<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Sudha Chandran B C</title>
    <description>The latest articles on DEV Community by Sudha Chandran B C (@sudhachandranbc).</description>
    <link>https://dev.to/sudhachandranbc</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F427875%2F2ab7a5b5-2145-4936-b0f1-425b33b51031.png</url>
      <title>DEV Community: Sudha Chandran B C</title>
      <link>https://dev.to/sudhachandranbc</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/sudhachandranbc"/>
    <language>en</language>
    <item>
      <title>Azure Hands-on: Create Virtual Machine Scale Set and Install App</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Tue, 25 Aug 2020 04:30:53 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/azure-hands-on-create-virtual-machine-scale-set-and-install-iis-59jf</link>
      <guid>https://dev.to/sudhachandranbc/azure-hands-on-create-virtual-machine-scale-set-and-install-iis-59jf</guid>
      <description>&lt;p&gt;In Azure, A virtual machine scale set allows to deploy and manage a set of auto-scaling virtual machines. We can scale the number of VMs in the scale set manually, or define rules to auto-scale based on resource usage like CPU, memory demand, or network traffic. An Azure load balancer then distributes traffic to the VM instances in the scale set.&lt;/p&gt;

&lt;p&gt;Let’s create VM Scale set as below.&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 1: Create VM Scale Set
&lt;/h1&gt;

&lt;p&gt;1.Let’s add basic information like &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Resource group “gl_project_rg”&lt;/li&gt;
&lt;li&gt;VMSS name “glProjectVMSS”&lt;/li&gt;
&lt;li&gt;Region “Central US”&lt;/li&gt;
&lt;li&gt;Availability Zone “Zone 3”&lt;/li&gt;
&lt;li&gt;Image “Windows Server 2016-Datacenter – Gen 1”&lt;/li&gt;
&lt;li&gt;Size “Standard_DS1_V2 – 1 vcpu, 3.5 GiB memory”&lt;/li&gt;
&lt;li&gt;Credentials&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wjPFgp62--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329049305/TkWFrcaEP.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wjPFgp62--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329049305/TkWFrcaEP.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Create Load Balancers with backend pool.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Qlb_1xBx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329129120/ap5fVl1lX.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Qlb_1xBx--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329129120/ap5fVl1lX.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Auto Scale setup to have one instance max and min. And Scale out rule to increase instance count by 1 when CPU threshold is greater than 80%. And Scale in to decrease instance count by 1 when CPU threshold is less than 30%.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--n4pZ-JRe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329142341/RLRUSoo0p.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--n4pZ-JRe--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329142341/RLRUSoo0p.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Final Review page.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--WCbucOiZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329152555/8700KSeNR.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--WCbucOiZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329152555/8700KSeNR.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--_GUhGS_7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329155206/aoYdov6sQ.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--_GUhGS_7--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329155206/aoYdov6sQ.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After clicking on Create, deployment will start.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6qeLytnk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329164633/R2_1Ag6Hl.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6qeLytnk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329164633/R2_1Ag6Hl.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Deployment complete:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--uG4z7kUf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329179941/qXASIkBhOw.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--uG4z7kUf--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329179941/qXASIkBhOw.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sPqNIx0H--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329185437/Ga332XZWm.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sPqNIx0H--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329185437/Ga332XZWm.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;VMSS will have one instance created: “glProjectVMSS_1”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Fin4041X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329206435/nW8Nu3gbu.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Fin4041X--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329206435/nW8Nu3gbu.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Scaling rules created as below:&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--O5-SQBn4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329225900/OBz6jdRg8.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--O5-SQBn4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329225900/OBz6jdRg8.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Operating System information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8nXsIAVu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329230800/odcreUS7h.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8nXsIAVu--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329230800/odcreUS7h.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Following inbound rules created by default.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--rpIU3pfz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329240210/Ln0XyA-hH.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--rpIU3pfz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329240210/Ln0XyA-hH.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Load Balancer created.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LrCpZtog--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329248926/dL0wjw3SDg.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LrCpZtog--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329248926/dL0wjw3SDg.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 2: Modify Network configuration.
&lt;/h1&gt;

&lt;p&gt;We need to allow incoming traffic through port 80. So will create a new inbound rule “port_80”&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--UqChv54G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329268877/1d9MKkWviG.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--UqChv54G--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329268877/1d9MKkWviG.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also we need to allow port 3389 to connect to virtual machine through RDP.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--wLb8T3d1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329279718/0CrWY7eTS.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--wLb8T3d1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329279718/0CrWY7eTS.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 3: Setup IIS and run default website.
&lt;/h1&gt;

&lt;p&gt;Let’s connect to our VM through RDP through load balancers public ip address.&lt;/p&gt;

&lt;p&gt;Go to instance glProjectVMSS_2 and click on connect through RDP. Download RDP file.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--kLeRuot5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329304085/ebLCD_Agh.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--kLeRuot5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329304085/ebLCD_Agh.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The RDP file downloaded asks for username and password.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--LKVX-z6r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329314237/Qqp6dn13-.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--LKVX-z6r--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329314237/Qqp6dn13-.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Asks for certificate validation. Click on continue.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xcVfe41Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329360539/zzrebJJHf.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xcVfe41Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329360539/zzrebJJHf.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;On connecting successfully, it will open Windows Server app automatically.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--6axFIZjX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329370822/ROEcjFJvLO.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--6axFIZjX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329370822/ROEcjFJvLO.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next, Open the PowerShell app in the remote VM and add the following command to install IIS.&lt;/p&gt;

&lt;p&gt;Install-WindowsFeature -name Web-Server -IncludeManagementTools &lt;/p&gt;

&lt;p&gt;Installed successfully.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--T8IQHsL4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329392676/MflLp5pimk.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--T8IQHsL4--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329392676/MflLp5pimk.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Next try to access Load balancers public IP address.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--8Wglfh60--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329406968/UtLqZ4ml0O.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--8Wglfh60--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329406968/UtLqZ4ml0O.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now we are able to access IIS home page successfully through Load Balancer’s IP.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ABt0PSN6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329414669/tBrfPZc0f.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ABt0PSN6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1598329414669/tBrfPZc0f.jpeg" alt="image.jpeg"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Finally we have created Virtual Machine Scale Set, Load Balancers, Scale rules.&lt;br&gt;
Then we connected to Instance with RDP using Load Balancer's IP address.&lt;br&gt;
Lastly we installed IIS and setup a default web server and accessed it from Load Balancer's IP address.&lt;/p&gt;

&lt;p&gt;Thank you for Reading! 😊&lt;/p&gt;

</description>
      <category>azure</category>
      <category>100daysofcloud</category>
    </item>
    <item>
      <title>AZ-900 Notes: Azure Policy and Monitoring.</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Fri, 07 Aug 2020 23:20:11 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-azure-policy-and-monitoring-40lo</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-azure-policy-and-monitoring-40lo</guid>
      <description>&lt;h1&gt;
  
  
  Azure Policy
&lt;/h1&gt;

&lt;p&gt;Planning out a consistent cloud infrastructure starts with setting up policy. Your policies will enforce your rules for created resources, so your infrastructure stays compliant with your corporate standards, cost requirements, and any &lt;strong&gt;service-level agreements (SLAs)&lt;/strong&gt; you have with your customers.&lt;/p&gt;

&lt;p&gt;Azure Policy is an Azure service you use to create, assign and, manage policies. These policies enforce different rules and effects over your resources so that those resources stay compliant with your corporate standards and service level agreements.&lt;/p&gt;

&lt;p&gt;To apply a policy, you will:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create a policy definition: &lt;/li&gt;
&lt;li&gt;Assign a definition to a scope of resources&lt;/li&gt;
&lt;li&gt;View policy evaluation results&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Policy Definition
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;A policy definition expresses what to evaluate and what action to take.&lt;/li&gt;
&lt;li&gt;common policy definition can apply to Allowed Storage Account SKUs, Allowed Resource Type, Allowed Locations, Allowed Virtual Machine SKUs&lt;/li&gt;
&lt;li&gt;The policy definition itself is represented as a JSON file.&lt;/li&gt;
&lt;li&gt;To apply a policy, we can use the Azure portal, or one of the command-line tools such as Azure PowerShell by adding the Microsoft.PolicyInsights extension.&lt;/li&gt;
&lt;li&gt;Once we have registered the provider, we can create a policy assignment.&lt;/li&gt;
&lt;li&gt; A &lt;em&gt;policy assignment&lt;/em&gt; is a policy definition that has been assigned to take place within a specific scope.&lt;/li&gt;
&lt;li&gt;We can use the applied policy definition to identify resources that aren't compliant with the policy assignment through the Azure portal&lt;/li&gt;
&lt;li&gt;Azure Policy can allow a resource to be created even if it doesn't pass validation. In these cases, you can have it trigger an audit event that can be viewed in the Azure Policy portal, or through command-line tools.&lt;/li&gt;
&lt;li&gt;Finally, you can delete policy requirements through the portal, or through the PowerShell command Remove-AzPolicyAssignment as shown below.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KWFhob6P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838579134/yvDjrsEcw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KWFhob6P--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838579134/yvDjrsEcw.png" alt="2-policy-portal.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Organize policy with initiatives
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Managing a few policy definitions is easy, but once you have more than a few, you will want to organize them. That's where initiatives come in.&lt;/li&gt;
&lt;li&gt;An initiative definition is a set or group of policy definitions to help track your compliance state for a larger goal.&lt;/li&gt;
&lt;li&gt; an initiative assignment is an initiative definition assigned to a specific scope. Initiative assignments reduce the need to make several initiative definitions for each scope. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--hnJSNx0b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838738741/cPmGKaSDz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--hnJSNx0b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838738741/cPmGKaSDz.png" alt="Screenshot 2020-08-08 at 3.48.39 AM.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--eLgPDUYO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838744782/2IMs8SiNs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--eLgPDUYO--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838744782/2IMs8SiNs.png" alt="3-define-initiatives.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Manage access, policies, and compliance across multiple Azure subscriptions
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Azure Management Groups are containers for managing access, policies, and compliance across multiple Azure subscriptions.&lt;/li&gt;
&lt;li&gt;Management groups allow you to order your Azure resources hierarchically into collections, which provide a further level of classification that is above the level of subscriptions. &lt;/li&gt;
&lt;li&gt;You can manage your Azure subscriptions more effectively by using Azure Policy and Azure role-based access controls (RBACs). &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--iBKFk3Q0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838857744/-fIHqf1Cs.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--iBKFk3Q0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596838857744/-fIHqf1Cs.png" alt="4-management-groups-tree.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Root Management Group
&lt;/h3&gt;

&lt;p&gt;Create your first management group by entering a management group ID and display name. &lt;br&gt;
A root management group is created in the Azure Active Directory (Azure AD) organization. By default, the root management group's display name is Tenant root group. The ID is the Azure AD ID. &lt;br&gt;
After this group is created, all existing subscriptions in the Azure AD organization are made children of the root management group. &lt;br&gt;
Create additional management groups by selecting Add management group.&lt;/p&gt;

&lt;p&gt;Important facts about management groups&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Any Azure AD user in the organization can create a management group. The creator is given an Owner role assignment.&lt;/li&gt;
&lt;li&gt;A single Azure AD organization can support 10,000 management groups.&lt;/li&gt;
&lt;li&gt;A management group tree can support up to six levels of depth not including the Root level or subscription level.&lt;/li&gt;
&lt;li&gt;Each management group can have many children.&lt;/li&gt;
&lt;li&gt;When your organization creates subscriptions, they are automatically added to the root management group.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure Blueprints
&lt;/h1&gt;

&lt;p&gt;For auditing, traceability, and compliance of your deployments, use Azure Blueprint artifacts and tools.&lt;br&gt;
Just as a blueprint allows an engineer or an architect to sketch a project's design parameters, Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization's standards, patterns, and requirements. &lt;/p&gt;

