<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Emmanuel</title>
    <description>The latest articles on DEV Community by Emmanuel (@degreatkhali).</description>
    <link>https://dev.to/degreatkhali</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3885718%2F9d4e31e7-b9bd-4392-a0d8-d96bed4acd0a.jpg</url>
      <title>DEV Community: Emmanuel</title>
      <link>https://dev.to/degreatkhali</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/degreatkhali"/>
    <language>en</language>
    <item>
      <title>Hosting Public Website Content with Azure Blob Storage</title>
      <dc:creator>Emmanuel</dc:creator>
      <pubDate>Sat, 02 May 2026 22:07:55 +0000</pubDate>
      <link>https://dev.to/degreatkhali/hosting-public-website-content-with-azure-blob-storage-45ln</link>
      <guid>https://dev.to/degreatkhali/hosting-public-website-content-with-azure-blob-storage-45ln</guid>
      <description>&lt;p&gt;&lt;strong&gt;ABOUT THIS LAB&lt;/strong&gt;&lt;br&gt;
I am currently on my devops path, and honestly I do have a long way to go. And yes this lab prepard you for the AZ-104 exam, Lab 02a from &lt;a href="https://microsoftlearning.github.io/Secure-storage-for-Azure-Files-and-Azure-Blob-Storage/Instructions/Labs/LAB_02a_storage_public_website.html" rel="noopener noreferrer"&gt;Microsoft Learn&lt;/a&gt; was one of those sessions that looks simple first until you hit a permission wall you did not expect like I did. Here is the full walkthrough, including the gotcha that tripped me up.&lt;/p&gt;

&lt;p&gt;The objective of this lab is to configure an Azure Storage account that can host public-facing content such as images, videos, and documents while supporting high availability, soft delete protection, and blob versioning.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TASK 01  Creating the Storage Account&lt;/strong&gt;&lt;br&gt;
The first task is to create a storage account that can tolerate a regional outage. The key decision here is redundancy level.&lt;br&gt;
For a public website that needs to stay online even if an Azure region goes down, Read-access Geo-redundant Storage (RA-GRS) is the right call. It replicates data to a secondary region and makes that copy readable so content stays available during a primary region incident.&lt;/p&gt;

&lt;p&gt;Storage account name = publicwebsite[your-unique-id]&lt;br&gt;
Redundancy = RA-GRS (Read-access geo-redundant)&lt;br&gt;
Region  = Your nearest Azure region&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Storage account Basics tab — name, region, redundancy selection&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpumo7e0rl8m1riypf1my.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpumo7e0rl8m1riypf1my.png" alt=" " width="800" height="643"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TASK 02  Configuring Public Access — And the Error I Hit&lt;/strong&gt;&lt;br&gt;
This is where things got interesting for me. The lab requires enabling anonymous access so that anyone with the file’s URL can view it no Azure credentials required.&lt;br&gt;
There are two separate levels where this needs to be enabled: the storage account level, and the individual container level. Miss either one and you will get an error.&lt;/p&gt;

&lt;p&gt;Step 1: In the storage account’s Configuration blade, set Allow blob anonymous access to Enabled.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Configuration blade — ‘Allow blob anonymous access’ toggled to Enabled&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fva3u7ndqsvpu4iv4k3mh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fva3u7ndqsvpu4iv4k3mh.png" alt=" " width="800" height="538"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;⚠ &lt;em&gt;THE ERROR I HIT&lt;/em&gt;&lt;br&gt;
&lt;em&gt;After enabling the setting, I immediately navigated to the container and tried changing its Public access level to Blob.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;THE FIX&lt;/em&gt;&lt;br&gt;
I forgot to click Save at the top of the Configuration blade before navigating away. And this is one thing we really have to pay attention to.&lt;br&gt;
Azure does not auto-save configuration changes. Once I went back, saved properly, and returned to the container the access level change went through without issue.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Error message when attempting to change container access level before saving&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F54fi8rbhx9ryh2hjahl8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F54fi8rbhx9ryh2hjahl8.jpeg" alt=" " width="800" height="264"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Container access level successfully changed to ‘Blob’ after saving&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TASK 03  Uploading Content &amp;amp; Testing Public Access&lt;/strong&gt;&lt;br&gt;
With the container named public and access set to Blob, I uploaded a sample image file. Then I copied the blob’s URL from the portal and pasted it into a browser window no Azure sign-in, no SAS token. The image loaded immediately-because anonymous blob access was enabled at both the storage account and container levels, the file became publicly accessible through its direct blob URL.&lt;/p&gt;

