<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ajayi Daniel</title>
    <description>The latest articles on DEV Community by Ajayi Daniel (@ajayid10).</description>
    <link>https://dev.to/ajayid10</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3309248%2F0c7bf39b-b22f-4056-8d6b-e5c036f9f951.jpg</url>
      <title>DEV Community: Ajayi Daniel</title>
      <link>https://dev.to/ajayid10</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ajayid10"/>
    <language>en</language>
    <item>
      <title>Automating Application Deployment with CI/CD: A Case Study Using Node.js, Docker, and Kubernetes</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Fri, 27 Feb 2026 16:47:00 +0000</pubDate>
      <link>https://dev.to/ajayid10/automating-application-deployment-with-cicd-a-case-study-using-nodejs-docker-and-kubernetes-51hp</link>
      <guid>https://dev.to/ajayid10/automating-application-deployment-with-cicd-a-case-study-using-nodejs-docker-and-kubernetes-51hp</guid>
      <description>&lt;p&gt;STEP1: Configure Git globally&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3q6m4bjsdjis16d21k71.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3q6m4bjsdjis16d21k71.png" alt="Image1" width="538" height="191"&gt;&lt;/a&gt;&lt;br&gt;
STEP 2 Initialize Project&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgols1oi3b3vga46bksda.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgols1oi3b3vga46bksda.png" alt="Image6" width="542" height="264"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP3 Initialize Node.js Project &amp;amp; Update package.json&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxoq7answsitibedcj8rh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxoq7answsitibedcj8rh.png" alt="Image9" width="532" height="378"&gt;&lt;/a&gt;&lt;br&gt;
STEP4: Create app.js&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foi8lzmly784acibzhorc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foi8lzmly784acibzhorc.png" alt="Imkaj" width="800" height="423"&gt;&lt;/a&gt;&lt;br&gt;
STEP 4 Install Dependencies&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mjk76ab13en0ocqc3kz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mjk76ab13en0ocqc3kz.png" alt="Imag4 " width="532" height="81"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwmjzq9pm3h7rrhrj410h.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwmjzq9pm3h7rrhrj410h.png" alt="ImaE" width="554" height="326"&gt;&lt;/a&gt;&lt;br&gt;
STEP 5 Create Tests&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fygr8qtniu18cr7ay929c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fygr8qtniu18cr7ay929c.png" alt="Image" width="532" height="247"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuf1aiipj0uzh0f62wsfv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuf1aiipj0uzh0f62wsfv.png" alt="ImaJ" width="800" height="602"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 6: Dockerfile&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61r1w2u93fgz3t1mo79r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F61r1w2u93fgz3t1mo79r.png" alt=" " width="800" height="599"&gt;&lt;/a&gt;&lt;br&gt;
step7 : Essential Configuration Files&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvg7mnhko5wus39vm74d6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvg7mnhko5wus39vm74d6.png" alt="Imddd" width="800" height="490"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
    </item>
    <item>
      <title>HOW TO CREATE AN ELASTIC BEANSTALK ON AWS</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Fri, 26 Dec 2025 12:19:30 +0000</pubDate>
      <link>https://dev.to/ajayid10/how-to-create-an-elastic-beanstalk-on-aws-1ad1</link>
      <guid>https://dev.to/ajayid10/how-to-create-an-elastic-beanstalk-on-aws-1ad1</guid>
      <description>&lt;p&gt;&lt;strong&gt;WHAT IS AN ELASTIC BEANSTALK:&lt;/strong&gt; An Elastic Beanstalk application is a container for Elastic Beanstalk components, including environments where your application code runs on platforms provided and managed by Elastic Beanstalk, or in custom containers that you provide.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;THROUGH UNDERSTANDING OF ENVIROMENT ELASTIC BEANSTALK&lt;/strong&gt;&lt;br&gt;
An Elastic Beanstalk environment is a collection of AWS resources running together including an Amazon EC2 instance. When you create an environment, Elastic Beanstalk provisions the necessary resources into your AWS account.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 1 - CREATE AN APPLICATION **&lt;br&gt;
To create your example application, you'll use the Create application console wizard. It creates an Elastic Beanstalk application and launches an environment within it.&lt;br&gt;
Reminder: an environment is a collection of AWS resources required to run your application code.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd175gikur0yn800hmji0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd175gikur0yn800hmji0.png" alt="STEP 1" width="800" height="425"&gt;&lt;/a&gt;&lt;br&gt;
**STEP 2 - CONFIGURE THE ENVIROMENT&lt;/strong&gt; &lt;br&gt;
You choose the type of application you are deploying (a Web Server environment for handling web traffic), assign an application name (Deepdivedec22app) to organize all related deployments, and optionally add tags for easier management and billing, which together define the basic structure and identity of your Elastic Beanstalk application&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1o8y7onjdymrzwj2zw3x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1o8y7onjdymrzwj2zw3x.png" alt="Image CONFIGURE" width="800" height="318"&gt;&lt;/a&gt;&lt;br&gt;
STEP 3 - PROCEEDURE IN CONFIGURE ENVIROMENT &lt;br&gt;
In this step, you assign a unique environment name (Deepdivedec22app-env), optionally choose a custom subdomain for your app’s public URL, and select the application’s runtime platform (Node.js 24 on Amazon Linux 2023 with version 6.7.1), which together determine how and where your application will run in the cloud&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsrygep5gjrzwvjk2c0x9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsrygep5gjrzwvjk2c0x9.png" alt="Image CORRECTION " width="800" height="293"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 4 NEXT PROCEDURE ON CONFIGURE ENVIROMENT *&lt;/em&gt;&lt;br&gt;
IT  is a configuration step from a cloud service deployment interface (likely AWS Elastic Beanstalk) where users must upload their application's source code and then select a pre-defined infrastructure template, or "preset," which automatically sets parameters like server type, scaling, and availability to match common deployment scenarios such as a simple test setup or a high-availability production environment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4d2wopvub6vsc2mi09wn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4d2wopvub6vsc2mi09wn.png" alt="Imabest j" width="800" height="341"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 5 CONFIGURE SERVICE ACCESS *&lt;/em&gt;&lt;br&gt;
 A configuration step for setting up service access, which is critical for security and functionality in a managed cloud service like AWS Elastic Beanstalk. Here, you must define two essential Identity and Access Management (IAM) roles: a service role that grants the Elastic Beanstalk platform itself the permissions it needs to manage resources on your behalf, and an EC2 instance profile that provides the necessary permissions to the actual application servers (EC2 instances) it launches. Additionally, there is an optional setting to select an EC2 key pair, which is used for secure SSH access to those instances for administrative purposes.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmpadh9o172d6erxg3en.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsmpadh9o172d6erxg3en.png" alt="access" width="800" height="321"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 5 HOW TO CONFIGURE SERVICE ROLE&lt;/strong&gt; &lt;br&gt;
This image Below  shows the first step in creating an IAM role, where you must specify the trusted entity—the type of principal (like an AWS service, another account, or a user from an external identity provider) that is allowed to "assume" or use this role to perform actions in your AWS account. Selecting the correct trusted entity is the foundational security step that defines who or what can be granted the permissions attached to this role.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkr84wfumwfxg2rping2v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkr84wfumwfxg2rping2v.png" alt="role access" width="800" height="397"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 6 ROLE ACCESS CONTINUATION *&lt;/em&gt;&lt;br&gt;
This image Below shows  the continuation of creating an IAM role for AWS Elastic Beanstalk, focusing on selecting a specific use case for the service. After choosing "Elastic Beanstalk" as the service, you are presented with two distinct use cases that define the role's purpose.&lt;/p&gt;