&lt;p&gt;Azure Blueprints is a declarative way to orchestrate the deployment of various resource templates and other artifacts, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Role assignments&lt;/li&gt;
&lt;li&gt;Policy assignments&lt;/li&gt;
&lt;li&gt;Azure Resource Manager templates&lt;/li&gt;
&lt;li&gt;Resource groups&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The process of implementing Azure Blueprint consists of the following high-level steps:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create an Azure Blueprint&lt;/li&gt;
&lt;li&gt;Assign the blueprint&lt;/li&gt;
&lt;li&gt;Track the blueprint assignments&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;With Azure Blueprint, the relationship between the blueprint definition (what should be deployed) and the blueprint assignment (what was deployed) is preserved. This connection supports improved deployment tracking and auditing.&lt;/p&gt;

&lt;p&gt;The Azure Blueprints service is designed to help with environment setup. This setup often consists of a set of resource groups, policies, role assignments, and Resource Manager template deployments. A blueprint is a package to bring each of these artifact types together and allow you to compose and version that package—including through a CI/CD pipeline. Ultimately, each setup is assigned to a subscription in a single operation that can be audited and tracked.&lt;/p&gt;

&lt;p&gt;Resource Manager template is a document that doesn't exist natively in Azure. Resource Manager templates are stored either locally or in source control. &lt;/p&gt;

&lt;h1&gt;
  
  
  Compliance Manager
&lt;/h1&gt;

&lt;p&gt;You also have to understand how the provider manages the underlying resources you are building on.&lt;br&gt;
Microsoft takes this management seriously and provides full transparency with four sources:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Microsoft Privacy Statement&lt;/li&gt;
&lt;li&gt;Microsoft Trust Center&lt;/li&gt;
&lt;li&gt;Service Trust Portal&lt;/li&gt;
&lt;li&gt;Compliance Manager&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Privacy Statement&lt;/strong&gt;&lt;br&gt;
The Microsoft privacy statement explains what personal data Microsoft processes, how Microsoft processes it, and for what purposes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Microsoft Trust Center&lt;/strong&gt;&lt;br&gt;
Trust Center is a website resource containing information and details about how Microsoft implements and supports security, privacy, compliance, and transparency in all Microsoft cloud products and services.&lt;br&gt;
It Provides:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;In-depth information about security, privacy, compliance offerings, policies, features, and practices across Microsoft cloud products.&lt;/li&gt;
&lt;li&gt;Recommended resources&lt;/li&gt;
&lt;li&gt;Information specific to key organizational roles, including business managers, tenant admins or data security teams, risk assessment and privacy officers, and legal compliance teams.&lt;/li&gt;
&lt;li&gt;Cross-company document search&lt;/li&gt;
&lt;li&gt;Direct guidance and support &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Service Trust Portal&lt;/strong&gt;&lt;br&gt;
The Service Trust Portal (STP) hosts the Compliance Manager service, and is the Microsoft public site for publishing audit reports and other compliance-related information relevant to Microsoft's cloud services.&lt;/p&gt;

&lt;p&gt;STP also includes information about how Microsoft online services can help your organization maintain and track compliance with standards, laws, and regulations, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ISO&lt;/li&gt;
&lt;li&gt;SOC&lt;/li&gt;
&lt;li&gt;NIST&lt;/li&gt;
&lt;li&gt;FedRAMP&lt;/li&gt;
&lt;li&gt;GDPR&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YHascv0M--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596840493831/_6AHIqhTZ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YHascv0M--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596840493831/_6AHIqhTZ.png" alt="6-servicetrustportal.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compliance Manager&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Compliance Manager is a workflow-based risk assessment dashboard within the Service Trust Portal that enables you to track, assign, and verify your organization's regulatory compliance activities related to Microsoft professional services and Microsoft cloud services such as Office 365, Dynamics 365, and Azure.&lt;/p&gt;

&lt;p&gt;Compliance Manager provides the following features:&lt;br&gt;
Combines the following three items:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Detailed information provided by Microsoft to auditors and regulators, as part of various third-party audits of Microsoft 's cloud services against various standards (for example, ISO 27001, ISO 27018, and NIST).&lt;/li&gt;
&lt;li&gt;Information that Microsoft compiles internally for its compliance with regulations (such as HIPAA and the EU GDPR).&lt;/li&gt;
&lt;li&gt;An organization's self-assessment of their own compliance with these standards and regulations.&lt;/li&gt;
&lt;/ol&gt;

&lt;ul&gt;
&lt;li&gt;Enables you to assign, track, and record compliance and assessment-related activities, which can help your organization cross team barriers to achieve your organization's compliance goals.&lt;/li&gt;
&lt;li&gt;Provides a Compliance Score to help you track your progress and prioritize auditing controls that will help reduce your organization's exposure to risk.&lt;/li&gt;
&lt;li&gt;Provides a secure repository in which to upload and manage evidence and other artifacts related to compliance activities.&lt;/li&gt;
&lt;li&gt;Produces richly detailed reports in Microsoft Excel that document the compliance activities performed by Microsoft and your organization, which can be provided to auditors, regulators, and other compliance stakeholders.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--pqQTIZJl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596840595714/q3Bmw71r2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--pqQTIZJl--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596840595714/q3Bmw71r2.png" alt="6-compliancemanager.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Monitor
&lt;/h1&gt;

&lt;p&gt;Azure Monitor maximizes the availability and performance of your applications by delivering a comprehensive solution for collecting, analyzing, and acting on telemetry from your cloud and on-premises environments.&lt;br&gt;
Azure Monitor can collect data from a variety of sources.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Application monitoring data&lt;/li&gt;
&lt;li&gt;Guest OS monitoring data&lt;/li&gt;
&lt;li&gt;Azure resource monitoring data&lt;/li&gt;
&lt;li&gt;Azure subscription monitoring data&lt;/li&gt;
&lt;li&gt;Azure tenant monitoring data&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As soon as you create an Azure subscription and start adding resources such as virtual machines and web apps, Azure Monitor starts collecting data. &lt;br&gt;
Activity Logs record when resources are created or modified and &lt;br&gt;
Metrics tell you how the resource is performing and the resources that it's consuming.&lt;/p&gt;

&lt;p&gt;Data monitoring:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Application Insights&lt;/li&gt;
&lt;li&gt;Azure Monitor for containers&lt;/li&gt;
&lt;li&gt;Azure Monitor for VMs &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Alerts. Azure Monitor proactively notifies you of critical conditions using alerts&lt;br&gt;
Autoscale. Azure Monitor uses Autoscale to ensure that you have the right amount of resources running to manage the load on your application effectively. Autoscale enables you to create rules that use metrics collected by Azure Monitor.&lt;br&gt;
Visualizations, such as charts and tables, are effective tools for summarizing monitoring data and for presenting data to different audiences. &lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Service Health
&lt;/h1&gt;

&lt;p&gt;provide personalized guidance and support when issues with Azure services affect you.&lt;br&gt;
 It can notify you, help you understand the impact of issues, and keep you updated as the issue is resolved. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Status&lt;/strong&gt; provides a global view of the health state of Azure services. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Service Health&lt;/strong&gt; provides you with a customizable dashboard that tracks the state of your Azure services &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Resource Health&lt;/strong&gt; helps you diagnose and obtain support when an Azure service issue affects your resources.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>azure</category>
      <category>100daysofcloud</category>
      <category>az900</category>
    </item>
    <item>
      <title>AZ-900 Notes: Security, responsibility, and trust in Azure</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Fri, 07 Aug 2020 07:22:47 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-security-responsibility-and-trust-in-azure-1gn7</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-security-responsibility-and-trust-in-azure-1gn7</guid>
      <description>&lt;p&gt;In this note you'll understand:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security responsibility is shared with Azure&lt;/li&gt;
&lt;li&gt;Identity management provides protection, even outside your network&lt;/li&gt;
&lt;li&gt;Encryption capabilities built into Azure can protect your data&lt;/li&gt;
&lt;li&gt;To protect your network and virtual networks&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Security is a shared responsibility
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Infrastructure as a service (IaaS)&lt;/strong&gt;. With IaaS, you are leveraging the lowest-level service and asking Azure to create virtual machines (VMs) and virtual networks. It's still your responsibility to patch and secure your operating systems and software, as well as configure your network to be secure.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Platform as a service (PaaS)&lt;/strong&gt; outsources several security concerns. Azure is taking care of the operating system and of most foundational software like database management systems. Everything is updated with the latest security patches and can be integrated with Azure Active Directory for access controls. ou can "point and click" within the Azure portal or run automated scripts to bring complex, secured systems up and down, and scale them as needed.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Software as a service (SaaS)&lt;/strong&gt;, you outsource almost everything.&lt;br&gt;
SaaS is software that runs with an internet infrastructure. The code is controlled by the vendor but configured to be used by the customer.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--mw3zRSgY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596777040532/Ot20rrFwu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--mw3zRSgY--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596777040532/Ot20rrFwu.png" alt="2-shared_responsibilities.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;For all cloud deployment types, you own your data and identities. You are responsible for helping secure your data and identities, your on-premises resources, and the cloud components you control (which vary by service type).&lt;/p&gt;

&lt;p&gt;Regardless of the deployment type, you always retain responsibility for the following items:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data&lt;/li&gt;
&lt;li&gt;Endpoints&lt;/li&gt;
&lt;li&gt;Accounts&lt;/li&gt;
&lt;li&gt;Access management&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  A layered approach to security
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;In Defense in depth strategy, Each layer provides protection so that if one layer is breached, a subsequent layer is already in place to prevent further exposure.&lt;/li&gt;
&lt;li&gt;Microsoft applies a &lt;strong&gt;layered approach&lt;/strong&gt; to security, both in physical data centers and across Azure services.&lt;/li&gt;
&lt;li&gt;Defense in depth can be visualized as a set of concentric rings, with the data to be secured at the center. &lt;/li&gt;
&lt;li&gt;Each ring adds an additional layer of security around the data. - This approach removes reliance on any single layer of protection and acts to slow down an attack and provide alert telemetry that can be acted upon, either automatically or manually. Let's take a look at each of the layers.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--g8UtyjX9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596777173571/bhRnmpkyU.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--g8UtyjX9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596777173571/bhRnmpkyU.png" alt="defense_in_depth_layers_small.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Data
&lt;/h3&gt;

&lt;p&gt;In almost all cases, attackers are after data:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Stored in a database&lt;/li&gt;
&lt;li&gt;Stored on disk inside virtual machines&lt;/li&gt;
&lt;li&gt;Stored on a SaaS application such as Office 365&lt;/li&gt;
&lt;li&gt;Stored in cloud storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It's the responsibility of those storing and controlling access to data to ensure that it's properly secured.&lt;/p&gt;

&lt;h3&gt;
  
  
  Application
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Ensure applications are secure and free of vulnerabilities.&lt;/li&gt;
&lt;li&gt;Store sensitive application secrets in a secure storage medium.&lt;/li&gt;
&lt;li&gt;Make security a design requirement for all application development.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Integrating security into the application development life cycle will help reduce the number of vulnerabilities introduced in code.&lt;/p&gt;

&lt;h3&gt;
  
  
  Compute
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Secure access to virtual machines.&lt;/li&gt;
&lt;li&gt;Implement endpoint protection and keep systems patched and current.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Malware, unpatched systems, and improperly secured systems open your environment to attacks. Make sure your compute resources are secure with proper controls in place to minimize security issues.&lt;/p&gt;

&lt;h3&gt;
  