&lt;p&gt;• Navigate to the container → Upload a file&lt;br&gt;
• Click the uploaded blob → copy the URL from the properties pane&lt;br&gt;
• Open an incognito browser window → paste the URL → image loads publicly_&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqshmk1u3ssaqni69anwv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqshmk1u3ssaqni69anwv.png" alt=" " width="800" height="359"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Uploaded a sample file to the container&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuh6vicdnizp4tnvva4qm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuh6vicdnizp4tnvva4qm.png" alt=" " width="800" height="302"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;browser showing the image loaded via the public blob URL&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhw6fn4acc4y7rxzs9zvy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhw6fn4acc4y7rxzs9zvy.png" alt=" " width="800" height="515"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TASK 04  Enabling Soft Delete&lt;/strong&gt;&lt;br&gt;
Soft delete is Azure’s recycle bin for blobs. When enabled, deleted blobs is not immediately removed they enter a deleted state and remain recoverable for a configurable retention period. I did set the retention to 21 days, then tested it. Note, the count starts from the day you set it so you would see 20 instead of 21.&lt;/p&gt;

&lt;p&gt;• Deleted the uploaded file from the container&lt;br&gt;
• Toggled ‘Show deleted blobs’ — the file reappeared, marked as deleted&lt;br&gt;
• Clicked Undelete — the file was instantly restored&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Data Protection blade — Blob soft delete enabled, 21 days retention&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftor4dj93fkenbz3bqz33.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftor4dj93fkenbz3bqz33.png" alt=" " width="464" height="491"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk8sr03f3w14duujkibmq.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fk8sr03f3w14duujkibmq.png" alt=" " width="800" height="361"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Show deleted blobs’ toggled — deleted blob visible with strikethrough indicator.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1xen4k1ps45h4vem5mzo.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1xen4k1ps45h4vem5mzo.png" alt=" " width="800" height="229"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;TASK 05  Enabling Blob Versioning&lt;/strong&gt;&lt;br&gt;
Soft delete protects against deletion. Blob versioning protects against overwriting. When versioning is on, every time a blob is updated, Azure automatically retains the previous version. You can promote any past version back to current at any time.&lt;br&gt;
I tested it by uploading an updated version of the same file. Under Show deleted blobs, the original version appeared as a previous version entry fully restorable.&lt;/p&gt;

&lt;p&gt;Blob versioning = Enabled&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Versioning settings — Enabled, tracking versions when blobs are overwritten&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feswdvwa4xmgumvfz2j7d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Feswdvwa4xmgumvfz2j7d.png" alt=" " width="689" height="557"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What I Learned&lt;/strong&gt;&lt;br&gt;
This lab gave me a much better understanding of how Azure Storage handles public access, redundancy, and data protection. The biggest lesson for me was realizing that Azure configurations often depend on multiple settings working together — especially when dealing with permissions and public access.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Key Takeaways&lt;/strong&gt;&lt;br&gt;
Lesson  Detail&lt;br&gt;
Order matters   &lt;em&gt;Account-level&lt;/em&gt; anonymous access must be saved before container-level access can be changed.&lt;br&gt;
&lt;em&gt;RA-GRS resilience&lt;/em&gt; Geo-redundant storage keeps content available even during a primary region outage.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Two-level access gates&lt;/em&gt; Anonymous access has both an account-level and a container-level gate. Both must be configured independently.&lt;br&gt;
&lt;em&gt;Soft delete + versioning&lt;/em&gt; Soft delete covers accidental deletions. Versioning covers accidental overwrites. Use both together.&lt;/p&gt;