&lt;p&gt;The "Elastic Beanstalk - Compute" use case is designed for an EC2 instance profile. This role is attached to the application servers themselves, granting them permissions to perform actions necessary for the application to run, such as uploading logs to Amazon S3 or sending metrics to Amazon CloudWatch.&lt;/p&gt;

&lt;p&gt;The "Elastic Beanstalk - Environment" use case is designed for the service role. This role is assumed by the Elastic Beanstalk platform service, giving it permission to manage AWS resources like EC2 instances, Auto Scaling groups, and load balancers on your behalf to create and manage the environment's infrastructure. Selecting the correct use case here is crucial for ensuring the right permissions are granted to the right component of the Elastic Beanstalk architecture.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4totvyd5jpza96ewczwa.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4totvyd5jpza96ewczwa.png" alt="Image desc" width="800" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 7 ROLE ACCESS CONTINUATION *&lt;/em&gt;&lt;br&gt;
This image shows the next step in creating an IAM role for Elastic Beanstalk, where the necessary permissions policies are being attached.&lt;/p&gt;

&lt;p&gt;When you select a specific use case (like "Elastic Beanstalk - Environment"), AWS automatically determines which managed policies are required for that role to function properly. In this case, the platform is pre-selecting two AWS-managed policies: AWSElasticBeanstalkEnhancedHealth and AWSElasticBeanstalkManagedUpdatesCustomerRolePolicy.&lt;/p&gt;

&lt;p&gt;The first policy grants permissions for Elastic Beanstalk to collect and report enhanced health monitoring information from your environment. The second policy allows Elastic Beanstalk to perform managed updates on your environment, such as applying platform updates in a controlled way.&lt;/p&gt;

&lt;p&gt;This step automates security best practices by attaching the minimum, predefined permissions needed for the role's intended function, as defined by AWS.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9svri6bpunvrjw5gn44e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9svri6bpunvrjw5gn44e.png" alt="INTESTINE" width="800" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 8 CONTINUATION ROLE ACCESS ON SERVICE ROLE  FINAL STEP *&lt;/em&gt;&lt;br&gt;
This image shows the final step in the IAM role creation process within the AWS Management Console, confirming the successful creation of the role. The newly created role, named aws-elasticbeanstalkdec2026-service-role, is now visible in the list of IAM roles.&lt;/p&gt;

&lt;p&gt;The screenshot highlights key details about the role: it is listed under "Access management," and its trusted entity is confirmed to be the "elasticbeanstalk" AWS service, meaning only the Elastic Beanstalk platform can assume this role. The creation is marked as successful, and the role is ready to be selected in the previous "Configure service access" step, completing the setup of the required service role for deploying an environment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9qdsu4vjhpzylrok2jdd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9qdsu4vjhpzylrok2jdd.png" alt="AHEAD" width="800" height="288"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 9 CREATING A PAIR KEY FOR  SEVICE ACCESS&lt;/strong&gt; &lt;br&gt;
From the Amazon EC2 console, specifically the Key Pairs section. This is where you manage the SSH keys needed to securely log into your EC2 instances.&lt;/p&gt;

&lt;p&gt;Right now, I'm looking at the list view where I can search for any existing key pairs by name, type, or other details. To make a new one, I would click the "Create key pair" button in the actions menu. You can see the rest of the EC2 navigation menu on the left, showing options for Instances, Images, and other resources, which tells me this key management is just one part of the overall process for setting up a server.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgh0hm2c96y8n1h3trwso.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgh0hm2c96y8n1h3trwso.png" alt="Imagine" width="800" height="309"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 10 CONTINUATION CREATING A PAIR KEY FOR  SEVICE ACCESS&lt;/strong&gt;&lt;br&gt;
Here, I need to define the key's properties. I've named it "Dec2026" and must select a Key pair type (choosing between the RSA or ED25519 encryption algorithms). I also need to choose the Private key file format—.pem for use with standard OpenSSH clients on Linux or Mac, or .ppk for use with the PuTTY client on Windows. There's also an optional section to add tags for better resource organization. Once I fill this out and create the key, the .pem or .ppk file will be automatically downloaded to my computer; this private key must be kept secure, as it's my only way to authenticate via SSH.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fschbdwr3bsc4megq5w5a.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fschbdwr3bsc4megq5w5a.png" alt="GOAL" width="800" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 11 FINAL STEP FOR CONFIGURING SERVICE ACCESS&lt;/strong&gt;&lt;br&gt;
I have successfully configured all the necessary security identities. The previously created service role (aws-elasticbeanstalkdec2026-service-role) and EC2 instance profile (aws-elasticbeanstalkdec2026-ec2-role) are now selected, granting the platform and the application servers their required permissions. Additionally, I've chosen the optional EC2 key pair named "Dec2026," which will allow me to SSH into the instances for direct access if needed. With all these elements in place, I can proceed to the next optional steps for networking and scaling, or go straight to reviewing and launching the environment.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvoz45hxj7gv2y2wydpel.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvoz45hxj7gv2y2wydpel.png" alt="FUTURE" width="800" height="314"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 12 HOW TO SET UP NETWORKING DATABASE AND TAG *&lt;/em&gt;&lt;br&gt;
Here, I'm configuring the network layout for my application. I've selected a custom VPC named december20026project-vpc instead of using the default one. The main decision on this screen is whether to assign a public IP address to the EC2 instances. Enabling this would allow the instances to be directly reachable from the internet, which is a key security and architectural choice. The interface also shows where I can choose specific subnets within the VPC to launch the instances into.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1x54l04fzv8f32eweap0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1x54l04fzv8f32eweap0.png" alt="ImageBASED" width="800" height="322"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 13 CREATE A VPC *&lt;/em&gt;&lt;br&gt;
I'm choosing the option to create "VPC and more", which will automatically generate a complete, ready-to-use network including subnets and other core resources. I've set the Name tag to december20026project, and the VPC will be named december20026project-vpc. For the IP address range, I've specified the CIDR block 10.0.0.0/16, which provides over 65,000 private IP addresses. The preview shows that this setup will automatically create four subnets across two Availability Zones (us-east-1a and us-east-1b), establishing a foundational and redundant network structure for my application.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm6ls7js113w1s0mp76ou.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm6ls7js113w1s0mp76ou.png" alt="Image DS" width="800" height="326"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 14 CONFIGURE INSTANCE TRAFFIC AND SCALING&lt;/strong&gt; &lt;br&gt;
Right now, I'm specifically looking at the settings for the root volume—which is basically the main hard drive for each server. Here, I can choose the type of storage, decide how big it should be in gigabytes, and set performance details like the IOPS (how many read/write operations it can handle per second) and throughput (the data transfer speed). At the bottom, I'm also setting up CloudWatch monitoring to report metrics from the servers every five minutes, so I can keep an eye on their performance.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flcmbf33p7s0b1cei7qhr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flcmbf33p7s0b1cei7qhr.png" alt="BISCUITE " width="800" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F41mxj0ycmxcwj54ui0pg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F41mxj0ycmxcwj54ui0pg.png" alt="BASIC" width="800" height="328"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flrc6dma3km4ns042popu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flrc6dma3km4ns042popu.png" alt="INTRO " width="800" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;STEP 15 CONFIGURE UPDATE MONITORING AND LOGGING *&lt;/em&gt;&lt;br&gt;
I've completed all the setup steps: from the initial configuration and security access to the optional networking and server settings. This review page gives me one last chance to check every decision I've made, from the application name and platform to the chosen instance type, VPC, key pair, and monitoring options.&lt;/p&gt;

