Control Plane Operations Control Plane in Azure Cosmos DB is a RESTful service that allows you to perform a variety of activities on your Azure Cosmos DB account. It exposes a public resource model (for example, a database or an account) and multiple operations to end users, allowing them to conduct actions on the model….
Read More →Tag: Azure-Cloud Native
Azure Cosmos DB has numerous preview features for which you can request access. Here are the methods for requesting access to these preview features. Ref: Steps to register for a preview feature
Read More →Azure Cosmos DB automatically does a full backup of your data every 4 hours, and the most recent two backups are retained at all times. This is the default setting, and it comes at no additional cost. You can adjust the default backup interval and retention duration during or after creating an Azure Cosmos DB…
Read More →You can configure the default consistency level on your Azure Cosmos DB account at any time. The default consistency level configured on your account applies to all Azure Cosmos DB databases and containers under that account. Azure Cosmos DB offers five well-defined levels. From strongest to weakest, the levels are: The default consistency level is the consistency…
Read More →Configure multi-region writes in your applications that use Azure Cosmos DB In multiple region write scenarios, you can improve performance by writing just to the area closest to your application instance. Azure Cosmos DB handles the replication for you in the background. After you activate your account for multiple write regions, you must make two…
Read More →Start by creating a new Azure Cosmos DB for NoSQL account 4. Within the Basics pane, configure the following options, and then select Review + create: 5. Wait for the deployment to complete. After the deployment is completed, Go to resource to navigate to the new Azure Cosmos DB for NoSQL Azure Cosmos DB Dynamic scaling (per region and…
Read More →Azure Backup allows you to use your own encryption keys to secure backup data. This feature is available for Recovery Services Vaults and is enhanced for Backup Vaults. Customer Managed Keys (CMK) can be used to create a new backup vault or to adjust the encryption parameters of an existing vault. The encryption key that…
Read More →An AKS cluster’s egress can be tailored to meet certain needs. AKS will automatically supply a standard SKU load balancer for egress setup and use. However, if public IP addresses are blocked or extra hops are needed for egress, the default configuration might not be sufficient for every circumstance. Limitations Setting outboundType requires AKS clusters with a vm-set-type of VirtualMachineScaleSets and load-balancer-sku of Standard….
Read More →Solutions for installation errors with the AKS Backup Extension Scenario 1 Error message: Cause: The extension has been installed successfully, but the pods aren’t spawning. This happens because the required compute and memory aren’t available for the pods. Resolution: To resolve the issue, increase the number of nodes in the cluster. This allows sufficient compute and memory…
Read More →You may apply granular backup and retention settings with ease by using the Azure VM restoration point APIs. For virtual machines (VMs) running Linux or Windows, VM restoration points offer file system consistency and application consistency, respectively. The APIs allow you to establish restore points for your source virtual machine in different regions or in…
Read More →You may gather Syslog events from Linux nodes in your Azure Kubernetes Service (AKS) clusters using Container Insights. One feature of this is the ability to gather logs from components of the control plane, such as Kubelet. Prerequisites How to make Syslog active Using the Azure website– Locate your cluster by navigating. Select your cluster’s…
Read More →When a managed disk is at rest, Azure encrypts all of the data. Default encryption for data uses keys managed by Microsoft. You can provide customer-managed keys to encrypt data disks and the operating system of your AKS clusters while they are at rest, giving you greater control over encryption keys. The prerequisites are There…
Read More →There could be security risks with these images due to potential flaws. To remove security risks in your clusters, you can clean these unreferenced images. Manually cleaning images can be time intensive. Image Cleaner performs automatic image identification and removal, which mitigates the risk of stale images and reduces the time required to clean them…
Read More →The AKS releases are referred to as AKS initiated maintenance. These releases are your clusters’ weekly rounds of bug fixes, feature updates, and component upgrades. The kinds of routine maintenance that you carry out are cluster auto-upgrades and Node OS automatic security updates. Prior to starting Setting up a time for maintenance To create a maintenance window,…
Read More →