Introduction The previous article described the Confidential Computing features related to VMs. The same approach, i.e. securing data during processing, also applies to PaaS. These features will be discussed in this post. Features Featured not in the Picture
Introduction Microsoft refers to the CCC in its definition: The Confidential Computing Consortium defines confidential computing as: The protection of data in use by performing computations in a hardware-based Trusted Execution Environment (TEE). And describes the encryption of data-in-use in… Weiterlesen →
The Problem For OnPrem VMs, with specific vCPU and RAM, the right VM sizes often have to be found in Azure. It is important that the prices are as low as possible. For example, with Windows, a machine with 8… Weiterlesen →
What is snowflake? “Snowflake is a system that allows people from all over the world to access censored websites and applications. Similar to how VPNs assist users in getting around Internet censorship, Snowflake helps you avoid being noticed by Internet… Weiterlesen →
Cloud governance plays a very important role in the adaptation of the cloud. Cloud governance defines the guidelines for the cloud, i.e. the restrictions that should apply in the cloud, but also the freedom that every user can have. The… Weiterlesen →
Bei der Adaption der Cloud spielt die Cloud Governance eine ganz wesentliche Rolle. Die Cloud Governance definiert die Richtlinien für die Cloud, also die Einschränkungen, die in der Cloud gelten sollen, aber auch die Freiheiten, die jeder User haben kann…. Weiterlesen →
The previous post described how to deploy to an Azure Function if access is protected by an Application Gateway. Access to the function and to the management endpoint as well were protected. The Function was protected by the Function App… Weiterlesen →
Azure Functions are a serverless way to run code. They support different programming languages and can scale quickly. As a developer, it is particularly easy to deploy functions directly from Visual Studio or Visual Studio Code. Functions are often protected… Weiterlesen →
Most resources in Azure can be well protected by disabling public access. If public access is completely deactivated, access can take place via private endpoints. In most cases it is sufficient to restrict access to selected network to use service… Weiterlesen →
The concept of Availability Zones is well explained in the Microsoft documentation. These are different physical locations within a region that have separate power, cooling, and network infrastructure. When building a resource, it can often be decided in which Availability… Weiterlesen →
Azure resources (e.g. subscriptions) can be better protected with PIM. As a result, access roles are not granted permanently, but must be requested for a specified period of time. After this period, the permission is automatically revoked. If the PIM… Weiterlesen →
The serial console for VMs is a very useful tool for adapting the VM or making checks via the portal. For this, however, the boot diagnostics must be activated (i.e. a storage account for the logs must exist) and the… Weiterlesen →
If an AppService is called directly via its IP, either the certificate is invalid or the page cannot be found. If the call is made via HTTPS, the automatic generated certificate only stores the DNS name and not the IP,… Weiterlesen →
Storage accounts are also often used as backend pools for Application Gateway. This allows the storage to be protected with private endpoints or service endpoints and accessed via a central entry point with an alternative URL. However, the Application Gateway… Weiterlesen →
Various resources can be reserved in Azure, whereby use is guaranteed for 1 or 3 years. This can reduce the price of these resources by up to 72%. In the portal you can see these reduced costs for the reservations:… Weiterlesen →
The Defender for Cloud offers are used to receive notifications and alerts about Azure Services. To do this, it can be activated per subscription and per Azure Service (e.g. with Set-AzSecurityPricing or in the portal). However, what is not supported… Weiterlesen →
To set up a budget with warning in Azure, the Az.Billing PowerShell Module offers the cmdlets New-AzConsumptionBudget. Unfortunately, the PowerShell commands don’t seem to be implemented correctly in version 2.0.0 at the Az Module 8.3.0 or newer (currently 9.0.1): The… Weiterlesen →
As described in the previous article, private endpoints can be used to securely access Azure services. With App Services there is an additional possibility to control the outgoing traffic. Specifically, when configuring the app service in the network area, 2… Weiterlesen →
Most Azure services are accessible via a public URL. However, to provide a higher level of protection and a direct connection, various options are available in Azure. The two most common approaches are Service Endpoints and Private Endpoint/Private Link. Service… Weiterlesen →
APIs are available for most functionality and information in Azure. A token, which must be sent with the request, is usually required to retrieve the information. Generating a token dynamically or retrieving it via a service principal is often a… Weiterlesen →
Azure App Services are often placed behind an Application Gateway. Routing is easier to control, your own certificates can be stored centrally and data traffic can be checked and attacks detected. However, if the App Service responds with redirects, the… Weiterlesen →
As a starting point, there should be an API with a GET operation to retrieve (flight) data from a Cosmos DB. How the token can be generated to access the Cosmos DB was shown in the previous post Calculating CosmosDB… Weiterlesen →
To retrieve data from a Cosmos DB, its REST API can be used. The query is transmitted in the body of a POST request. Based on the current date, an authorization string must be calculated and supplied. The calculation is… Weiterlesen →
If workloads are to be set up in the Azure, there are various options. To make the choice easier, Microsoft provides the Compute Decision Guide (see picture above). It differentiates between Lift&Shift and Cloud Native and gives recommendations for individual… Weiterlesen →
“Blazor lets you build interactive web UIs using C# instead of JavaScript. Blazor apps are composed of reusable web UI components implemented using C#, HTML, and CSS.” The application can be run directly in the browser as a WebAssembly. It… Weiterlesen →
In the blog post about endless running Azure Functions on Consumption Plan, normal Azure Functions can run without time limit with the help of the functionTimeout property. The same option is also available for the durable functions. The same timeout… Weiterlesen →
Standard Azure Functions (not Durable Functions) have a maximum timeout of 10 minutes on a consumption plan. This is the same timeout for the new Function Runtime ~4 (missing in the link). With the Function Runtime ~3, however, the timeout… Weiterlesen →
Keycloak is a comprehensive and free open source identity provider. It is also offered in numerous Docker variants, which makes deployment very easy. Access to the shell is necessary for the configuration, e.g. if the first user has to be… Weiterlesen →
Lately people have been talking about Azure Landing Zones. This primarily refers to the environment in Azure into the workloads be migrated or new workloads are introduced. This means the preparation of the Azure environment. Specifically, the basic structure in… Weiterlesen →
For one project we use a Gremlin DB in Azure (Cosmos DB). Various libraries are available for use. Unfortunately, no REST is supported, which is why a corresponding simple interface had to be provided here. The most elegant way would… Weiterlesen →
© 2023 Azure Talk — Diese Website läuft mit WordPress
Theme erstellt von Anders Norén — Nach oben ↑