&lt;p&gt;Scrolling through this, I can see all my configured details listed in a clear summary, including the service role, instance profile, and that I've enabled enhanced health reporting. Seeing everything confirmed here makes me confident I've set it up correctly. Once I click "Submit," Elastic Beanstalk will start provisioning all the AWS resources—like the load balancer, EC2 instances, and Auto Scaling group—to build and launch my environment.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1e5u1z1hvilaqgy3x4y5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1e5u1z1hvilaqgy3x4y5.png" alt="OGO" width="800" height="340"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdgqbtehcn6xibd8asj93.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdgqbtehcn6xibd8asj93.png" alt="OGO 2" width="800" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 16 FINAL REVIEW BEFORE DEPLOYMENT OF APP&lt;/strong&gt; &lt;br&gt;
I'm on the final review page of the Elastic Beanstalk setup, where I'm double-checking all my configuration choices before launching the environment.&lt;/p&gt;

&lt;p&gt;This first section of the review summarizes the core setup from Step 1. I can see that my environment, named Deepdivedec22app-env, is configured as a Web server environment. It's set to run on the Node.js 24 platform on Amazon Linux. The application itself is named Deepdivedec22app, and for this initial deployment, I'm using the sample application code provided by AWS.&lt;/p&gt;

&lt;p&gt;The progress bar on the right confirms that I have already configured the service access, networking, instance settings, and monitoring in the previous steps. Everything looks correct here, so I'm ready to proceed to the final launch.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2t5px67cjgkn7v6wbbam.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2t5px67cjgkn7v6wbbam.png" alt="IBABA" width="800" height="281"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk6oqidfyl0krj7233scl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk6oqidfyl0krj7233scl.png" alt="baba2 " width="800" height="205"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcdix6jq7xabqmdmre9xj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcdix6jq7xabqmdmre9xj.png" alt="baba 3" width="800" height="343"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8ecqloa4xxdd8i5wdkyj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8ecqloa4xxdd8i5wdkyj.png" alt="Ibig" width="800" height="473"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;STEP 17 FINAL DEPLOYEMENT&lt;/strong&gt; &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi66i5yr71h2435otamj3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fi66i5yr71h2435otamj3.png" alt="GARRI" width="800" height="399"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkrwvr91iwrqh861kttv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjkrwvr91iwrqh861kttv.png" alt="GARRI 2" width="800" height="467"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>devops</category>
      <category>aws</category>
      <category>cloudcomputing</category>
    </item>
    <item>
      <title>User Access and Profile Management Basics</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Mon, 29 Sep 2025 14:43:00 +0000</pubDate>
      <link>https://dev.to/ajayid10/user-access-and-profile-management-basics-2580</link>
      <guid>https://dev.to/ajayid10/user-access-and-profile-management-basics-2580</guid>
      <description>&lt;p&gt;****WHAT IS EXTRA ID it’s a backup or supplementary identifier that helps further confirm someone’s identity or connect their record in another system&lt;/p&gt;

&lt;p&gt;STEP BY STEP GUIDE OF CREATING A NEW USER IN ON EXTRA ID &lt;/p&gt;

&lt;p&gt;STEP 1 Open the Microsoft Entra admin center at &lt;a href="https://entra.microsoft.com" rel="noopener noreferrer"&gt;https://entra.microsoft.com&lt;/a&gt;.&lt;br&gt;
Log in using the credentials for your tenant.&lt;br&gt;
From the menu on the left, select User and then All users.&lt;br&gt;
Select + New user and then pick the Create new user option.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3zhlxzi2pyccfdp1eqiq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3zhlxzi2pyccfdp1eqiq.png" alt="ALL USERS " width="800" height="329"&gt;&lt;/a&gt;&lt;br&gt;
CLICK ON CREATE A NEW USERS&lt;/p&gt;

&lt;p&gt;STEP 2 Enter the requested information:&lt;br&gt;
Field                      Value&lt;br&gt;
User principal name BhogeswarK&lt;br&gt;
Display name            Bhogeswar Kalita&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5dpt1f38mlzw0phzjvng.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5dpt1f38mlzw0phzjvng.png" alt="NEW USERS" width="800" height="352"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 GO THE PROPERTIES &lt;br&gt;
 Select the Properties tab.&lt;br&gt;
Set the values for first and last name:&lt;br&gt;
Field   Value&lt;br&gt;
First name     Bhogeswar&lt;br&gt;
Last name      Kalita&lt;br&gt;
Note that you can set the User type to Member. If you pick Guest, it will restrict the users capabilities.&lt;br&gt;
Scroll down to the bottom of the page.&lt;br&gt;
Set the Usage location to United States or to whatever region you are in.&lt;br&gt;
Select the Review + create button.&lt;br&gt;
Select Create.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foit44igftzdubg227orr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foit44igftzdubg227orr.png" alt="PROPERTIES" width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 4 Invite an external user to your tenant&lt;br&gt;
Open a browser and connect to the Microsoft Entra admin center at &lt;a href="https://entra.microsoft.com" rel="noopener noreferrer"&gt;https://entra.microsoft.com&lt;/a&gt;.&lt;br&gt;
If prompted, log in using the credentials for your tenant.&lt;br&gt;
From the menu on the left, open the Identity menu.&lt;br&gt;
Select Users then select All users.&lt;br&gt;
At the top of the page select + New User.&lt;br&gt;
Choose the option to Invite external user from the dropdown.&lt;br&gt;
Enter the information for your new external user:&lt;/p&gt;

&lt;p&gt;Field              Value&lt;br&gt;
Email            ExtUser@testemailcom&lt;br&gt;
Display name      External User&lt;br&gt;
Message Thank you for joining the company for this short work project. We look forward to building this project together.&lt;br&gt;
Select the Review + Create button.&lt;br&gt;
Select Create.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjp7e8srwfkod81ibtdkf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjp7e8srwfkod81ibtdkf.png" alt="External" width="800" height="330"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frddhvlcchwpiakruj7k5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frddhvlcchwpiakruj7k5.png" alt="glorious" width="800" height="344"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 5 Assign Role To a user &lt;br&gt;
Open a browser and connect to the Microsoft Entra admin center at &lt;a href="https://entra.microsoft.com" rel="noopener noreferrer"&gt;https://entra.microsoft.com&lt;/a&gt;.&lt;br&gt;
If prompted, log in using the credentials for your tenant.&lt;br&gt;
In the left menu find the Identity section. Open it if not already opened.&lt;br&gt;
Select Users then select All users.&lt;br&gt;
Choose the user Bhogeswar Kalita create in the earlier task.&lt;br&gt;
From the newly opened menu select Assigned roles.&lt;br&gt;
At the top of the screen select + Add assignment.&lt;br&gt;
From the Select role dropdown menu chose the role Attribute Definition Reader.&lt;br&gt;
Select the Next button when it becomes available.&lt;br&gt;
Choose the option Eligible for Assignment type.&lt;br&gt;
Select Assign.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgpgmcnumgk0d6vcxi5yv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgpgmcnumgk0d6vcxi5yv.png" alt="Assign" width="800" height="353"&gt;&lt;/a&gt;&lt;br&gt;
Next step choose Assign role&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8twypsseynfihrnnvy9d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8twypsseynfihrnnvy9d.png" alt="roless" width="800" height="222"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz2oj88z5apf6qvxoj6s7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz2oj88z5apf6qvxoj6s7.png" alt=" " width="800" height="345"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>cloud</category>
      <category>ai</category>
      <category>programming</category>
    </item>
    <item>
      <title>🚛Logistics Administration: A Step-by-Step Daily Workflow with Linux🚛</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Wed, 24 Sep 2025 11:20:19 +0000</pubDate>
      <link>https://dev.to/ajayid10/logistics-administration-a-step-by-step-daily-workflow-with-linux-5f8f</link>
      <guid>https://dev.to/ajayid10/logistics-administration-a-step-by-step-daily-workflow-with-linux-5f8f</guid>
      <description>&lt;p&gt;WHAT IS LINUS Linux is an operating system like Windows, but it’s free, customizable, and used everywhere—from your phone to Google’s servers&lt;/p&gt;