  
  Networking
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Limit communication between resources.&lt;/li&gt;
&lt;li&gt;Deny by default.&lt;/li&gt;
&lt;li&gt;Restrict inbound internet access and limit outbound, where appropriate.&lt;/li&gt;
&lt;li&gt;Implement secure connectivity to on-premises networks. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Limiting the network connectivity across all your resources to allow only what is required.&lt;/p&gt;

&lt;h3&gt;
  
  
  Perimeter
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Use distributed denial of service (DDoS) protection to filter large-scale attacks before they can cause a denial of service for end users.&lt;/li&gt;
&lt;li&gt;Use perimeter firewalls to identify and alert on malicious attacks against your network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;At the network perimeter, it's about protecting from network-based attacks against your resources. &lt;/p&gt;

&lt;h3&gt;
  
  
  Identity and access
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Control access to infrastructure and change control.&lt;/li&gt;
&lt;li&gt;Use single sign-on and multi-factor authentication.
Audit events and changes.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;It is all about ensuring identities are secure, access granted is only what is needed, and changes are logged.&lt;/p&gt;

&lt;h3&gt;
  
  
  Physical security
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Physical building security and controlling access to computing hardware within the data center is the first line of defense.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The intent is to provide physical safeguards against access to assets. These safeguards ensure that other layers can't be bypassed, and loss or theft is handled appropriately.&lt;/p&gt;

&lt;p&gt;Azure helps alleviate your security concerns. But security is still a shared responsibility. &lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Security Center
&lt;/h1&gt;

&lt;p&gt;Security Center is a monitoring service that provides threat protection across all of your services both in Azure, and on-premises. Security Center can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Provide security recommendations&lt;/li&gt;
&lt;li&gt;Monitor security settings&lt;/li&gt;
&lt;li&gt;Continuously monitor all your services, and perform automatic security assessments to identify potential vulnerabilities before they can be exploited.&lt;/li&gt;
&lt;li&gt;Use machine learning to detect and block malware&lt;/li&gt;
&lt;li&gt;Analyze and identify potential inbound attacks, and help to investigate threats and any post-breach activity that might have occurred.&lt;/li&gt;
&lt;li&gt;Provide just-in-time access control for ports&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Available tiers
&lt;/h3&gt;

&lt;p&gt;Azure Security Center is available in two tiers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Free. Available as part of your Azure subscription, this tier is limited to assessments and recommendations of Azure resources only.&lt;/li&gt;
&lt;li&gt;Standard. This tier provides a full suite of security-related services including continuous monitoring, threat detection, just-in-time access control for ports, and more.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Usage scenarios
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Use Security Center for incident response: You can use Security Center during the detect, assess, and diagnose stages&lt;/li&gt;
&lt;li&gt;Use Security Center recommendations like security policy, Security Center analysis to enhance security.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Identity and access
&lt;/h1&gt;

&lt;p&gt;Network perimeters, firewalls, and physical access controls used to be the primary protection of any data.&lt;/p&gt;

&lt;h3&gt;
  
  
  Authentication and authorization
&lt;/h3&gt;

&lt;p&gt;Two fundamental concepts:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Authentication is the process of establishing the identity of a person or service looking to access a resource, It involves the act of challenging a party for legitimate credentials.&lt;/li&gt;
&lt;li&gt;Authorization is the process of establishing what level of access an authenticated person or service has. It specifies what data they're allowed to access and what they can do with it.&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  Azure Active Directory
&lt;/h1&gt;

&lt;p&gt;Azure AD is a cloud-based identity service.&lt;/p&gt;

&lt;p&gt;Azure AD provides services such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Authentication&lt;/strong&gt;. Providing functionality such as self-service password reset, multi-factor authentication (MFA), a custom banned password list, and smart lockout services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Single-Sign-On (SSO)&lt;/strong&gt;. A single identity is tied to a user, simplifying the security model. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Application management.&lt;/strong&gt; You can manage your cloud and on-premises apps using Azure AD Application Proxy, SSO, the &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Business to business (B2B) identity services.&lt;/strong&gt; Manage your guest users and external partners while maintaining control over your own corporate data.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Business-to-Customer (B2C) identity services.&lt;/strong&gt; Customize and control how users sign up, sign in, and manage their profiles when using your apps with services.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Device Management.&lt;/strong&gt; Manage how your cloud or on-premises devices access your corporate data.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Single sign-on
&lt;/h3&gt;

&lt;p&gt;SSO enables users to remember only one ID and one password to access multiple applications. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Access across applications is granted to a single identity tied to a user, simplifying the security model.&lt;/li&gt;
&lt;li&gt;By leveraging Azure AD for SSO you'll also have the ability to combine multiple data sources into an intelligent security graph. This security graph enables the ability to provide threat analysis and real-time identity protection to all accounts in Azure AD.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Multi-factor authentication
&lt;/h3&gt;

&lt;p&gt;Multi-factor authentication (MFA) provides additional security for your identities by requiring two or more elements for full authentication.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Something you know&lt;/strong&gt; would be a password or the answer to a security question. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Something you possess&lt;/strong&gt; could be a mobile app that receives a notification or a token-generating device. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Something you are&lt;/strong&gt; is typically some sort of biometric property, such as a fingerprint or face scan used on many mobile devices.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Providing identities to services
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Service principals&lt;/strong&gt;:&lt;br&gt;
An identity is just a thing that can be authenticated.&lt;br&gt;
A principal is an identity acting with certain roles or claims. &lt;br&gt;
A service principal is an identity that is used by a service or application. And like other identities, it can be assigned roles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Managed identities for Azure services&lt;/strong&gt;&lt;br&gt;
Managed identities for Azure services are much easier and will do most of the work for you to create Service principles.&lt;/p&gt;

&lt;h3&gt;
  
  
  Role-based access control
&lt;/h3&gt;

&lt;p&gt;Roles are sets of permissions, like "Read-only" or "Contributor", that users can be granted to access an Azure service instance.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identities are mapped to roles directly or through group membership&lt;/li&gt;
&lt;li&gt;Roles can be granted at the individual service instance level, &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--CXSoisI_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596779267861/k-rKfqjKy.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--CXSoisI_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596779267861/k-rKfqjKy.png" alt="3-role-assignment-scope.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Privileged Identity Management
&lt;/h3&gt;

&lt;p&gt;Azure AD Privileged Identity Management (PIM) is an additional, paid-for offering that provides oversight of role assignments, self-service, and just-in-time role activation and Azure AD and Azure resource access reviews.&lt;/p&gt;

&lt;p&gt;Identity allows us to maintain a security perimeter, even outside our physical control. With single sign-on and appropriate role-based access configuration, we can always be sure who has the ability to see and manipulate our data and infrastructure.&lt;/p&gt;

&lt;h1&gt;
  
  
  Encryption
&lt;/h1&gt;

&lt;p&gt;Encryption is the process of making data unreadable and unusable to unauthorized viewers. To use or read the encrypted data, it must be decrypted, which requires the use of a secret key. &lt;br&gt;
There are two top-level types of encryption: symmetric and asymmetric.&lt;br&gt;
Symmetric encryption uses the same key to encrypt and decrypt the data.&lt;br&gt;
Asymmetric encryption uses a public key and private key pair. &lt;/p&gt;

&lt;h3&gt;
  
  
  Encryption at rest
&lt;/h3&gt;

&lt;p&gt;Data at rest is the data that has been stored on a physical medium. This data could be stored on the disk of a server, data stored in a database, or data stored in a storage account. Regardless of the storage mechanism, encryption of data at rest ensures that the stored data is unreadable without the keys and secrets needed to decrypt it.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ohNRr1SJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596779544938/JwSbRTsOd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ohNRr1SJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596779544938/JwSbRTsOd.png" alt="encryption-at-rest.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Encryption in transit
&lt;/h3&gt;

&lt;p&gt;Data in transit is the data actively moving from one location to another, such as across the internet or through a private network. Secure transfer can be handled by several different layers. It could be done by encrypting the data at the application layer prior to sending it over a network. HTTPS is an example of application layer in transit encryption.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--cqfhlQ1z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596779682413/jts_pq48E.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--cqfhlQ1z--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596779682413/jts_pq48E.png" alt="encryption-in-transit.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Encryption on Azure
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Encrypt raw storage
&lt;/h3&gt;

&lt;p&gt;&lt;strong&gt;Azure Storage Service Encryption&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;With this feature, the Azure storage platform automatically encrypts your data before persisting it to Azure Managed Disks, Azure Blob storage, Azure Files, or Azure Queue storage, and decrypts the data before retrieval. &lt;/li&gt;
&lt;li&gt;The handling of encryption, encryption at rest, decryption, and key management in Storage Service Encryption is transparent to applications using the services.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Encrypt virtual machine disks&lt;/strong&gt;&lt;br&gt;
Azure Disk Encryption is a capability that helps you encrypt your Windows and Linux IaaS virtual machine disks. &lt;br&gt;
The solution is integrated with Azure Key Vault to help you control and manage the disk encryption keys and secrets (and you can use managed service identities for accessing Key Vault).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encrypt databases&lt;/strong&gt;&lt;br&gt;
Transparent data encryption (TDE) helps protect Azure SQL Database and Azure Data Warehouse against the threat of malicious activity. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Encrypt secrets&lt;/strong&gt;&lt;br&gt;
In Azure, we can use Azure Key Vault to protect our secrets.&lt;br&gt;
Azure Key Vault is a centralized cloud service for storing your application secrets. &lt;/p&gt;

&lt;p&gt;It is useful for a variety of scenarios:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Secrets management. &lt;/li&gt;
&lt;li&gt;Key management. &lt;/li&gt;
&lt;li&gt;Certificate management. &lt;/li&gt;
&lt;li&gt;Store secrets backed by hardware security modules (HSMs). &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Benefits:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Centralized application secrets.&lt;/li&gt;
&lt;li&gt;Securely stored secrets and keys.&lt;/li&gt;
&lt;li&gt;Monitor access and use. &lt;/li&gt;
&lt;li&gt;Simplified administration of application secrets.&lt;/li&gt;
&lt;li&gt;Integrate with other Azure services. You can integrate Key Vault with storage accounts, container registries, event hubs, and many more Azure services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure certificates
&lt;/h1&gt;

&lt;p&gt;Transport Layer Security (TLS) is the basis for encryption of website data in transit. TLS uses certificates to encrypt and decrypt data. &lt;/p&gt;

&lt;p&gt;Types of certificates&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Service certificates are used for cloud services&lt;/li&gt;
&lt;li&gt;Management certificates are used for authenticating with the management API&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Service certificates
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Service certificates are attached to cloud services and enable secure communication to and from the service.&lt;/li&gt;
&lt;li&gt;You can upload service certificates to Azure either using the Azure portal or by using the classic deployment model. &lt;/li&gt;
&lt;li&gt;Service certificates are associated with a specific cloud service. &lt;/li&gt;
&lt;li&gt;They are assigned to a deployment in the service definition file.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Management certificates
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Management certificates allow you to authenticate with the classic deployment model. &lt;/li&gt;
&lt;li&gt;Many programs and tools (such as - Visual Studio or the Azure SDK) use these certificates to automate configuration and deployment of various Azure services. &lt;/li&gt;
&lt;li&gt;However, these types of certificates are not related to cloud services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Using Azure Key Vault with certificates
&lt;/h2&gt;

&lt;p&gt;You can store your certificates in Azure Key Vault - much like any other secret. &lt;/p&gt;

&lt;p&gt;However, Key Vault provides additional features above and beyond the typical certificate management.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You can create certificates in Key Vault, or import existing certificates&lt;/li&gt;
&lt;li&gt;You can securely store and manage certificates without interaction with private key material.&lt;/li&gt;
&lt;li&gt;You can create a policy that directs Key Vault to manage the life cycle of a certificate.&lt;/li&gt;
&lt;li&gt;You can provide contact information for notification about life-cycle events of expiration and renewal of certificate.&lt;/li&gt;
&lt;li&gt;You can automatically renew certificates with selected issuers - Key Vault partner x509 certificate providers / certificate authorities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Network Security
&lt;/h1&gt;

