Posts by Tag

AKS

Back to top ↑

Kubernetes

Deep dive into Defender for Containers

15 minute read

Microsoft Defender for Containers is the new plan that merges the capabilities of the two existing Microsoft Defender for Cloud plans, Microsoft Defender for...

Run Kubernetes on Windows 10 using WSL 2

4 minute read

Kubernetes is originally designed to be deployed and used in Linux environments. The Windows Subsystem for Linux lets you run a Linux environment on Windows,...

Back to top ↑

Certificates

Generate self signed certificates

1 minute read

In this post, I’m explaining how to generate a wildcard certificate for the custom domain with openssl, using a custom Certificate Authority. You can find th...

Back to top ↑

ARM

Back to top ↑

Powershell

Back to top ↑

APIMPolicy

Back to top ↑

Application Gateway

Back to top ↑

ACI

Back to top ↑

APIM

Back to top ↑

OAuth2

OAuth 2.0 with Managed Identities

7 minute read

Using Managed Identities to access an OAuth 2.0 protected application is a best practice for an application to application communication or, as referred to i...

Back to top ↑

MicrosoftGraph

Get login details for service principals

2 minute read

Microsoft added support for querying audit reports for service principals in the beta version of the Microsoft Graph APIs. This functionality can help you bu...

Back to top ↑

WSL2

Run Kubernetes on Windows 10 using WSL 2

4 minute read

Kubernetes is originally designed to be deployed and used in Linux environments. The Windows Subsystem for Linux lets you run a Linux environment on Windows,...

Back to top ↑

Key Vault

Back to top ↑

ContainenerApps

Back to top ↑

Managed Identity

Back to top ↑

VMs

Back to top ↑

Availability Zones

Back to top ↑

Authentication

Back to top ↑

AppConfiguration

Back to top ↑

KeyVault

Back to top ↑

Azure DevOps

Back to top ↑

Jekyll

Back to top ↑

WAN

Back to top ↑

Firewall Manager

Back to top ↑

OpenID

Back to top ↑

VM

Zone to Zone Disaster Recovery in Azure

13 minute read

Availability Zone is a high-availability offering that protects you from datacenter failures. Zone to Zone Disaster Recovery enables VM replication between t...

Back to top ↑

ASR

Zone to Zone Disaster Recovery in Azure

13 minute read

Availability Zone is a high-availability offering that protects you from datacenter failures. Zone to Zone Disaster Recovery enables VM replication between t...

Back to top ↑

LogicApp

Back to top ↑

Cognitive

Back to top ↑

Storage

Back to top ↑

ManagedIdentity

Back to top ↑

Docker

Back to top ↑

Well-Architected Framework

Azure Well-Architected Framework

7 minute read

Following industry standards and terms, the Azure Well-Architected Framework provides a set of Azure architecture best practices that support your cloud solu...

Back to top ↑

Private DNS Zones

Back to top ↑

VMSS

Back to top ↑

Resource Graph

Identifying VMs with Public IP address

3 minute read

Identifying all the VMs that are reachable from the Internet is something you must do to govern your environment successfully. It is not a simple task to per...

Back to top ↑

Logic App

Back to top ↑

ServicePrincipals

Get login details for service principals

2 minute read

Microsoft added support for querying audit reports for service principals in the beta version of the Microsoft Graph APIs. This functionality can help you bu...

Back to top ↑

Functions

Back to top ↑

FlexibleServer

Back to top ↑

Defender

Deep dive into Defender for Containers

15 minute read

Microsoft Defender for Containers is the new plan that merges the capabilities of the two existing Microsoft Defender for Cloud plans, Microsoft Defender for...

Back to top ↑

Terraform

Back to top ↑