&lt;p&gt;STEP 1 CREATE A FOLDER &lt;br&gt;
mkdir logistics_admin&lt;br&gt;
cd logistics_admin&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftls2liahyoq5fob7f7cj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftls2liahyoq5fob7f7cj.png" alt="Business" width="736" height="204"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 2 CREATE A SUB FOLDER&lt;br&gt;
mkdir invoices staff reports and type ls to list the directories&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmd03h8tufsev6h8ts2p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmd03h8tufsev6h8ts2p.png" alt="code" width="495" height="52"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 CREATE A FILES  WITH TOUCH&lt;br&gt;
touch invoices/invoice1.txt invoices/invoice2.txt&lt;br&gt;
touch staff/staff1.txt staff/staff2.txt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk9k7fbo8hqi3hnmm4hnq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk9k7fbo8hqi3hnmm4hnq.png" alt="touch" width="642" height="149"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 4 ADD CONTENT TO THE FILE &lt;br&gt;
Inside the editor: vim invoices/invoice1.txt&lt;br&gt;
Invoice ID: INV001&lt;br&gt;
Client: NNPC &lt;br&gt;
Amount: 1200&lt;br&gt;
Status: Pending&lt;br&gt;
👉 Save &amp;amp; exit in vim: press Esc, type :wq, then hit Enter&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7r6iufxmzh6tok96yt1v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7r6iufxmzh6tok96yt1v.png" alt="invoice" width="741" height="652"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frqirpto3i7omqohusoaw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frqirpto3i7omqohusoaw.png" alt="vim" width="536" height="46"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 5 ViEW CONTENT WITH CAT&lt;br&gt;
cat invoices/invoice1.txt&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft0ybh7rlhz9ja1kcs75s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft0ybh7rlhz9ja1kcs75s.png" alt="Imagsl" width="516" height="119"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;cat staff/staff1.txt&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwip97havxh7cwsbagcd4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwip97havxh7cwsbagcd4.png" alt="hhsnsad" width="434" height="77"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 6 COPY AND MOVE FILES &lt;br&gt;
Copy an invoice into reports:&lt;br&gt;
cp invoices/invoice1.txt reports/&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4wre22nuxdc46frst6y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff4wre22nuxdc46frst6y.png" alt="download" width="526" height="143"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Move a staff record into reports:&lt;br&gt;
mv staff/staff2.txt reports/&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkjbt228hbgt0m3ypbtwj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkjbt228hbgt0m3ypbtwj.png" alt="Imagedkdk" width="539" height="123"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;CONCLUSION&lt;br&gt;
This project demonstrates how basic Linux commands can be effectively applied to administrative tasks in a logistics department. By using simple tools such as mkdir, touch, vim, ls, cat,  cp, mv, pwd,  we created and managed invoices, staff logs, and daily reports in an organized structure. Each command served as a practical step in simulating real administrative duties, such as creating records, reviewing documents, searching for pending invoices, and generating reports.&lt;/p&gt;

&lt;p&gt;The workflow shows that Linux is not only a powerful operating system for developers and system administrators but also a practical tool for logistics management and administration. With its simplicity, speed, and flexibility, Linux provides a reliable environment to improve efficiency, ensure accurate record-keeping, and streamline daily operations in the logistics sector.&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>linux</category>
      <category>cloudpractitioner</category>
    </item>
    <item>
      <title>Simplifying DNS Zone Creation and Configuration</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Thu, 11 Sep 2025 13:04:14 +0000</pubDate>
      <link>https://dev.to/ajayid10/simplifying-dns-zone-creation-and-configuration-3450</link>
      <guid>https://dev.to/ajayid10/simplifying-dns-zone-creation-and-configuration-3450</guid>
      <description>&lt;p&gt;A DNS Zone is basically a section of the Domain Name System (DNS) that contains information about a specific domain and how traffic for that domain should be routed.&lt;/p&gt;

&lt;p&gt;It’s like a container that holds all the DNS records for a domain (or part of a domain), such as: A record → Maps a domain name (e.g., example.com) to an IP address.&lt;br&gt;
 CNAME record → Maps one domain name to another (e.g., &lt;a href="http://www.example.com" rel="noopener noreferrer"&gt;www.example.com&lt;/a&gt; → example.com). MX record → Defines mail servers for email delivery.&lt;br&gt;
TXT record → Stores text info, often for verification or security (like&lt;br&gt;
 SPF, DKIM).&lt;br&gt;
STEP BY STEP GUIDE TO CONFIGURE AND CREATE DOMAIN NAME SYSTEM &lt;/p&gt;

&lt;p&gt;STEP 1 On the Azure portal, search for and select Private DNS zones.&lt;br&gt;
Select + Create and configure the DNS zone.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr18jhrf5f1sht0feia3l.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fr18jhrf5f1sht0feia3l.png" alt="IGJLW" width="800" height="330"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj0piunii93t8392cwpa6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fj0piunii93t8392cwpa6.png" alt="ImGHUI" width="800" height="516"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F62r23ierrzerbhjefmyf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F62r23ierrzerbhjefmyf.png" alt="CRETAJ" width="793" height="573"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 2 Create a virtual network link to your private DNS zone&lt;br&gt;
In the portal, continue working on the private.contoso.com DNS zone.&lt;br&gt;
In the DNS Management blade, select + Virtual network links.&lt;br&gt;
Select + Add” and configure the virtual network link.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwhm7432tbtwpanacd4s2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fwhm7432tbtwpanacd4s2.png" alt="KJDHDGSB" width="800" height="322"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm5xnmrzk7uj3p0wynvoo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fm5xnmrzk7uj3p0wynvoo.png" alt="IHSJSBSK" width="800" height="415"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 Create a DNS record set&lt;br&gt;
In the portal, continue working on the private.contoso.com DNS zone.&lt;br&gt;
In the DNS Management blade, select + Recordsets.&lt;br&gt;
Notice that two A records have automatically been created for each of the virtual machines.&lt;br&gt;
Select + Add and configure a record set. When finished select Add&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7pdc5ui6xbq8e03ym1as.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7pdc5ui6xbq8e03ym1as.png" alt="hfdhllih" width="800" height="350"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff1mlset2hjole6i3hcxu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ff1mlset2hjole6i3hcxu.png" alt="Ihisoap" width="800" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>cloudskills</category>
      <category>cloudnative</category>
    </item>
    <item>
      <title>Step-by-Step Guide to Network Routing Configuration</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Thu, 11 Sep 2025 12:09:11 +0000</pubDate>
      <link>https://dev.to/ajayid10/step-by-step-guide-to-network-routing-configuration-1465</link>
      <guid>https://dev.to/ajayid10/step-by-step-guide-to-network-routing-configuration-1465</guid>
      <description>&lt;p&gt;WHAT IS ROUTE TABLE: A Route Table is like a map used by a network to decide where data should travel. It contains a set of rules (called routes) that tell network traffic which path to take to reach its destination.&lt;br&gt;
STEP BY STEP GUIDE TO CONFIGURE ROUTE TABLE &lt;br&gt;
STEP 1 In the search box, enter Route tables. When Route table appears in the search results, select it, and in the Route table page, select + Create and create the route table.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frvstrm62u7z51w6cfj5s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frvstrm62u7z51w6cfj5s.png" alt="route table" width="800" height="332"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn5t3xyj4wv92nngonxg6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn5t3xyj4wv92nngonxg6.png" alt="Imagsh" width="800" height="473"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 2 Associate the route table to the subnets&lt;br&gt;
n the portal, continue working with the route table, select app-vnet-firewall-rt.&lt;br&gt;
In the Settings blade, select Subnets and then + Associate.&lt;br&gt;
Configure an association to the frontend subnet, then select OK.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fulk1d1u60nc0f3vtw8mw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fulk1d1u60nc0f3vtw8mw.png" alt="RT" width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F91q8ekhsgfh6ebamafey.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F91q8ekhsgfh6ebamafey.png" alt="FGHT" width="800" height="352"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftp2gtbejzocidpxs2kpp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftp2gtbejzocidpxs2kpp.png" alt="IHDSN" width="800" height="358"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NEXT STEP FORWARD Configure an association to the backend subnet, then select OK.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnbp9qjrfdynhf9eyauf2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnbp9qjrfdynhf9eyauf2.png" alt="ImSAKAK" width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 Create a route in the route table&lt;br&gt;
In the portal, continue working with the route table, select app-vnet-firewall-rt.&lt;br&gt;
In the Settings blade, select Routes and then + Add.&lt;br&gt;
Configure the route, then select Add.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fej9wa7m0jijp9421bjuf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fej9wa7m0jijp9421bjuf.png" alt="ISKLJSK" width="800" height="305"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5wcjgynsc2358d0xnzvk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5wcjgynsc2358d0xnzvk.png" alt="GHSBALWE" width="800" height="353"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>cloudnative</category>
      <category>cloudskills</category>
    </item>
    <item>
      <title>Hands On with Azure Firewall Setup</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Wed, 10 Sep 2025 13:29:44 +0000</pubDate>
      <link>https://dev.to/ajayid10/hands-on-with-azure-firewall-setup-49nd</link>
      <guid>https://dev.to/ajayid10/hands-on-with-azure-firewall-setup-49nd</guid>
      <description>&lt;p&gt;What is Azure firewall An Azure Firewall is a cloud-based network security service provided by Microsoft Azure. It acts as a fully managed firewall that protects your cloud resources by controlling inbound (incoming) and outbound (outgoing) network traffic&lt;/p&gt;