&lt;p&gt;Securing your network from attacks and unauthorized access is an important part of any architecture.&lt;/p&gt;

&lt;p&gt;A layered approach to network security: A layered approach provides multiple levels of protection, so that if an attacker gets through one layer, there are further protections in place to limit further attack.&lt;/p&gt;

&lt;h3&gt;
  
  
  Internet protection
&lt;/h3&gt;

&lt;p&gt;Azure Security Center will identify internet-facing resources that don't have network security groups associated with them, as well as resources that are not secured behind a firewall.&lt;/p&gt;

&lt;h1&gt;
  
  
  Firewal
&lt;/h1&gt;

&lt;p&gt;A firewall is a service that grants server access based on the originating IP address of each request. &lt;br&gt;
Firewall rules, generally speaking, also include specific network protocol and port information.&lt;/p&gt;

&lt;p&gt;To provide inbound protection at the perimeter, you have several choices.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Firewall&lt;/strong&gt; is a managed, cloud-based, network security service that protects your Azure Virtual Network resources.&lt;/li&gt;
&lt;li&gt;It is a fully stateful firewall as a service with built-in high availability and unrestricted cloud scalability. &lt;/li&gt;
&lt;li&gt;Azure Firewall provides inbound protection for non-HTTP/S protocols. &lt;/li&gt;
&lt;li&gt;Examples of non-HTTP/S protocols include: Remote Desktop Protocol (RDP), Secure Shell (SSH), and File Transfer Protocol (FTP). It also provides outbound, network-level protection for all ports and protocols, and application-level protection for outbound HTTP/S.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Azure Application Gateway&lt;/strong&gt; is a load balancer that includes a Web Application Firewall (WAF) that provides protection from common, known vulnerabilities in websites. It is designed to protect HTTP traffic.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Network virtual appliances (NVAs)&lt;/strong&gt; are ideal options for non-HTTP services or advanced configurations, and are similar to hardware firewall appliances.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Azure DDoS Protection
&lt;/h3&gt;

&lt;p&gt;Distributed Denial of Service (DDoS) attacks: Any resource exposed on the internet is at risk of being attacked by a denial of service attack. These types of attacks attempt to overwhelm a network resource by sending so many requests that the resource becomes slow or unresponsive.&lt;br&gt;
The Azure DDoS Protection service protects your Azure applications by monitoring traffic at the Azure network edge before it can impact your service's availability. Within a few minutes of attack detection, you are notified using Azure Monitor metrics.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--BjXDt9Ty--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596781651840/eWB-L--hm.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--BjXDt9Ty--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596781651840/eWB-L--hm.png" alt="ddos.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Azure DDoS Protection provides the following service tiers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Basic&lt;/strong&gt; - The Basic service tier is automatically enabled as part of the Azure platform. Always-on traffic monitoring and real-time mitigation of common network-level attacks. Azure's global network is used to distribute and mitigate attack traffic across regions.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Standard&lt;/strong&gt; -  The Standard service tier provides additional mitigation capabilities that are tuned specifically to Microsoft Azure Virtual Network resources.
DDoS standard protection can mitigate the following types of attacks:&lt;/li&gt;
&lt;li&gt;Volumetric attacks. The attackers goal is to flood the network layer with a substantial amount of seemingly legitimate traffic.&lt;/li&gt;
&lt;li&gt;Protocol attacks. These attacks render a target inaccessible, by exploiting a weakness in the layer 3 and layer 4 protocol stack.&lt;/li&gt;
&lt;li&gt;Resource (application) layer attacks. These attacks target web application packets to disrupt the transmission of data between hosts.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Controlling the traffic
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Virtual network security&lt;/strong&gt;: &lt;br&gt;
Network Security Groups allow you to filter network traffic to and from Azure resources in an Azure virtual network. An NSG can contain multiple inbound and outbound security rules that enable you to filter traffic to and from resources by source and destination IP address, port, and protocol&lt;br&gt;
You can completely remove public internet access to your services by restricting access to service endpoints. With service endpoints, Azure service access can be limited to your virtual network.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Network integration&lt;/strong&gt;&lt;br&gt;
Virtual private network (VPN) connections are a common way of establishing secure communication channels between networks. Connections between Azure Virtual Network and an on-premises VPN device are a great way to provide secure communication between your network and your VNet on Azure.&lt;br&gt;
ExpressRoute lets you extend your on-premises networks into the Microsoft cloud over a private connection facilitated by a connectivity provider. &lt;/p&gt;

&lt;p&gt;A layered approach to network security helps reduce your risk of exposure through network-based attacks. &lt;/p&gt;

&lt;h1&gt;
  
  
  Protect your shared documents
&lt;/h1&gt;

&lt;p&gt;Microsoft Azure Information Protection (sometimes referred to as AIP) is a cloud-based solution that helps organizations classify and optionally protect documents and emails by applying labels.&lt;br&gt;
Labels can be applied automatically based on rules and conditions. Labels can also be applied manually. You can also guide users to choose recommended labels with a combination of automatic and manual steps.&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Advanced Threat Protection
&lt;/h1&gt;

&lt;p&gt;Azure Advanced Threat Protection (Azure ATP) is a cloud-based security solution that identifies, detects, and helps you investigate advanced threats, compromised identities, and malicious insider actions directed at your organization.&lt;/p&gt;

&lt;p&gt;Azure ATP consists of several components:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Azure ATP portal&lt;/strong&gt;: In this you can monitor and respond to suspicious activity. The Azure ATP portal allows you to create your Azure ATP instance, and view the data received from Azure ATP sensors. You can also use the portal to monitor, manage, and investigate threats in your network environment.&lt;/li&gt;
&lt;li&gt;Azure ATP sensor: Azure ATP sensors are installed directly on your domain controllers. The sensor monitors domain controller traffic without requiring a dedicated server or configuring port mirroring.&lt;/li&gt;
&lt;li&gt;Azure ATP cloud service: Azure ATP cloud service runs on Azure infrastructure and is currently deployed in the United States, Europe, and Asia. Azure ATP cloud service is connected to Microsoft's intelligent security graph.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Azure Advanced Threat Protection&lt;/strong&gt;&lt;br&gt;
Azure ATP is available as part of the Enterprise Mobility + Security E5 suite (EMS E5) and as a standalone license. You can acquire a license directly from the Enterprise Mobility + Security Pricing Options page or through the Cloud Solution Provider (CSP) licensing model. It is not available to purchase via the Azure portal.&lt;/p&gt;

&lt;h1&gt;
  
  
  Microsoft Security Development Lifecycle (SDL)
&lt;/h1&gt;

&lt;p&gt;The Microsoft Security Development Lifecycle (SDL) introduces security and privacy considerations throughout all phases of the development process. It helps developers build highly secure software, address security compliance requirements, and reduce development costs.&lt;/p&gt;

&lt;p&gt;It lets you:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Provide training&lt;/li&gt;
&lt;li&gt;Define security requirements&lt;/li&gt;
&lt;li&gt;Define metrics and compliance reporting&lt;/li&gt;
&lt;li&gt;Perform threat modeling&lt;/li&gt;
&lt;li&gt;Establish design requirements&lt;/li&gt;
&lt;li&gt;Define and use cryptography standards&lt;/li&gt;
&lt;li&gt;Manage security risks from using third-party components&lt;/li&gt;
&lt;li&gt;Use approved tools&lt;/li&gt;
&lt;li&gt;Perform Static Analysis Security Testing&lt;/li&gt;
&lt;li&gt;Perform Dynamic Analysis Security Testing&lt;/li&gt;
&lt;li&gt;Perform penetration testing&lt;/li&gt;
&lt;li&gt;Establish a standard incident response process&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Thank you for Reading 😊&lt;/p&gt;

</description>
      <category>azure</category>
      <category>certification</category>
      <category>100daysofcloud</category>
    </item>
    <item>
      <title>AZ-900 Notes: Azure networking options</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Fri, 07 Aug 2020 04:53:49 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-azure-networking-options-3fn7</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-azure-networking-options-3fn7</guid>
      <description>&lt;p&gt;Running your app or service in the cloud requires a fast and secure network. &lt;br&gt;
Here are Azure networking basics we'll learn in this notes:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Learn how virtual networking helps you isolate network and compute resources&lt;/li&gt;
&lt;li&gt;Learn how Azure Load Balancer helps improve resiliency, or the ability to recover when your service goes down&lt;/li&gt;
&lt;li&gt;Learn how Traffic Manager can route traffic to different endpoints, including the endpoint with the lowest latency to the user&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Using an N-tier architecture
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;An architectural pattern that can be used to build loosely coupled systems is N-tier.&lt;/li&gt;
&lt;li&gt;Tiers help separate concerns and are ideally designed to be reusable.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Example: Three-tier refers to an n-tier application that has three tiers. Your e-commerce web application follows this three-tier architecture:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The web tier provides the web interface to your users through a browser.&lt;/li&gt;
&lt;li&gt;The application tier runs business logic.&lt;/li&gt;
&lt;li&gt;The data tier includes databases and other storage that hold product information and customer orders.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--Xv2ydcjM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596757974516/Cwd-nB8OJ.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--Xv2ydcjM--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596757974516/Cwd-nB8OJ.png" alt="2-three-tier.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;When the user clicks the button to place the order, the request is sent to the web tier, along with the user's address and payment information. The web tier passes this information to the application tier, which would validate payment information and check inventory. The application tier might then store the order in the data tier, to be picked up later for fulfillment.&lt;/p&gt;

&lt;p&gt;Each tier can access services only from a lower tier. The VM running in the web tier has a public IP address because it receives traffic from the internet. The VMs in the lower tiers, the application and data tiers, each have private IP addresses because they don't communicate directly over the internet.&lt;/p&gt;

&lt;h1&gt;
  
  
  Virtual network
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;A virtual network is a logically isolated network on Azure&lt;/li&gt;
&lt;li&gt;A virtual network allows Azure resources to securely communicate with each other, the internet, and on-premises networks. &lt;/li&gt;
&lt;li&gt;A virtual network is scoped to a single region&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A &lt;strong&gt;VPN gateway&lt;/strong&gt; (or virtual network gateway) can provide a secure connection between an Azure Virtual Network and an on-premises location over the internet.&lt;/p&gt;

&lt;h1&gt;
  
  
  Network security group
&lt;/h1&gt;

&lt;p&gt;A network security group, or NSG, allows or denies inbound network traffic to your Azure resources.&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Load Balancer
&lt;/h1&gt;

&lt;h2&gt;
  
  
  Availability
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Availability refers to how long your service is up and running without interruption. &lt;/li&gt;
&lt;li&gt;High availability, or highly available, refers to a service that's up and running for a long period of time.&lt;/li&gt;
&lt;li&gt;"five nines availability." Five nines availability means that the service is guaranteed to be running 99.999 percent of the time.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Resiliency
&lt;/h2&gt;

&lt;p&gt;Resiliency refers to a system's ability to stay operational during abnormal conditions like Natural disasters, System maintenance, Spikes in traffic to your site.&lt;/p&gt;

&lt;h2&gt;
  
