read More →Amazon Elastic Kubernetes Service (Amazon EKS) now allows you to connect any Kubernetes cluster to AWS and visualize it in Amazon EKS via the AWS Management Console. You can connect any Kubernetes cluster, including Amazon EKS Anywhere clusters running on-premises, self-managed clusters on Amazon Elastic Compute Cloud (Amazon EC2), and other Kubernetes clusters running outside…
Read More →Shielded instances harden the firmware security on bare metal hosts and virtual machines (VMs) to defend against malicious boot level software. How Shielded Instances Work Shielded instances use the combination of Secure Boot, Measured Boot, and the Trusted Platform Module (TPM) to harden the firmware security on your instances. Secure Boot and the Trusted Platform Module (TPM) are available on…
Read More →MySQL | PostgreSQL | SQL Server The Cloud SQL out-of-disk recommender proactively generates recommendations that help you reduce the risk of downtime that might be caused by your instances running out of disk space. You can apply these recommendations when a Cloud SQL instance is trending toward a storage limit. How it works The Cloud…
Read More →To start, we are releasing the first of the five VMCRF pillars, Plan. This pillar provides the necessary guidance to help organizations start preparing for their transformative initiative. which also includes the VMware Cloud Infrastructure Service providers: VMware Cloud on AWS Azure VMware Solution Google Cloud VMware Engine Oracle Cloud VMware Solution The Plan pillar…
Read More →Many customers operate their own data centers for data residency, latency, regulatory, or compliance considerations. With EKS Anywhere, you get Amazon optimized defaults for cluster configuration, machine operating systems, and 3rd-party integrations. These optimizations let you focus on your business innovations rather than complex component compatibility or disparate deployments between your on-premises and cloud environments….
Read More →Custom Themes I will explain how to perform upgrades using Helm operators Run the following command: helm install wp bitnami/wordpress You will force an update of the image of the MariaDB container. Let’s first check the version of the current image: kubectl describe statefulset wp-mariadb | grep Image Getting the current image of the StatefulSet…
Read More →Customers often ask how to migrate their Windows and Linux operating system golden image build factory configured in Hashicorp Packer over to Amazon EC2 Image Builder so they can be free from the operational management of their build infrastructure, reduce developer dependency, create re-usable components, and easily integrate with Amazon Web Services (AWS) native services for end-to-end automation and…
Read More →How to install multiple instances of SQL Server (of the same or different version) on a single Amazon Elastic Compute Cloud (Amazon EC2) instance. The information in this post applies to all supported SQL Server versions and editions on EC2. Solution overview When you install SQL Server for the first time, the installation is the default MSSQLServer instance. You…
Read More →You will update your existing cluster to include Azure AD integration. You will do this using the Azure portal: Note: Once a cluster has been integrated with Azure AD, this functionality cannot be disabled. To start, you will need an Azure AD group. You will later give admin privileges for your AKS cluster to this…
Read More →Update: On July 15, 2021, AWS Lambda will deprecate Python 2.7 as a supported runtime, formally ending our Python 2.7 support. The Lambda function and CloudFormation in this blog post have been updated to use Python3. You can use AWS Global Accelerator to get static IP addresses that act as a fixed entry point to your application endpoints in…
Read More →Problem Statement: As a tenant administrator you can’t inspect KeyVault contents created by other people (“you are unauthorized to view these contents”). Solution: You can assign appropriate permission in access policies. Go to Azure portal>Key vaults>Settings>Access Policies Click “Add Access plocies” Key permissions: Select all under “Key Management Operations” and “Cryptographic Operations” Select yourself as…
Read More →App Service on Linux to host web apps natively on Linux for supported application stacks. To view the latest languages and supported versions Run az webapp list-runtimes –linux Currently supported featuresLimitationsTroubleshoot performance issuesContinuous deployment to Azure App Service Currently supported features Deployments FTP Local Git GitHub Bitbucket Languages and frameworks Node.js Java PHP Python .NET…
Read More →Introduction This article will explain and show the use cases for using Nodepools in Kubernetes: Describe nodepools. System and user nodepools: what are they? How can I use Labels and nodeSelector to schedule application pods on a particular nodepool? How can Taints and Tolerations be used to schedule only certain application pods on a nodepool?…
Read More →In this post, we will walk through the steps for using awsvpc network mode for Windows containers running in Amazon ECS. Background: Previously, Windows tasks on Amazon ECS supported only default network mode, which relied on Docker’s default networking to set up the network stack for the containers. In the default network mode, all the containers are…
Read More →Immutable storage for Azure blob that enables users to store business-critical data in a WORM (Write Once, Read Many) state. Immutable storage supports two types of policies:Time-based retention Legal holdSelect from Azure PortalTime-based retention Immutable storage supports two types of policies: Time-based retention Time-based retention allows users to add policies and store data for a…
Read More →Kubernetes runtime changes and EKS In version 1.20, Kubernetes deprecated Dockershim, which allows Kubernetes to use Docker as a container runtime. Docker is still fully functional, but users will need to migrate to a different container runtime before support is removed in a future Kubernetes release. We’ve been hard at work making sure there is a…
Read More →Azure Kubernetes Service (AKS) now allows for Azure Active Directory (AAD) integrated clusters to be created without any local admin user account. By default, when you create a Kubernetes cluster, access to the cluster is through a local admin account. This is not desirable for security reasons as anyone can use a local account. It…
Read More →Researchers around the world have access to a greater variety and volume of genomics data than ever before. Genomics is now available to a vast majority of researchers, pushing forward the discovery at a tremendous pace and changing people’s lives. This growth is happening because of the perfect storm between genomic testing and technological improvements….
Read More →Today, we’re announcing the limited preview go-live of the DCsv3-series and DCdsv3-series Azure Virtual Machines, starting in the East US 2 region. These VMs dramatically improve the state-of-the-art for confidential workloads. Based on Intel’s 3rd Gen Xeon Scalable Processor, we’ve increased encrypted memory by 1000x and increased CPU cores (up to 48 cores) for more performance….
Read More →Over the last year, we have been improving the DNS over HTTPS (DoH) functionality in the Windows DNS client. Now we are pleased to introduce you to the different features now available through the Windows Insider program. To start with, we want to note that the registry key controls documented in our original DoH testing blog…
Read More →App Mesh is a fully managed service mesh and provides a logical boundary for network traffic between the services that reside within it. App Mesh standardizes how your services communicate, giving you end-to-end visibility and ensuring high availability for your applications. App Mesh, along with enabling a rich set of capabilities to manage east-west, inter-service…
Read More →Hi IT Pro, The following is step-by-step document for Defender for Endpoint Linux (MD ATP for Linux) deployment. Let’s start your MD for Endpoint Linux deployment! ________________________________ Microsoft Defender for Endpoint Linux (MD ATP)support for Linux with kernel version 3.10.0-327 or later, including the following Linux flavours : Red Hat Enterprise Linux 7.2 or higher CentOS 7.2 or higher Ubuntu 16.04 LTS…
Read More →