&lt;p&gt;STEP BY STEP GUIDE IN CREATING AZURE FIREWALL&lt;br&gt;
STEP 1: In the search box at the top of the portal, enter Virtual networks. Select Virtual networks in the search results. Select app-vnet. Select Subnets. Select + Subnet.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsb6n2jcky9w7aqc5ufwi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsb6n2jcky9w7aqc5ufwi.png" alt="SUNET" width="800" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 2 Create an Azure Firewall&lt;br&gt;
the search box at the top of the portal, enter Firewall. Select Firewall in the search results.&lt;br&gt;
Select + Create.&lt;br&gt;
Create a firewall by using the values in the following table. For any property that is not specified, use the default value.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn9c2oxvykns2ps30z9cs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn9c2oxvykns2ps30z9cs.png" alt="IDWA" width="800" height="333"&gt;&lt;/a&gt;&lt;br&gt;
CLICK ON CREATE&lt;br&gt;
PROGRESSING FORWARD  FILL ALL THE PROPERTY TO CREATE AN AZURE FIREWALL&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw2vm9lxi0mkz8jalsbre.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw2vm9lxi0mkz8jalsbre.png" alt="SCREEN" width="800" height="515"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpdd5r4x7cebgkza5uxcx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpdd5r4x7cebgkza5uxcx.png" alt="NEW" width="800" height="426"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnqn9ors6k6oudcrp8alc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnqn9ors6k6oudcrp8alc.png" alt="GSSE" width="800" height="400"&gt;&lt;/a&gt;&lt;br&gt;
Deployment in progress&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyklwxfvgbwn97y4zfzkq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyklwxfvgbwn97y4zfzkq.png" alt=" " width="800" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 Update the Firewall Policy&lt;br&gt;
In the portal, search for and select Firewall Policies.&lt;br&gt;
Select fw-policy in the Settings blade, select Application rules and then Add a rule collection.&lt;br&gt;
Configure the application rule collection and then select Add&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh6yyd9bcccfflgrhl9hu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh6yyd9bcccfflgrhl9hu.png" alt="application" width="800" height="312"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;click on add rules collection &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fax0q9qwu3jrmpn2nw9gc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fax0q9qwu3jrmpn2nw9gc.png" alt="add rules" width="800" height="332"&gt;&lt;/a&gt;&lt;br&gt;
add rules for application&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fus3bt91zbq2x5klctbnv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fus3bt91zbq2x5klctbnv.png" alt="Imagfhnsjk" width="800" height="346"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;network rules &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4sjhiqwyv4k24nvt9c4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ft4sjhiqwyv4k24nvt9c4.png" alt="Imagthg" width="800" height="322"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3ds1lzgllkhy9cw8sle.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fz3ds1lzgllkhy9cw8sle.png" alt="Imageghkkjl" width="800" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloudcomputing</category>
      <category>cloud</category>
      <category>cloudskills</category>
      <category>cloudpractitioner</category>
    </item>
    <item>
      <title>Practical Approach to Network Security Group Setup</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Tue, 09 Sep 2025 14:43:24 +0000</pubDate>
      <link>https://dev.to/ajayid10/practical-approach-to-network-security-group-setup-4j26</link>
      <guid>https://dev.to/ajayid10/practical-approach-to-network-security-group-setup-4j26</guid>
      <description>&lt;p&gt;WHAT IS NETWEORK SECURITY GROUP&lt;br&gt;
A Network Security Group (NSG) is a security feature in cloud computing that acts like a virtual firewall. It controls inbound (incoming) and outbound (outgoing) traffic to and from cloud resources (like Virtual Machines, Subnets, or Databases)&lt;br&gt;
This works by using rules that either allow or deny specific types of traffic based on factors like:&lt;br&gt;
Source IP address Destination IP address Port number Protocol (TCP, UDP, etc.)&lt;br&gt;
STEP BY STEP OF CREATING NETWORK SECURITY &lt;br&gt;
STEP 1 CREATE A VIRTUAL MACHINE TOGETHER WITH NETWORK BY MAKING THE SUBNET TO BE FRONTEND AND THE AP-VNET AS A VIRTUAL NETWORK&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu6pcx96xu90y73uj3y2e.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fu6pcx96xu90y73uj3y2e.png" alt="Image" width="800" height="531"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fykaqrqidds6vqxhagbxs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fykaqrqidds6vqxhagbxs.png" alt="ISJA" width="800" height="336"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2wx59w1ai2dnpzh0qh9d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2wx59w1ai2dnpzh0qh9d.png" alt="ImagDS" width="800" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NETWORKING IMAGE&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw405sngjmekqiivzckq0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw405sngjmekqiivzckq0.png" alt="ImageGHDS" width="800" height="452"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgtscj0p2g7yxodrxixo0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgtscj0p2g7yxodrxixo0.png" alt="ImageSSS" width="800" height="504"&gt;&lt;/a&gt;&lt;br&gt;
VIRTUAL MACHINE 1 CREATED &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3jx95ferzn52ya7kdfbk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3jx95ferzn52ya7kdfbk.png" alt="Vm1" width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;CREATE ANOTHER VIRTUAL MACHINE TOGETHER WITH NETWORK BY MAKING THE SUBNET TO BE BACKEND AND THE AP-VNET AS A VIRTUAL NETWORK, CALLING IT VM2&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3rfu8dg0rhq23xmgxqxj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3rfu8dg0rhq23xmgxqxj.png" alt="VM2" width="800" height="533"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs8d5skc4237eeiw3nnm4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs8d5skc4237eeiw3nnm4.png" alt="ImagHSNSHJ" width="800" height="484"&gt;&lt;/a&gt;&lt;br&gt;
NETWORKING SETTING FOR VM2 &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqwdcnuliyu6ta79nv7jl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqwdcnuliyu6ta79nv7jl.png" alt="VNM2" width="800" height="506"&gt;&lt;/a&gt;&lt;br&gt;
VIRTUAL MACHINE 2 CREATED &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Focm3scdvdbilfjh5ks8t.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Focm3scdvdbilfjh5ks8t.png" alt="JDMS.A" width="800" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 2 Create Application Security Group&lt;br&gt;
WHAT IS APPLICATION SECURITY GROUP: An Application Security Group (ASG) is a cloud networking feature that helps simplify the management of network security rules by grouping virtual machines (VMs) or resources with similar functions, instead of applying rules to each resource individually&lt;/p&gt;