  
  Load balancer
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;A load balancer distributes traffic evenly among each system in a pool. A load balancer can help you achieve both high availability and resiliency.&lt;/li&gt;
&lt;li&gt;Load balancer to distribute traffic. The load balancer becomes the entry point to the user. The user doesn't know (or need to know) which system the load balancer chooses to receive the request.&lt;/li&gt;
&lt;li&gt;Load Balancer supports inbound and outbound scenarios, provides low latency and high throughput, and scales up to millions of flows for all Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) applications. &lt;/li&gt;
&lt;li&gt;You can use Load Balancer with incoming internet traffic, internal traffic across Azure services, port forwarding for specific traffic, or outbound connectivity for VMs in your virtual network.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure Application Gateway
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;Application Gateway is a load balancer designed for web applications. It uses Azure Load Balancer at the transport level (TCP) and applies sophisticated URL-based routing rules to support several advanced scenarios.&lt;/li&gt;
&lt;li&gt;This type of routing is known as application layer (OSI layer 7) load balancing since it understands the structure of the HTTP message.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--y2mknfa9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596774653759/QB2_Jwnpl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--y2mknfa9--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596774653759/QB2_Jwnpl.png" alt="3-appgateway.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Benefits of using Azure Application Gateway over a simple load balancer:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Cookie affinity.&lt;/strong&gt; Useful when you want to keep a user session on the same backend server.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;SSL termination.&lt;/strong&gt; Application Gateway can manage your SSL certificates and pass unencrypted traffic to the backend servers to avoid encryption/decryption overhead. It also supports full end-to-end encryption for applications that require that.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Web application firewall.&lt;/strong&gt; Application gateway supports a sophisticated firewall (WAF) with detailed monitoring and logging to detect malicious attacks against your network infrastructure.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;URL rule-based routes.&lt;/strong&gt; Application Gateway allows you to route traffic based on URL patterns, source IP address and port to destination IP address and port. This is helpful when setting up a content delivery network.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Rewrite HTTP headers.&lt;/strong&gt; You can add or remove information from the inbound and outbound HTTP headers of each request to enable important security scenarios, or scrub sensitive information such as server names.&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  Content Delivery Network
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;A content delivery network (CDN) is a distributed network of servers that can efficiently deliver web content to users. &lt;/li&gt;
&lt;li&gt;It is a way to get content to users in their local region to minimize latency. &lt;/li&gt;
&lt;li&gt;CDN can be hosted in Azure or any other location. You can cache content at strategically placed physical nodes across the world and provide better performance to end users. &lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  DNS:
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;DNS, or Domain Name System, is a way to map user-friendly names to their IP addresses. You can think of DNS as the phonebook of the internet.&lt;/li&gt;
&lt;li&gt;You can bring your own DNS server or use Azure DNS, a hosting service for DNS domains that runs on Azure infrastructure.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--DumoCSOX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596774973582/YURezhS3D.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--DumoCSOX--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596774973582/YURezhS3D.png" alt="3-dns.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Traffic Manager
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;Latency refers to the time it takes for data to travel over the network. Latency is typically measured in milliseconds.
One way to reduce latency is to provide exact copies of your service in more than one region.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How can you connect users to the service that's closest geographically, but under the contoso.com domain?&lt;/strong&gt;&lt;br&gt;
One answer is &lt;strong&gt;Azure Traffic Manager&lt;/strong&gt;. Traffic Manager uses the DNS server that's closest to the user to direct user traffic to a globally distributed endpoint.&lt;br&gt;
You can connect Traffic Manager to your own on-premises networks, enabling you to maintain your existing data center investments. Or you can move your application entirely to the cloud. The choice is yours.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Compare Load Balancer to Traffic Manager&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Azure Load Balancer distributes traffic within the same region to make your services more highly available and resilient.&lt;br&gt;
Traffic Manager works at the DNS level, and directs the client to a preferred endpoint. This endpoint can be to the region that's closest to your user.&lt;/p&gt;

&lt;p&gt;Load Balancer and Traffic Manager both help make your services more resilient, but in slightly different ways. When Load Balancer detects an unresponsive VM, it directs traffic to other VMs in the pool. &lt;br&gt;
Traffic Manager monitors the health of your endpoints. When Traffic Manager finds an unresponsive endpoint, it directs traffic to the next closest endpoint that is responsive.&lt;/p&gt;

&lt;p&gt;You learned just a few ways Azure networking can help reduce latency and make your apps and services more highly available.&lt;/p&gt;

&lt;p&gt;Thank you for Reading! 😊&lt;/p&gt;

</description>
      <category>azure</category>
      <category>azurecertified</category>
      <category>100daysofcloud</category>
    </item>
    <item>
      <title>AWS Data Exchange, Subscribe and create Database using Glue</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Thu, 06 Aug 2020 12:20:13 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/aws-data-exchange-subscribe-and-create-database-using-glue-1b7h</link>
      <guid>https://dev.to/sudhachandranbc/aws-data-exchange-subscribe-and-create-database-using-glue-1b7h</guid>
      <description>&lt;p&gt;Here is how explored on how we can do Covid Data Analysis using AWS cloud services.&lt;/p&gt;

&lt;p&gt;Today I'll write about part 1: Data Setup.&lt;/p&gt;

&lt;h1&gt;
  
  
  Solution overview
&lt;/h1&gt;

&lt;p&gt;The following diagram illustrates the architecture of the solution.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--xtSATav2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596624257236/WL6HSu_iD.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--xtSATav2--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596624257236/WL6HSu_iD.png" alt="TruFactorDataExchange1-2.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The workflow is comprised of the following steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Subscribe to a data set from AWS Data Exchange and export to Amazon S3&lt;/li&gt;
&lt;li&gt;Run an AWS Glue crawler to load product data&lt;/li&gt;
&lt;li&gt;Perform queries with Amazon Athena&lt;/li&gt;
&lt;li&gt;Visualize the queries and tables with Amazon QuickSight&lt;/li&gt;
&lt;li&gt;Run an ETL job with AWS Glue&lt;/li&gt;
&lt;li&gt;Create a time series forecast with Amazon Forecast&lt;/li&gt;
&lt;li&gt;Visualize the forecasted data with Amazon QuickSight&lt;/li&gt;
&lt;/ol&gt;

&lt;h1&gt;
  
  
  Step 1. AWS Data Exchange: Subscribe
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;Go to AWS Data Exchange from AWS Console.&lt;/li&gt;
&lt;li&gt;Browse the Catalog and Search for Covid. You'll see few data sets are already available.&lt;/li&gt;
&lt;li&gt;I have selected "Enigma U.S. &amp;amp; Global COVID-19 Aggregation" which has global data.&lt;/li&gt;
&lt;li&gt;Subscribe to it, and after few minutes you'll see it listed under "My Subscriptions".&lt;/li&gt;
&lt;li&gt;On selecting it, you'll see Revisions and when it is updated.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--z8mVtG1Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596714709985/krzgkrjkS.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--z8mVtG1Q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596714709985/krzgkrjkS.png" alt="Screenshot 2020-08-06 at 5.18.25 PM.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 2: AWS Data Exchange: Export to S3
&lt;/h1&gt;

&lt;ol&gt;
&lt;li&gt;You can click on the Revision ID.&lt;/li&gt;
&lt;li&gt;Select the data set you want and click on export it to S3.&lt;/li&gt;
&lt;li&gt;You will see a new Job created and will be shown as Completed after export is done.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--h1eim1Ok--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596714678309/0HyPK6DDe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--h1eim1Ok--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596714678309/0HyPK6DDe.png" alt="Screenshot 2020-08-06 at 5.20.23 PM.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--YJF2HYJr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715048780/PUxK395rg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YJF2HYJr--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715048780/PUxK395rg.png" alt="DataSetsAWSDataExchange7.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 3: Amazon S3: Verify the data
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7z3FE6w---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596714838380/SEdI3Aq9Y.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7z3FE6w---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596714838380/SEdI3Aq9Y.png" alt="Screenshot 2020-08-06 at 5.23.44 PM.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Step 4: AWS Glue
&lt;/h1&gt;

&lt;p&gt;AWS Glue is a fully managed extract, transform, and load (ETL) service that makes it easy for customers to prepare and load their data for analytics. &lt;/p&gt;

&lt;p&gt;Now that you have successfully exported the enigma covid data sets into an Amazon S3 bucket, you create and run an AWS Glue crawler to crawl your Amazon S3 bucket and populate the AWS Glue Data Catalog. Complete the following steps:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;On the AWS Glue console, under Data Catalog, choose Crawlers.&lt;/li&gt;
&lt;li&gt;Choose Add crawler.&lt;/li&gt;
&lt;li&gt;For Crawler name, enter a name; for example, covid-data-exchange-crawler.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--1q0TvpbU--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715432244/iNcxPShoh.png" alt="Screenshot 2020-08-06 at 5.33.30 PM.png"&gt;
&lt;/li&gt;
&lt;li&gt;For Crawler source type, choose Data stores.&lt;/li&gt;
&lt;li&gt;Choose Next.&lt;/li&gt;
&lt;li&gt;For Choose a data store, choose S3.&lt;/li&gt;
&lt;li&gt;For Crawl data in, select Specified path in my account.&lt;/li&gt;
&lt;li&gt;The crawler points to the following path: s3:///.&lt;/li&gt;
&lt;li&gt;Choose Next.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--X7aONSY6--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715529848/4FPJASs9C.png" alt="Screenshot 2020-08-06 at 5.34.50 PM.png"&gt;
&lt;/li&gt;
&lt;li&gt;In the Choose an IAM role section, select Create an IAM role. This is the role that the AWS Glue crawler and AWS Glue jobs use to access the Amazon S3 bucket and its content.&lt;/li&gt;
&lt;li&gt;For IAM role, enter the suffix demo-data-exchange.&lt;/li&gt;
&lt;li&gt;Choose Next.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--g8gbKjpW--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715602448/VsPCq-yHu.png" alt="Screenshot 2020-08-06 at 5.36.28 PM.png"&gt;
&lt;/li&gt;
&lt;li&gt;In the schedule section, leave the Frequency with the default Run on Demand.&lt;/li&gt;
&lt;li&gt;Choose Next.&lt;/li&gt;
&lt;li&gt;In the Output section, choose Add database.&lt;/li&gt;
&lt;li&gt;Enter a name for the database; for example, covid-db.&lt;/li&gt;
&lt;li&gt;Choose Next, then choose Finish.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i6gMBqdy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715743734/D3P7PZEhR.png" alt="Screenshot 2020-08-06 at 5.37.54 PM.png"&gt;
&lt;/li&gt;
&lt;li&gt;This database contains the tables that the crawler discovers and populates. With these data sets separated into different tables, you join and relationalize the data.&lt;/li&gt;
&lt;li&gt;In the Review all steps section, review the crawler settings and choose Finish.&lt;/li&gt;
&lt;li&gt;Under Data Catalog, choose Crawlers.&lt;/li&gt;
&lt;li&gt;Select the crawler you just created.&lt;/li&gt;
&lt;li&gt;Choose Run crawler.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--YWCrsccn--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596715871819/0kv19weGw.png" alt="Screenshot 2020-08-06 at 5.40.53 PM.png"&gt;
&lt;/li&gt;
&lt;li&gt;The AWS Glue crawler crawls the data sources and populates your AWS Glue Data Catalog. This process can take up to a few minutes. When the crawler is finished, you can one table added to your crawler details. See the following screenshot.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--n0EuxuO---/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596716121540/8OBze_lB-.png" alt="Screenshot 2020-08-06 at 5.44.56 PM.png"&gt;
&lt;/li&gt;
&lt;li&gt;You can now view your new tables.&lt;/li&gt;
&lt;li&gt;Under Databases, choose Tables.&lt;/li&gt;
&lt;li&gt;Choose your database.&lt;/li&gt;
&lt;li&gt;Choose View the tables. The table names correspond to the Amazon S3 folder directory you used to point your AWS Glue crawler. See the following screenshot.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aq4FZHgo--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596716194578/7F44oJSJP.png" alt="Screenshot 2020-08-06 at 5.46.22 PM.png"&gt;
&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;Next Step: To Query data in Athena and Visualise in QuickSight!&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;Thank you for Reading 😊&lt;/p&gt;