&lt;p&gt;Have you run into the same “forgot to save” trap in Azure? Or found a smarter way to structure blob storage for static sites? Drop a comment I did love to hear how others are approaching this.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>blobstorage</category>
      <category>beginners</category>
      <category>devopspath</category>
    </item>
    <item>
      <title>From Zero to Secure: Setting Up Azure Storage on My DevOps Journey</title>
      <dc:creator>Emmanuel</dc:creator>
      <pubDate>Tue, 21 Apr 2026 12:03:35 +0000</pubDate>
      <link>https://dev.to/degreatkhali/from-zero-to-secure-setting-up-azure-storage-on-my-devops-journey-3g97</link>
      <guid>https://dev.to/degreatkhali/from-zero-to-secure-setting-up-azure-storage-on-my-devops-journey-3g97</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpo5pvxesb83s3tliw8mx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpo5pvxesb83s3tliw8mx.png" alt=" " width="800" height="482"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Everyone starts somewhere. The goal was straightforward: Create a secure, cost-effective storage account in Azure using the guided Lab which you can find on Microsoft Learn. Think of it as setting up a digital locker where your data lives safely in the cloud.&lt;br&gt;
Here is what I did, what I learned, and why it matters.&lt;/p&gt;




&lt;p&gt;Step 1: Creating a Resource Group&lt;/p&gt;

&lt;p&gt;Before building anything, I needed somewhere to put it. In Azure, that's a resource group essentially a logical container that keeps related resources organized and easy to manage. It is a small step, but a foundational one. Good organization now saves headaches later.&lt;/p&gt;

&lt;p&gt;Resource group creation in Azure Portal- can be found for searching the portal and selecting it&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkp6lfrhoav1ifmfss1n.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftkp6lfrhoav1ifmfss1n.png" alt=" " width="800" height="443"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 2: Setting Up the Storage Account&lt;/p&gt;

&lt;p&gt;Next came the storage account itself the actual "locker." Azure storage accounts can hold blobs, files, queues, and tables. For this lab, I focused on understanding the configuration options: naming conventions, region selection, and performance tiers.&lt;br&gt;
It is surprisingly satisfying clicking through a wizard and watching a cloud resource come to life.&lt;/p&gt;

&lt;p&gt;Storage account created in Azure Portal with a unique name.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fssujgslhkrneqhbhvx3x.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fssujgslhkrneqhbhvx3x.png" alt=" " width="800" height="628"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 3: Locking It Down — Security Settings&lt;/p&gt;

&lt;p&gt;This was the most important part. I applied three key security configurations:&lt;br&gt;
• Secure transfer only — enforces HTTPS, rejecting any plain HTTP connections&lt;br&gt;
• Minimum TLS version — set to TLS 1.2 to block outdated, vulnerable protocols&lt;br&gt;
• Shared key access disabled — forces authentication through Azure Active Directory instead of less secure key-based access&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh70o85cgtt2xhvwrfbdi.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh70o85cgtt2xhvwrfbdi.png" alt=" " width="800" height="705"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;These are not optional extras — they are baseline hygiene for any cloud storage setup.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fswn58jl467bf0dm71ard.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fswn58jl467bf0dm71ard.png" alt=" " width="800" height="395"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Step 4: Redundancy and Networking&lt;/p&gt;

&lt;p&gt;Since this was a training lab, I made practical trade-offs:&lt;br&gt;
• Redundancy: I chose Locally Redundant Storage (LRS), which is the most affordable option, suitable for non-critical data.&lt;br&gt;
• Networking: I kept public network access enabled to allow the lab tasks to run without friction.&lt;/p&gt;

&lt;p&gt;In a production environment, I will likely switch to geo-redundant storage and lock down network access to specific virtual networks or private endpoints. But knowing why you'd make that change is exactly what lab like this teaches you.&lt;br&gt;
Redundancy and networking configuration&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffjs73ka4bvg5bm2wl9n1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffjs73ka4bvg5bm2wl9n1.png" alt=" " width="800" height="349"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;This lab was not about storing real data — it was about building a mental model. I now understand how to spin up a storage account, apply security best practices, and make informed trade-offs between cost, redundancy, and access control.&lt;/p&gt;

&lt;p&gt;If you are just starting out with Azure, I would encourage you to follow along with the hands-on labs. There is no better way to learn than by actually doing.&lt;br&gt;
What is next? I am moving on to Azure networking and virtual machines. Follow along if you are on a similar journey. &lt;/p&gt;

</description>
      <category>azure</category>
      <category>security</category>
      <category>storage</category>
      <category>devops</category>
    </item>
  </channel>
</rss>