&lt;p&gt;GO TO APPLICATION SECURITY GROUP ON AZURE PORTAL AND PRESS CREATE&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmbnbgp01u5epv3crbnza.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fmbnbgp01u5epv3crbnza.png" alt="SECURITY" width="800" height="347"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4037aphpyvowtbwbza8s.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4037aphpyvowtbwbza8s.png" alt="ImagAKJDYK" width="800" height="434"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NEXT STEP Associate the application security group to the network interface of the VM&lt;br&gt;
In the Azure portal, search for and select VM1.&lt;br&gt;
In the Networking blade, select Application security groups and then select Add application security groups.&lt;br&gt;
Select the app-frontend-asg and then select Add.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F65tdr6s61hgy7ocafy78.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F65tdr6s61hgy7ocafy78.png" alt="WATER" width="800" height="363"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 Create and Associate the Network Security Group&lt;br&gt;
IT IS NECESSARY TO CREATE NETWORK SECURITY GROUP BECAUSE IT HELP TO GIVE RULES TO APPLICATION SECURITY GROUP &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flnlwmr86i5p36wqvs270.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flnlwmr86i5p36wqvs270.png" alt="NSDG" width="800" height="344"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsloto8mokrirsuszxxk4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fsloto8mokrirsuszxxk4.png" alt=" " width="800" height="526"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NEXT MOVE Associate the NSG with the app-vnet backend subnet.&lt;/p&gt;

&lt;p&gt;NSGs can be associated with subnets and/or individual network interfaces attached to Azure virtual machines.&lt;br&gt;
Select Go to resource or navigate to the app-vnet-nsg resource.&lt;br&gt;
In the Settings blade select Subnets.&lt;br&gt;
Select + Associate&lt;br&gt;
Select app-vnet (RG1) and then the Backend subnet. Select OK.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyk8mybwd065uq599ca2n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyk8mybwd065uq599ca2n.png" alt="SUBNET" width="800" height="329"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foloj7d2pspjhm30axl9p.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foloj7d2pspjhm30axl9p.png" alt=" " width="800" height="349"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 4 Create Network Security Group rules&lt;br&gt;
An NSG use security rules to filter inbound and outbound network traffic.&lt;br&gt;
In the search box at the top of the portal, enter Network security groups. Select Network security groups in the search results.&lt;br&gt;
Select app-vnet-nsg from the list of network security groups.&lt;br&gt;
In the Settings blade, select Inbound security rules.&lt;br&gt;
Select + Add and configure an inbound security rule.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh8uw6edr57fogz46glbw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh8uw6edr57fogz46glbw.png" alt="RULES" width="800" height="349"&gt;&lt;/a&gt;&lt;br&gt;
Source&lt;br&gt;
Any&lt;br&gt;
Source port ranges&lt;br&gt;
*&lt;br&gt;
Destination&lt;br&gt;
Application security group&lt;br&gt;
Destination application security groups&lt;br&gt;
app-frontend-asg&lt;br&gt;
No application security groups found&lt;br&gt;
Service&lt;br&gt;
SSH&lt;br&gt;
Destination port ranges&lt;br&gt;
22&lt;br&gt;
Protocol&lt;br&gt;
Any&lt;br&gt;
TCP&lt;br&gt;
UDP&lt;br&gt;
ICMPv4&lt;br&gt;
ICMPv6&lt;br&gt;
Action&lt;br&gt;
Allow&lt;br&gt;
Deny&lt;br&gt;
Priority&lt;br&gt;
100&lt;br&gt;
Name&lt;br&gt;
AllowSSH&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F899iwno5u99jor1fv8ni.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F899iwno5u99jor1fv8ni.png" alt="ALLOW" width="800" height="331"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>cloudskills</category>
      <category>cloudpractitioner</category>
    </item>
    <item>
      <title>Getting Started with Virtual Network Setup</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Mon, 08 Sep 2025 15:17:03 +0000</pubDate>
      <link>https://dev.to/ajayid10/getting-started-with-virtual-network-setup-1be7</link>
      <guid>https://dev.to/ajayid10/getting-started-with-virtual-network-setup-1be7</guid>
      <description>&lt;p&gt;WHAT IS A VIRTUAL MACHINE: A Virtual Network (VNet) in cloud computing is a software-based version of a physical network that allows cloud resources (like virtual machines, databases, and applications) to securely communicate with each other, the internet, and on-premises networks&lt;/p&gt;

&lt;p&gt;STEP BY STEP GUIDE IN SETTING UP A VIRTUAL MACHINE &lt;/p&gt;

&lt;p&gt;STEP 1 : Search for and select Virtual Networks.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq1rhfqajsbc0vjg9kdb6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq1rhfqajsbc0vjg9kdb6.png" alt="Image" width="800" height="455"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;NEXT STEP YOU CLICK ON CREATE&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupy6gro9sco2q89j5hmq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fupy6gro9sco2q89j5hmq.png" alt="CREATE" width="800" height="355"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;FILL UP THE BASIC ON CREATE VIRTUAL NETWORK &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9vz51li4g9k8qmp6x2qc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9vz51li4g9k8qmp6x2qc.png" alt="BASICS" width="800" height="365"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;FILL UP IP ADDRESSS &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7movpawoneeub6gqn8jp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7movpawoneeub6gqn8jp.png" alt="IP" width="800" height="482"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;FILL UP THE SUBNET FOR FRONTEND &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq9wgxhv9u6kaugpjmzhp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fq9wgxhv9u6kaugpjmzhp.png" alt="front end" width="800" height="350"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;ADD ANOTHER SUBNET BACKEND &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F587bteq16k4mh7s6r2ev.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F587bteq16k4mh7s6r2ev.png" alt="BACKEND" width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;select “Review + create and then Create&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyasdnjqczx5gt66spkx5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyasdnjqczx5gt66spkx5.png" alt="review and create" width="800" height="519"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxy3dt2gbfh60trfd5k2u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fxy3dt2gbfh60trfd5k2u.png" alt="babab" width="675" height="607"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 2   CREATE THE HUB-VNET VIRTUAL NETWORK CONFIGURATION &lt;/p&gt;

&lt;p&gt;CREATE A VIRTUAL NETWORK AND CLICK ON CREATE&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F118q7b2887sxde5rid8u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F118q7b2887sxde5rid8u.png" alt="ImaHND" width="800" height="357"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;FILL UP THE BASIC &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnaoywl81p84frqn9x4ti.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnaoywl81p84frqn9x4ti.png" alt="VNET" width="800" height="495"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;FILL UP THE IP AND SUBNET&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8oevnsr9cibm1mbrakxk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8oevnsr9cibm1mbrakxk.png" alt="SUBNET" width="800" height="359"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;REVIEW AND CREATE&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpxdsolckg01oqh6vz3ku.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpxdsolckg01oqh6vz3ku.png" alt="CREATE" width="800" height="484"&gt;&lt;/a&gt;&lt;br&gt;
CLICK ON CREATE&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fofwi6b3t27je4twzr3km.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fofwi6b3t27je4twzr3km.png" alt="FINE" width="680" height="599"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 Configure a peer relationship between the virtual networks&lt;/p&gt;