</description>
      <category>aws</category>
      <category>100daysofcloud</category>
      <category>datascience</category>
    </item>
    <item>
      <title>AZ-900 Notes: Azure data storage options </title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Wed, 05 Aug 2020 00:58:14 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-azure-data-storage-options-57lf</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-azure-data-storage-options-57lf</guid>
      <description>&lt;p&gt;In this notes, we'll learn about:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Data storage options in Azure&lt;/li&gt;
&lt;li&gt;Discover how Azure data storage can meet your business demands&lt;/li&gt;
&lt;li&gt;Compare Azure data storage with on-premises storage&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Benefits of using Azure to store data
&lt;/h1&gt;

&lt;p&gt;Here are some of the important benefits of Azure data storage:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Automated backup and recovery: mitigates the risk of losing your data if there is any unforeseen failure or interruption.&lt;/li&gt;
&lt;li&gt;Replication across the globe: copies your data to protect it against any planned or unplanned events, such as scheduled maintenance or hardware failures. You can choose to replicate your data at multiple locations across the globe.&lt;/li&gt;
&lt;li&gt;Support for data analytics: supports performing analytics on your data consumption.&lt;/li&gt;
&lt;li&gt;Encryption capabilities: data is encrypted to make it highly secure; you also have tight control over who can access the data.&lt;/li&gt;
&lt;li&gt;Multiple data types: Azure can store almost any type of data you need. It can handle video files, text files, and even large binary files like virtual hard disks. It also has many options for your relational and NoSQL data.&lt;/li&gt;
&lt;li&gt;Data storage in virtual disks: Azure also has the capability of storing up to 32 TB of data in its virtual disks. This capability is significant when you're storing heavy data such as videos and simulations.&lt;/li&gt;
&lt;li&gt;Storage tiers: storage tiers to prioritize access to data based on frequently used versus rarely used information.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Types of data we can save:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Structured data.&lt;/li&gt;
&lt;li&gt;Semi-structured data.&lt;/li&gt;
&lt;li&gt;Unstructured data&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Data Storage Options:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Azure SQL Database &lt;/li&gt;
&lt;li&gt;Azure Cosmos DB&lt;/li&gt;
&lt;li&gt;Azure Blob storage&lt;/li&gt;
&lt;li&gt;Azure Data Lake Storage&lt;/li&gt;
&lt;li&gt;Azure Files&lt;/li&gt;
&lt;li&gt;Azure Queue&lt;/li&gt;
&lt;li&gt;Disk Storage&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Azure SQL Database
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Azure SQL Database is a relational database as a service (DaaS) &lt;/li&gt;
&lt;li&gt;SQL Database is a high-performance, reliable, fully managed and secure database. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--jie5Atqk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587554040/yDCrfzPWW.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--jie5Atqk--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587554040/yDCrfzPWW.png" alt="3-azure-sql-db.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Cosmos DB
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Azure Cosmos DB is a globally distributed database service.&lt;/li&gt;
&lt;li&gt;It supports schema-less data that lets you build highly responsive and Always On applications to support constantly changing data. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--yetb4tPK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587628638/YVJ_KmnfH.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--yetb4tPK--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587628638/YVJ_KmnfH.png" alt="3-cosmos-db.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Blob storage
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Azure Blob Storage is unstructured,&lt;/li&gt;
&lt;li&gt;Blobs are highly scalable, can manage thousands of simultaneous uploads, massive amounts of video data, constantly growing log files&lt;/li&gt;
&lt;li&gt;Azure Blob storage lets you stream large video or audio files directly to the user's browser from anywhere in the world.&lt;/li&gt;
&lt;li&gt; It has the ability to store up to 8 TB of data for virtual machines. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--TY0J3g_b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587758555/8F6MhNB1J.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--TY0J3g_b--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587758555/8F6MhNB1J.png" alt="3-azure-blob-storage.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Data Lake Storage
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Can perform analytics on your data usage and prepare reports.&lt;/li&gt;
&lt;li&gt;stores both structured and unstructured data.&lt;/li&gt;
&lt;li&gt;Azure Data Lake Storage combines the scalability and cost benefits of object storage with the reliability and performance of the Big Data file system capabilities. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--acugwhyV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587846959/tphSK2od0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--acugwhyV--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596587846959/tphSK2od0.png" alt="3-data_lake_store_concept.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Files
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;offers fully managed file shares in the cloud that are accessible via the industry standard Server Message Block (SMB) protocol.&lt;/li&gt;
&lt;li&gt;Azure file shares can be mounted concurrently by cloud or on-premises deployments of Windows, Linux, and macOS. &lt;/li&gt;
&lt;li&gt;Share files anywhere in the world, diagnostic data, or application data sharing.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--MqJn0shw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588038738/sXLKwC4Jl.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MqJn0shw--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588038738/sXLKwC4Jl.png" alt="3-azure_files.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Queue
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;service for storing large numbers of messages that can be accessed from anywhere in the world.&lt;/li&gt;
&lt;li&gt;asynchronous message queueing for communication between application components, whether they are running in the cloud, on the desktop, on-premises, or on mobile devices.&lt;/li&gt;
&lt;li&gt;You can use queue storage to:&lt;/li&gt;
&lt;li&gt;Create a backlog of work and to pass messages between different Azure web servers.&lt;/li&gt;
&lt;li&gt;Distribute load among different web servers/infrastructure and to manage bursts of traffic.&lt;/li&gt;
&lt;li&gt;Build resilience against component failure when multiple users access your data at the same time.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--aQ8ySVUi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588174480/mLL9DYLcX.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--aQ8ySVUi--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588174480/mLL9DYLcX.png" alt="3-azure_queue.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Disk Storage
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Provides disks for virtual machines, applications, and other services&lt;/li&gt;
&lt;li&gt;Disk storage allows data to be persistently stored and accessed from an attached virtual hard disk. &lt;/li&gt;
&lt;li&gt;Disks come in many different sizes and performance levels, from solid-state drives (SSDs) to traditional spinning hard disk drives (HDDs), with varying performance abilities.&lt;/li&gt;
&lt;li&gt;When working with VMs, you can use standard SSD and HDD disks for less critical workloads, and premium SSD disks for mission-critical production applications. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sTuU7XFJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588368190/M2wfY9Oz8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sTuU7XFJ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588368190/M2wfY9Oz8.png" alt="3-azure_disks.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Storage tiers
&lt;/h2&gt;

&lt;p&gt;Storage tiers for blob object storage &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Hot storage tier&lt;/strong&gt;: optimized for storing data that is accessed frequently.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cool storage tier&lt;/strong&gt;: optimized for data that are infrequently accessed and stored for at least 30 days.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Archive storage tier&lt;/strong&gt;: for data that are rarely accessed and stored for at least 180 days with flexible latency requirements.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--vxSDGGJh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588394869/H4EIj-BNY.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--vxSDGGJh--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588394869/H4EIj-BNY.png" alt="3-storage-tiers.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Encryption and replication
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--2VHCu8cE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588422305/7C-ROxhYh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--2VHCu8cE--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588422305/7C-ROxhYh.png" alt="3-azure-storage-encryption.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Azure provides security and high availability to your data through encryption and replication features.&lt;br&gt;
Encryption for storage services&lt;br&gt;
The following encryption types are available for your resources:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Storage Service Encryption (SSE)&lt;/strong&gt;: It encrypts the data before storing it and decrypts the data before returning it. The encryption and decryption are transparent to the user.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Client-side encryption&lt;/strong&gt; is where the data is already encrypted by the client libraries. Azure stores the data in the encrypted state at rest, which is then decrypted during retrieval.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Replication for storage availability&lt;/strong&gt;&lt;br&gt;
The replication feature ensures that your data is durable and always available. Azure provides regional and geographic replications to protect your data against natural disasters and other local disasters like fire or flooding.&lt;/p&gt;

&lt;h1&gt;
  
  
  Advantages
&lt;/h1&gt;

&lt;p&gt;&lt;strong&gt;Cost effectiveness&lt;/strong&gt;: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;on-premises storage has significant up-front expense (or capital cost). It may sit idle or be under-utilized in off-peak times&lt;/li&gt;
&lt;li&gt;Azure data storage provides a pay-as-you-go pricing model, allowing you to scale up or scale out as demand dictates and scale back when demand is low. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Reliability&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;On-premises storage requires data backup, load balancing, and disaster recovery strategies. Which can be challenging and expensive &lt;/li&gt;
&lt;li&gt;Azure data storage provides data backup, load balancing, disaster recovery, and data replication as services to ensure data safety and high availability.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Storage types&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sometimes multiple different storage types are required for a solution, such as file and database storage. An on-premises approach often requires numerous servers and administrative tools for each storage type.&lt;/li&gt;
&lt;li&gt;Azure data storage provides a variety of different storage options including distributed access and tiered storage. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Agility&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Requirements and technologies change. For an on-premises deployment, these changes may mean provisioning and deploying new servers and infrastructure pieces, which are a time consuming and expensive activity.&lt;/li&gt;
&lt;li&gt;Azure data storage gives you the flexibility to create new services in minutes. This flexibility allows you to change storage back-ends quickly without needing a significant hardware investment.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;**&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--9e4yzcU1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588756421/PxZzdchHr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--9e4yzcU1--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596588756421/PxZzdchHr.png" alt="Screenshot 2020-08-05 at 6.22.09 AM.png"&gt;&lt;/a&gt;&lt;br&gt;
omparison**&lt;/p&gt;

&lt;h1&gt;
  
  
  Summary
&lt;/h1&gt;

&lt;p&gt;We explored the benefits of using Azure to store your data. &lt;/p&gt;

&lt;p&gt;Azure provides the following features:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Storage of both structured and unstructured data&lt;/li&gt;
&lt;li&gt;High security that supports global compliance standards&lt;/li&gt;
&lt;li&gt;Load balancing, high availability, and redundancy capabilities&lt;/li&gt;
&lt;li&gt;The ability to send large volumes of data directly to the browser using features such as Azure Blob storage&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Thank you for Reading!😊&lt;/p&gt;

</description>
      <category>azure</category>
      <category>az900</category>
      <category>azurecertified</category>
    </item>
    <item>
      <title>AZ-900 Notes: Azure Portal</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Wed, 05 Aug 2020 00:04:30 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-core-cloud-services-187</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-core-cloud-services-187</guid>
      <description>&lt;p&gt;In this notes you'll:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Learn about Azure management options&lt;/li&gt;
&lt;li&gt;Navigate the Azure portal&lt;/li&gt;
&lt;li&gt;Customise the dashboard&lt;/li&gt;
&lt;li&gt;Learn how to opt in to preview services and features&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure management options
&lt;/h1&gt;

&lt;p&gt;As a new user, the Azure portal is likely to be the primary way you will interact with Azure. The Azure portal lets you create and manage all your Azure resources.&lt;/p&gt;

&lt;p&gt;Tools that are commonly used for day-to-day management and interaction include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Azure portal for interacting with Azure via a Graphical User Interface (GUI)&lt;/li&gt;
&lt;li&gt;Azure PowerShell and Azure Command-Line Interface (CLI) for command line and automation-based interactions with Azure&lt;/li&gt;
&lt;li&gt;Azure Cloud Shell for a web-based command-line interface&lt;/li&gt;
&lt;li&gt;Azure mobile app for monitoring and managing your resources from your mobile device&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure portal
&lt;/h1&gt;

&lt;p&gt;The Azure portal is a public website that you can access with any web browser. Once you sign in with your Azure account, you can create, manage, and monitor any available Azure services.&lt;br&gt;
You can customize the dashboard by moving and resizing tiles, and displaying services you're interested in.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--KQ68qn65--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582309919/0G-te8OUD.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--KQ68qn65--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582309919/0G-te8OUD.png" alt="2-azure-portal.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure PowerShell
&lt;/h1&gt;