&lt;p&gt;Search for and select the app-vnet virtual network.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2hjgm4nojz5ffwxlhg9f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2hjgm4nojz5ffwxlhg9f.png" alt=" " width="800" height="292"&gt;&lt;/a&gt;&lt;br&gt;
CLICK IN THE APP- VNET AND SELECT PEERING &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F17v6cl1pg0f4t5zgmw1q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F17v6cl1pg0f4t5zgmw1q.png" alt="PEERING" width="800" height="334"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Add a peering between the two virtual networks&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftoqsk8orl60l58nq7sb2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftoqsk8orl60l58nq7sb2.png" alt="HUB" width="800" height="449"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn91rhd1fix4peaoy7eq4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn91rhd1fix4peaoy7eq4.png" alt="LOCAL" width="800" height="393"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;SUCCESFUL PEARING OF HUB TO APP VNET&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcemb3kizmqotmk7d2hyw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcemb3kizmqotmk7d2hyw.png" alt="CONNECTED" width="800" height="341"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>devops</category>
      <category>devchallenge</category>
    </item>
    <item>
      <title>HOW TO CREATE A KEYVAULT ON AZURE WITH CMD STEP BY STEP GUIDE</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Sun, 07 Sep 2025 02:07:26 +0000</pubDate>
      <link>https://dev.to/ajayid10/how-to-create-a-keyvault-on-azure-with-cmd-step-by-step-guide-4jfp</link>
      <guid>https://dev.to/ajayid10/how-to-create-a-keyvault-on-azure-with-cmd-step-by-step-guide-4jfp</guid>
      <description>&lt;p&gt;WHAT IS KEYVAULT &lt;br&gt;
Azure Key Vault is a cloud service from Microsoft that helps you store and protect sensitive information like: Secrets (e.g., passwords, connection strings, API keys) Keys (e.g., encryption keys)&lt;br&gt;
Certificates (e.g., SSL/TLS certificates) Instead of hardcoding secrets in your app or keeping them in plain text, you put them in Key Vault. Your app can then fetch them securely when needed.&lt;/p&gt;

&lt;p&gt;STEP BY STEP GUIDE ON CMD &lt;br&gt;
STEP 1 LONGIN INTO AZURE ON CMD WITH AZ LOGIN &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw0wihnm8oqasrfxksk0v.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw0wihnm8oqasrfxksk0v.png" alt="az login " width="800" height="378"&gt;&lt;/a&gt;&lt;br&gt;
click on the email registered on azure &lt;/p&gt;

&lt;p&gt;NEXT STEP YOU WILL TYPE 1 TO LOG IN PERFECTLY DUE TO SUBSCRIPTION IS 1&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx9q2683egk5zx5q01ly.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjx9q2683egk5zx5q01ly.png" alt="Image 1" width="800" height="147"&gt;&lt;/a&gt;&lt;br&gt;
TYPE 1&lt;/p&gt;

&lt;p&gt;STEP 2 CREATE RESOURCEGROUP WITH THIS CODE = az group create --name myresourcegroup --location eastus&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpile6t4hwwjxaajmgvyv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpile6t4hwwjxaajmgvyv.png" alt="RESOURCES" width="800" height="238"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;STEP 3 CREATE THE KEY VAULT WITH THIS CODE = az keyvault create --name mykeydaniel123 --resource-group myresourcegroup --location eastus&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo00vpqayn3fugylheceh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo00vpqayn3fugylheceh.png" alt="KEY" width="800" height="395"&gt;&lt;/a&gt;&lt;br&gt;
Purpose of using clI Instead of clicking around in the Azure Portal, you can script everything with CLI&lt;/p&gt;

&lt;p&gt;STEP 4 ROLE ASSIGNMENT TO MAKE ABLE TO STORE THE KEY=az role assignment create --assignee 3095d940-46b7-4239-bfed-f46a193281c1 --role "Key Vault Secrets Officer"--scope "/subscriptions/fdf2e0bf-0c36-45cc-8ae5-2f2e84aa3dbe/resourceGroups/myresourcegroup/providers/Microsoft.KeyVault/vaults/mykeydaniel123"&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1svnxrdivso6z3w3q3tf.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1svnxrdivso6z3w3q3tf.png" alt="ROLE" width="800" height="198"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This command is how you assign permissions in Azure when the Key Vault is using RBAC (Role-Based Access Control) instead of access policies.&lt;/p&gt;

&lt;p&gt;STEP 5 STORE SECRET KEY WITH THIS CODE =az keyvault secret set --name mysecret --value "kolawole@123" --vault-name mykeydaniel123&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fijpke396jefl84jsuf18.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fijpke396jefl84jsuf18.png" alt="STORE" width="800" height="271"&gt;&lt;/a&gt;&lt;br&gt;
Storing secret keys in Azure Key Vault through CMD is important because it keeps sensitive data (like passwords, API keys, and connection strings) safe, centralized, and encrypted. Instead of exposing secrets in code or config files, you use secure commands to store and retrieve them, ensuring better security, access control, and compliance.&lt;/p&gt;

&lt;p&gt;STEP 6 RETRIEVE SECRET KEY VALUE MAKE USE OF THIS CODE =az keyvault secret show --vault-name mykeydaniel123 --name mysecret --query value -o tsv&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2tl9piowms0ks0hsj0ub.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2tl9piowms0ks0hsj0ub.png" alt="DDDD" width="800" height="48"&gt;&lt;/a&gt;&lt;br&gt;
Azure Key Vault lets you securely store and retrieve secrets like passwords or API keys using simple CLI commands. This ensures sensitive data stays protected, centralized, and easily managed without exposing it in your code.&lt;/p&gt;

&lt;p&gt;STEP 7 USEFUL LISTING MAKE USE OF THIS CODE =az keyvault secret list --vault-name mykeydaniel123 -o table&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3tnn42hovwfsikss6iy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fo3tnn42hovwfsikss6iy.png" alt="DDV" width="800" height="101"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;HIGLIGHT OF THE EFFECT OF CREATING KEYVAULT ON CMD AND REFLECTING ON YOUR MAIN AZURE PORTAL &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9frjbljt2sqk0zd7csu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl9frjbljt2sqk0zd7csu.png" alt="RESOURCES " width="800" height="265"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzl34v9ehpjsxq2xvu3mo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fzl34v9ehpjsxq2xvu3mo.png" alt="MY KEY " width="800" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa4jjzfptqdj6v1v102q6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa4jjzfptqdj6v1v102q6.png" alt="FGD" width="800" height="307"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>devops</category>
      <category>cloud</category>
      <category>cloudcomputing</category>
      <category>developers</category>
    </item>
    <item>
      <title>How to Store Secrets keys in Azure Key Vault</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Fri, 05 Sep 2025 17:58:45 +0000</pubDate>
      <link>https://dev.to/ajayid10/how-to-store-secrets-keys-in-azure-key-vault-4ap5</link>
      <guid>https://dev.to/ajayid10/how-to-store-secrets-keys-in-azure-key-vault-4ap5</guid>
      <description>&lt;p&gt;What is Azure Key Vault &lt;br&gt;
Azure Key Vault is a secure cloud service for storing and managing secrets, keys, and certificates so apps don’t expose sensitive data&lt;/p&gt;

&lt;p&gt;Azure Key Vault is that safe deposit box where the following are been stored&lt;br&gt;
Passwords&lt;br&gt;
API keys&lt;br&gt;
Database connection strings&lt;br&gt;
Encryption certificates&lt;br&gt;
Therefore Only the apps or people you authorize can open it.&lt;/p&gt;