&lt;p&gt;Azure PowerShell is a module that you can install for Windows PowerShell or PowerShell Core, which is a cross-platform version of PowerShell that runs on Windows, Linux, or macOS.&lt;br&gt;
Azure PowerShell enables you to connect to your Azure subscription and manage resources.&lt;/p&gt;

&lt;p&gt;For example, Azure PowerShell provides the New-AzVM command that creates a virtual machine for you inside your Azure subscription.&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--ySvqeoL5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582436513/FF43pOZJr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--ySvqeoL5--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582436513/FF43pOZJr.png" alt="Screenshot 2020-08-05 at 4.36.57 AM.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure CLI
&lt;/h1&gt;

&lt;p&gt;Azure CLI is a cross-platform command-line program that connects to Azure and executes administrative commands on Azure resources which can run on Windows, Linux, or macOS.&lt;/p&gt;

&lt;p&gt;Example:&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--3DNoibX_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582552208/kcuVuztnj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--3DNoibX_--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582552208/kcuVuztnj.png" alt="Screenshot 2020-08-05 at 4.38.58 AM.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Cloud Shell
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://shell.azure.com/"&gt;Azure Cloud Shell&lt;/a&gt; is an interactive, authenticated, browser-accessible shell for managing Azure resources.&lt;br&gt;
Cloud Shell has a suite of developer tools, text editors, and other tools available, including:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Developer Tools&lt;/strong&gt;: .NET Core, Python, Java, Node.js, Go&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Editors&lt;/strong&gt;: code (Cloud Shell Editor), vim, nano, emacs&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Other tools&lt;/strong&gt;: git, maven, make, npm, &lt;a href="https://docs.microsoft.com/en-us/azure/cloud-shell/features#tools"&gt;and more...&lt;/a&gt;.
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--MvAR1lYg--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582690572/gHRtyLrRI.png" alt="2-cloud-shell.png"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure mobile app
&lt;/h1&gt;

&lt;p&gt;The Microsoft Azure mobile app allows you to access, manage, and monitor all your Azure accounts and resources from your iOS or Android phone or tablet. &lt;br&gt;
Once installed, you can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Check the current status and important metrics of your services&lt;/li&gt;
&lt;li&gt;Stay informed with notifications and alerts about important health issues&lt;/li&gt;
&lt;li&gt;Quickly diagnose and fix issues anytime, anywhere&lt;/li&gt;
&lt;li&gt;Review the latest Azure alerts&lt;/li&gt;
&lt;li&gt;Start, stop, and restart virtual machines or web apps&lt;/li&gt;
&lt;li&gt;Connect to your virtual machines&lt;/li&gt;
&lt;li&gt;Manage permissions with role-based access control (RBAC)&lt;/li&gt;
&lt;li&gt;Use the Azure Cloud Shell to run saved scripts or perform ad hoc administrative tasks&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--7hN2ISls--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582723091/ap2IAFO5g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--7hN2ISls--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596582723091/ap2IAFO5g.png" alt="2-azure-mobile-app.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Other options
&lt;/h1&gt;

&lt;p&gt;There are also Azure SDKs for a range of languages and frameworks, and REST APIs that you can use to manage and control Azure resources programmatically.&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Marketplace:
&lt;/h1&gt;

&lt;p&gt;The Azure Marketplace is often where you start when creating new resources in Azure. The Marketplace allows customers to find, try, purchase, and provision applications and services from hundreds of leading service providers, all certified to run on Azure.&lt;br&gt;
Using Azure Marketplace, you can provision end-to-end solutions quickly and reliably, hosted in your own Azure environment.&lt;/p&gt;

&lt;h1&gt;
  
  
  Navigate the Azure portal:
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Resource panel&lt;/strong&gt;: left-hand sidebar of the portal, which lists the main resource types.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Status bar&lt;/strong&gt;: at the top-right of the screen contains&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Cloud Shell&lt;/strong&gt;: an interactive, browser-accessible shell for managing Azure resources.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Directory and subscription&lt;/strong&gt;: you can change between subscriptions. or change to another directory.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Notifications&lt;/strong&gt;:  lists the last actions that have been carried out, along with their status.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Help pane&lt;/strong&gt;: show the Help pane which can include: What's new, Azure roadmap, Launch guided tour,Keyboard shortcuts,Show diagnostics,Privacy statement.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Help and support options&lt;/strong&gt;: opens the main help and support area for the Azure portal and includes documentation options for a variety of common questions. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Feedback pane&lt;/strong&gt;: The smiley face icon opens the Send us feedback pane.
&lt;strong&gt;Profile settings&lt;/strong&gt;: Sign in with another account, or sign out entirely, View your account profile, where you can change your password.
&lt;strong&gt;Settings&lt;/strong&gt;: Select the gear icon to change the Azure portal settings. like &lt;/li&gt;
&lt;li&gt;Inactivity sign out delay&lt;/li&gt;
&lt;li&gt;Default view when you first sign in&lt;/li&gt;
&lt;li&gt;Flyout or docked option for the portal menu&lt;/li&gt;
&lt;li&gt;Color and contrast themes&lt;/li&gt;
&lt;li&gt;Toast notifications (to a mobile device)&lt;/li&gt;
&lt;li&gt;Language and regional format
&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--C0Ss8Tdm--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596583449275/m56nM0LkE.png" alt="3-settings-pane.png"&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Azure Advisor
&lt;/h1&gt;

&lt;p&gt;Azure Advisor is a free service built into Azure that provides recommendations on high availability, security, performance, operational excellence, and cost. You can view recommendations in the portal or download them in PDF or CSV format.&lt;/p&gt;

&lt;p&gt;With Azure Advisor, you can:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Get proactive, actionable, and personalized best practices recommendations.&lt;/li&gt;
&lt;li&gt;Improve the performance, security, and high availability of your resources as you identify opportunities to reduce your overall Azure costs.&lt;/li&gt;
&lt;li&gt;Get recommendations with proposed actions inline.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://docs.microsoft.com/en-us/learn/modules/tour-azure-portal/media/5-help-icon.png"&gt;https://docs.microsoft.com/en-us/learn/modules/tour-azure-portal/media/5-help-icon.png&lt;/a&gt;&lt;br&gt;
&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--sFzKhhFZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596583835637/w-NJctI7q.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--sFzKhhFZ--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596583835637/w-NJctI7q.png" alt="3-advisordashboard.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Portal dashboards
&lt;/h1&gt;

&lt;p&gt;A dashboard is a customizable collection of UI tiles displayed in the Azure portal. You add, remove, and position tiles to create the exact view you want, and then save that view as a dashboard. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Multiple dashboards are supported, and you can switch between them as needed. &lt;/li&gt;
&lt;li&gt;You can even share your dashboards with other team members.&lt;/li&gt;
&lt;li&gt;Dashboards are stored as JavaScript Object Notation (JSON) files. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The default web parts are&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dashboard controls&lt;/li&gt;
&lt;li&gt;All resources tile&lt;/li&gt;
&lt;li&gt;Quickstarts + tutorials tile&lt;/li&gt;
&lt;li&gt;Service Health tile&lt;/li&gt;
&lt;li&gt;Marketplace tile&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--GV_I_yWN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596584069323/YU4ravs-L.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--GV_I_yWN--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596584069323/YU4ravs-L.png" alt="6-dashboard-default-webparts.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;At the top of the dashboard are the controls that enable you to create, upload, download, edit, and share a dashboard. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--69UDYDx0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596584229265/j_H4iQQc1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--69UDYDx0--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596584229265/j_H4iQQc1.png" alt="6-customise-dashboard-controls.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Also you can&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dashboard in edit mode: &lt;/li&gt;
&lt;li&gt;You can Change tile sizes.&lt;/li&gt;
&lt;li&gt;Change tile settings.&lt;/li&gt;
&lt;li&gt;Edit a dashboard by changing the JSON file.&lt;/li&gt;
&lt;li&gt;Reset a dashboard.&lt;/li&gt;
&lt;li&gt;Share or unshare a dashboard.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--drbpDSsq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596584265481/OIiXLrhbd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--drbpDSsq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596584265481/OIiXLrhbd.png" alt="6-edit-dashboard.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;You can even:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Switch to a shared dashboard&lt;/li&gt;
&lt;li&gt;Display a dashboard as a full screen&lt;/li&gt;
&lt;li&gt;Clone a dashboard&lt;/li&gt;
&lt;li&gt;Delete a dashboard&lt;/li&gt;
&lt;li&gt;Reset a dashboard&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Access public and private preview features
&lt;/h1&gt;

&lt;p&gt;With Azure Preview Features, you can test beta and other pre-release features, products, services, software, and regions.&lt;/p&gt;

&lt;p&gt;Feature preview categories&lt;/p&gt;

&lt;p&gt;There are two types of previews available:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Private Preview&lt;/strong&gt;. An Azure feature marked "private preview" is available to specific Azure customers for evaluation purposes. This is typically by invite only and issued directly by the product team responsible for the feature or service.&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Public Preview&lt;/strong&gt;. An Azure feature marked "public preview" is available to all Azure customers for evaluation purposes. These previews can be turned on through the preview features page as detailed below.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You can find Azure preview features in the portal by selecting &lt;strong&gt;Create a resource&lt;/strong&gt; in the - resource panel and searching preview.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You can Provide feedback on preview features&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;You can also Get notified about GA releases&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>azure</category>
      <category>azurecertified</category>
      <category>az900</category>
    </item>
    <item>
      <title>AZ-900 Notes: Compute</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Tue, 04 Aug 2020 06:12:00 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-compute-3oc7</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-compute-3oc7</guid>
      <description>&lt;h1&gt;
  
  
  Core Compute products available in Azure
&lt;/h1&gt;

&lt;p&gt;Azure compute is an on-demand computing service for running cloud-based applications. &lt;/p&gt;

&lt;p&gt;There are four common techniques for performing compute in Azure:&lt;/p&gt;

&lt;h3&gt;
  
  
  1. Virtual machines
&lt;/h3&gt;

&lt;p&gt;Virtual machines, or VMs, are software emulations of physical computers. They include a virtual processor, memory, storage, and networking resources. Azure Virtual Machines (VMs) let you create and use virtual machines in the cloud. They provide infrastructure as a service (IaaS) &lt;/p&gt;

&lt;p&gt;Detailed Notes: &lt;a href="https://dev.to/sudhachandranbc/az-900-notes-azure-virtual-machines-29c8"&gt;Here&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  2. Containers
&lt;/h3&gt;

&lt;p&gt;Containers are a virtualization environment for running applications. Just like virtual machines, containers run on top of a host operating system.&lt;/p&gt;

&lt;p&gt;Detailed Notes: &lt;a href="https://dev.to/sudhachandranbc/az-900-notes-containers-in-azure-586h"&gt;Here&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  3. Azure App Service:
&lt;/h3&gt;

&lt;p&gt;Azure App Service is a platform-as-a-service (PaaS) offering in Azure that is designed to host enterprise-grade web-oriented applications.&lt;/p&gt;

&lt;p&gt;Detailed Notes: &lt;a href="https://dev.to/sudhachandranbc/az-900-notes-azure-app-services-4ck1"&gt;Here&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  4. Serverless computing
&lt;/h3&gt;

&lt;p&gt;Serverless computing is the abstraction of servers, infrastructure, and OSs.&lt;br&gt;
Azure takes care of managing the server infrastructure and allocation/deallocation of resources based on demand.&lt;/p&gt;