&lt;p&gt;The benefit of Azure KeyVault&lt;/p&gt;

&lt;p&gt;Security: Protects secrets with strong encryption.&lt;br&gt;
Access Control: You control who/what can access the vault (via Azure Active Directory).&lt;br&gt;
Central Management: All secrets in one place, no need to hard-code them into apps.&lt;br&gt;
Automation: Apps can retrieve secrets directly when running, instead of developers copying them around.&lt;/p&gt;

&lt;p&gt;STEP BY STEP IN CREATING AZURE KEY VAULT&lt;/p&gt;

&lt;p&gt;STEP 1 Select Create a resource GROUP&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyanj9ecnbh0ivnw97tz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fgyanj9ecnbh0ivnw97tz.png" alt="CLICK ON CREATE" width="800" height="466"&gt;&lt;/a&gt;&lt;br&gt;
Click on create&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmf7qro2gihd6r2ah85d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvmf7qro2gihd6r2ah85d.png" alt=" click review &amp;amp; create " width="800" height="439"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;click on create&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4c68ss2zkhsvv91vg71.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk4c68ss2zkhsvv91vg71.png" alt="create" width="587" height="593"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2&lt;br&gt;
In the Search services, search for and select Key Vault to find the Azure Key Vault service. The Key Vault pane appears.&lt;/p&gt;

&lt;p&gt;You click on create&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn8iwmge742w1lppvxrm5.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fn8iwmge742w1lppvxrm5.png" alt="Keyvault" width="800" height="382"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You impute all the necessary information &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3xbzz779q5kw5e1hs48x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3xbzz779q5kw5e1hs48x.png" alt="Image" width="800" height="525"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjim43io14nhh379ickvo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjim43io14nhh379ickvo.png" alt="Information" width="800" height="447"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbrqdim0gmquj7qoz5etz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbrqdim0gmquj7qoz5etz.png" alt="Purge" width="800" height="207"&gt;&lt;/a&gt;&lt;br&gt;
To enable purge if someone deletes a vault or object, Azure keeps it in a retention period (e.g., 90 days by default).&lt;/p&gt;

&lt;p&gt;It cannot be purged during that period → you can recover it if deleted by mistake or by an attacKer&lt;/p&gt;

&lt;p&gt;click on create&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8sze2zg9gys1h2zgb76u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8sze2zg9gys1h2zgb76u.png" alt=" important" width="469" height="560"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Deployment complete&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftc2wdyvuubv5lj18hjfx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftc2wdyvuubv5lj18hjfx.png" alt=" " width="800" height="376"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After validation passes, select Create to create the Azure Key Vault.&lt;/p&gt;

&lt;p&gt;After the deployment is complete, select Go to resource. Your Key vault pane appears.&lt;br&gt;
The name of the key is dairy&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fictow1menl3v73adg648.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fictow1menl3v73adg648.png" alt="Dairy" width="800" height="329"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3 add a new secret to the vault.&lt;br&gt;
In the left menu pane, under Objects, select Secrets. The Secrets pane appears for your key vault&lt;br&gt;
In the top menu bar, select Generate/Import. The Create a secret pane appears.&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb2tnnruwp46odfln8qhm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fb2tnnruwp46odfln8qhm.png" alt="key 2" width="800" height="384"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Enter a name, value, &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy025rzcuuxuo4kmin255.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fy025rzcuuxuo4kmin255.png" alt="boom" width="578" height="590"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You Must add role to be able to keep A Key secret&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkiukfkaeueg2iims2ll2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkiukfkaeueg2iims2ll2.png" alt="iway" width="800" height="370"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Show the secrete key&lt;br&gt;
verify that the secret value has been set&lt;br&gt;
Select your secret from the list. The Versions pane appears for your secret.&lt;br&gt;
Select the CURRENT VERSION of the secret. The Secret Version pane appears.&lt;br&gt;
Select Show Secret Value to see the value assigned to the secret.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6uezbt5anr6wfuc4ejn6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6uezbt5anr6wfuc4ejn6.png" alt="secrete" width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4egdtx8orhqzilxa5exj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4egdtx8orhqzilxa5exj.png" alt="vbcbn" width="800" height="204"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4pr9mlgat2ixngncfvpo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4pr9mlgat2ixngncfvpo.png" alt="hidden" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>javis</category>
      <category>devop</category>
      <category>azure</category>
    </item>
    <item>
      <title>How To Configure Microsoft Defender for Cloud Enhanced Security Features for Servers</title>
      <dc:creator>Ajayi Daniel</dc:creator>
      <pubDate>Tue, 26 Aug 2025 09:45:05 +0000</pubDate>
      <link>https://dev.to/ajayid10/how-to-configure-microsoft-defender-for-cloud-enhanced-security-features-for-servers-4j58</link>
      <guid>https://dev.to/ajayid10/how-to-configure-microsoft-defender-for-cloud-enhanced-security-features-for-servers-4j58</guid>
      <description>&lt;p&gt;Microsoft Defender for Cloud is Microsoft’s cloud-native security platform that helps protect workloads across Azure, on-premises, and multi-cloud environments.&lt;br&gt;
Core Capabilities&lt;br&gt;
Workload Protection&lt;br&gt;
Provides Defender plans for specific workloads:&lt;br&gt;
Defender for Servers 🖥️&lt;br&gt;
Defender for SQL Databases 💾&lt;br&gt;
Defender for Storage 📦&lt;br&gt;
Defender for Key Vault 🔑&lt;br&gt;
Defender for Containers&lt;br&gt;
Defender for App Services, API Management, etc.&lt;br&gt;
Threat Detection &amp;amp; Alerts&lt;br&gt;
Detects real-time threats using built-in threat intelligence and machine learning.&lt;br&gt;
Raises security alerts for suspicious activity (malware, brute-force attacks, anomalous logins, etc.).&lt;/p&gt;

&lt;p&gt;Step By Step to configure Microsoft Defender for Cloud Enhanced Security Features for Servers&lt;/p&gt;

&lt;p&gt;Step 1: Enable Microsoft Defender for Servers&lt;br&gt;
Sign in to the Azure Portal → Go to Microsoft Defender for Cloud.&lt;/p&gt;

&lt;p&gt;Step 2: In the Management section, select Environment settings.&lt;br&gt;
Choose the subscription or management group where you want to enable enhanced security.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcllg6jl7vd2ggzh1cnd2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcllg6jl7vd2ggzh1cnd2.png" alt="Image security" width="800" height="457"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 3 select Environment settings.&lt;br&gt;
Choose the subscription or management group where you want to enable enhanced security.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2pw9ycbq7hzhu1w0hl69.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2pw9ycbq7hzhu1w0hl69.png" alt="Azure" width="800" height="353"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 4 In the Settings blade, under Defender plans, expand Cloud Workload Protection (CWP).&lt;br&gt;
From the Cloud Workload Protection (CWP) Plan list, select Servers. On the right side of the page, change the Status from Off to On, then click Save.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rzi7g5xi22o30scav8f.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0rzi7g5xi22o30scav8f.png" alt="Image defender" width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;step 5 change the Status from Off to On, then click Save.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fot6l52v8h8qbzj2v6v15.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fot6l52v8h8qbzj2v6v15.png" alt="log analytic" width="800" height="361"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 6 To review the details of Microsoft Defender for Servers Plan 2, select Change plan &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw16o77fwcoux5bqk66om.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fw16o77fwcoux5bqk66om.png" alt="review" width="800" height="365"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg6bmjnxe87hakhfhu9ig.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg6bmjnxe87hakhfhu9ig.png" alt="one defender" width="800" height="351"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cloud</category>
      <category>devops</category>
      <category>webdev</category>
      <category>security</category>
    </item>
  </channel>
</rss>