&lt;p&gt;Detailed Notes: &lt;a href="https://dev.to/sudhachandranbc/az-900-notes-serverless-computing-3bap"&gt;Here&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  Azure Compute services.
&lt;/h1&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--r0MnOjwz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/gxqym58yfkhwvawdcsy0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--r0MnOjwz--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/gxqym58yfkhwvawdcsy0.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thank you for reading!&lt;/p&gt;

</description>
      <category>azure</category>
      <category>az900</category>
      <category>certification</category>
    </item>
    <item>
      <title>AZ-900 Notes: Serverless Computing</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Tue, 04 Aug 2020 05:54:01 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-serverless-computing-3bap</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-serverless-computing-3bap</guid>
      <description>&lt;p&gt;Serverless computing is the abstraction of servers, infrastructure, and OSs.&lt;/p&gt;

&lt;p&gt;Azure takes care of managing the server infrastructure and allocation/deallocation of resources based on demand.&lt;/p&gt;

&lt;p&gt;Serverless computing implemented in 3 ways:&lt;/p&gt;

&lt;h3&gt;
  
  
  Abstraction of servers:
&lt;/h3&gt;

&lt;p&gt;Serverless computing abstracts the servers you run on.&lt;br&gt;
Deploy your code, which then runs with high availability.&lt;/p&gt;

&lt;h3&gt;
  
  
  Event-driven scale:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Serverless computing is an excellent fit for workloads that respond to incoming events.&lt;/li&gt;
&lt;li&gt;Events include triggers by timers (for example, if a function needs to run every day at 10:00 AM UTC), HTTP (API and webhook scenarios), queues (for example, with order processing), and much more. &lt;/li&gt;
&lt;li&gt;Instead of writing an entire application, the developer authors a function, which contains both code and metadata about its triggers and bindings. &lt;/li&gt;
&lt;li&gt;The platform automatically schedules the function to run and scales the number of compute instances based on the rate of incoming events. &lt;/li&gt;
&lt;li&gt;Triggers define how a function is invoked and bindings provide a declarative way to connect to services from within the code.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Micro-billing:
&lt;/h3&gt;

&lt;p&gt;Pay only for the time their code runs.&lt;/p&gt;

&lt;p&gt;Azure has two implementations of serverless compute:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Azure Functions&lt;/strong&gt;, which can execute code in almost any modern language.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Azure Logic Apps&lt;/strong&gt;, which are designed in a web-based designer and can execute logic triggered by Azure services without writing any code.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Azure Functions
&lt;/h2&gt;

&lt;p&gt;They're commonly used when you need to perform work in response to an event, often via a REST request, timer, or message from another Azure service.&lt;br&gt;
Azure Functions scale automatically based on demand&lt;br&gt;
 Azure Functions can be either stateless (the default), where they behave as if they're restarted every time they respond to an event, or stateful (called "Durable Functions"), &lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Logic Apps
&lt;/h2&gt;

&lt;p&gt;They are similar to Functions,  both enable you to trigger logic based on an event.&lt;br&gt;
 Logic Apps execute workflows designed to automate business scenarios and built from predefined logic blocks.&lt;br&gt;
You create Logic App workflows using a visual designer on the Azure portal or in Visual Studio.  The workflows are persisted as a JSON file with a known workflow schema.&lt;/p&gt;

&lt;h2&gt;
  
  
  Differences between functions and logic apps.
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--c5IOVlwH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596516353263/sJEGGzCPd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--c5IOVlwH--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596516353263/sJEGGzCPd.png" alt="Screenshot 2020-08-04 at 10.15.17 AM.png"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>azure</category>
      <category>az900</category>
      <category>certification</category>
    </item>
    <item>
      <title>AZ-900 Notes: Azure App Services</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Tue, 04 Aug 2020 05:03:45 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-azure-app-services-4ck1</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-azure-app-services-4ck1</guid>
      <description>&lt;h1&gt;
  
  
  Azure App Service enables:
&lt;/h1&gt;

&lt;ul&gt;
&lt;li&gt;To build and host web apps,&lt;/li&gt;
&lt;li&gt; background jobs, &lt;/li&gt;
&lt;li&gt;mobile backends, &lt;/li&gt;
&lt;li&gt; RESTful APIs in the programming language of your choice without managing infrastructure. &lt;/li&gt;
&lt;li&gt;It offers automatic scaling and high availability.&lt;/li&gt;
&lt;li&gt;This platform as a service (PaaS) allows you to focus on the website and API logic while Azure handles the infrastructure to run and scale your web applications.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Costs
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Pay for resources used by app based on App Service Plan.&lt;/li&gt;
&lt;li&gt;free tier you can use to host small, low-traffic sites.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Types of app services
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Web Apps&lt;/strong&gt;: Includes full support for hosting web apps using ASP.NET, ASP.NET Core, Java, Ruby, Node.js, PHP, or Python. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;API Apps&lt;/strong&gt;: you can build REST-based Web APIs using your choice of language and framework. You get full Swagger support, and the ability to package and publish your API in the Azure Marketplace. &lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;WebJobs&lt;/strong&gt;: WebJobs allows you to run a program (.exe, Java, PHP, Python, or Node.js) or script (.cmd, .bat, PowerShell, or Bash) in the same context as a web app, API app, or mobile app.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Mobile Apps&lt;/strong&gt;:  quickly build a back-end for iOS and Android apps. 
Store mobile app data in a cloud-based SQL database. 
Authenticate customers against common social providers such as MSA, Google, Twitter, and Facebook. 
Send push notifications. 
Execute custom back-end logic in C# or Node.js.&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>azure</category>
      <category>az900</category>
      <category>certification</category>
    </item>
    <item>
      <title>AZ-900 Notes:  Containers in Azure</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Tue, 04 Aug 2020 05:00:35 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-containers-in-azure-586h</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-containers-in-azure-586h</guid>
      <description>&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--JF8STcYq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ckw87uqkg65k3l0gva0g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--JF8STcYq--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/i/ckw87uqkg65k3l0gva0g.png" alt="Alt Text"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;A container is a modified runtime environment built on top of a host OS that executes your application.&lt;/p&gt;

&lt;p&gt;Azure supports Docker containers (a standardized container model), and there are several ways to manage containers in Azure.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Azure Container Instances (ACI)&lt;/li&gt;
&lt;li&gt;Azure Kubernetes Service (AKS)&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Azure Container Instances
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;offers the fastest and simplest way to run a container in Azure&lt;/li&gt;
&lt;li&gt;It is a PaaS offering that allows you to upload your containers and execute them directly with automatic elastic scale.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Azure Kubernetes Service
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;The task of automating, managing, and interacting with a large number of containers is known as orchestration. &lt;/li&gt;
&lt;li&gt;AKS is a complete orchestration service for containers with distributed architectures with multiple containers. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Containers are often used to create solutions using a microservice architecture.&lt;br&gt;
This architecture is where you break solutions into smaller, independent pieces. &lt;/p&gt;

&lt;h2&gt;
  
  
  What is Microservice?
&lt;/h2&gt;

&lt;p&gt;Imagine you may split a website into &lt;br&gt;
a container hosting your front end, &lt;br&gt;
another hosting your back end, &lt;br&gt;
and a third for storage. &lt;br&gt;
This split allows you to separate portions of your app into logical sections that can be maintained, scaled, or updated independently.&lt;/p&gt;

&lt;h2&gt;
  
  
  Migrating apps to containers
&lt;/h2&gt;

&lt;p&gt;You can move existing applications to containers and run them within AKS. You can control access via integration with Azure Active Directory (Azure AD) and access Service Level Agreement (SLA)–backed Azure services, such as Azure Database for MySQL for any data needs, via Open Service Broker for Azure (OSBA).&lt;/p&gt;

</description>
      <category>azure</category>
      <category>az900</category>
      <category>certificate</category>
    </item>
    <item>
      <title>AZ-900 Notes: Azure Virtual Machines</title>
      <dc:creator>Sudha Chandran B C</dc:creator>
      <pubDate>Tue, 04 Aug 2020 04:55:40 +0000</pubDate>
      <link>https://dev.to/sudhachandranbc/az-900-notes-azure-virtual-machines-29c8</link>
      <guid>https://dev.to/sudhachandranbc/az-900-notes-azure-virtual-machines-29c8</guid>
      <description>&lt;p&gt;Azure Virtual Machines (VMs) let you create and use virtual machines in the cloud. &lt;br&gt;
They provide infrastructure as a service (IaaS). &lt;/p&gt;

&lt;p&gt;You can create and provision a VM in minutes when you select a pre-configured VM image. &lt;/p&gt;

&lt;p&gt;An image is a template used to create a VM. These templates already include an OS and often other software, like development tools or web hosting environments.&lt;/p&gt;

&lt;h2&gt;
  
  
  When to use virtual machines?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;During testing and development&lt;/li&gt;
&lt;li&gt;When running applications in the cloud. &lt;/li&gt;
&lt;li&gt;When extending your datacenter to the cloud.&lt;/li&gt;
&lt;li&gt;During disaster recovery.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Scaling VMs in Azure
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Availability sets&lt;/li&gt;
&lt;li&gt;Virtual Machine Scale Sets&lt;/li&gt;
&lt;li&gt;Azure Batch&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Availability sets
&lt;/h2&gt;

&lt;p&gt;VMs are put into different update domains. Update domains indicate groups of VMs and underlying physical hardware that can be rebooted at the same time. Update domains are a logical part of each data center and are implemented with software and logic.&lt;/p&gt;

&lt;p&gt;The group of virtual machines that share common hardware are in the same fault domain. A fault domain is essentially a rack of servers. It provides the physical separation of your workload across different power, cooling, and network hardware that support the physical servers in the data center server racks. In the event the hardware that supports a server rack becomes unavailable, only that rack of servers is affected by the outage.&lt;/p&gt;

&lt;p&gt;The group of virtual machines that share common hardware are in the same fault domain.&lt;/p&gt;

&lt;p&gt;A planned maintenance event is when the underlying Azure fabric that hosts VMs is updated by Microsoft. A planned maintenance event is done to patch security vulnerabilities, improve performance, and add or update features.&lt;/p&gt;

&lt;p&gt;Unplanned maintenance events involve a hardware failure in the data center, such as a power outage or disk failure. VMs that are part of an availability set automatically switch to a working physical server so the VM continues to run.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--i7WiTn1q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596500049912/R_gtgS6BH.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--i7WiTn1q--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://cdn.hashnode.com/res/hashnode/image/upload/v1596500049912/R_gtgS6BH.png" alt="3-availability-sets.png"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;With an availability set, you get:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Up to &lt;strong&gt;three&lt;/strong&gt; fault domains that each have a server rack with dedicated power and network resources&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Five&lt;/strong&gt; logical update domains which then can be increased to a maximum of 20&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Virtual machine scale sets
&lt;/h2&gt;

&lt;p&gt;Azure Virtual Machine Scale Sets let you create and manage a group of identical, load balanced VMs.&lt;br&gt;
Scale sets allow you to centrally manage, configure, and update a large number of VMs in minutes to provide highly available applications.&lt;br&gt;
The number of VM instances can automatically increase or decrease in response to demand or a defined schedule&lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Batch
&lt;/h2&gt;

&lt;p&gt;Azure Batch enables large-scale job scheduling and compute management with the ability to scale to tens, hundreds, or thousands of VMs.&lt;/p&gt;

&lt;p&gt;When you're ready to run a job, Batch does the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Starts a pool of compute VMs for you&lt;/li&gt;
&lt;li&gt;Installs applications and staging data&lt;/li&gt;
&lt;li&gt;Runs jobs with as many tasks as you have&lt;/li&gt;
&lt;li&gt;Identifies failures&lt;/li&gt;
&lt;li&gt;Requeues work&lt;/li&gt;
&lt;li&gt;Scales down the pool as work completes&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>azure</category>
      <category>az900</category>
      <category>azurecertified</category>
    </item>
  </channel>
</rss>
