Category: Microsoft AZ-304 Certifications

Understanding microservices – Comparing Application Components

One of the goals of cloud computing is to provide cost-effective solutions that are dynamic and reliable. In Chapter 7, Designing Compute Solutions, we looked at several different components: containers, Kubernetes, Azure Functions, and Logic Apps. One of the key differences between these services and more traditional compute options, such as VMs, is the ability …

Understanding microservices – Comparing Application ComponentsRead More

Client certificates – Comparing Application Components

You can configure the Azure API gateway so that it requires a certificate when making calls. Whereas subscription keys are generated by you and can be quickly supplied, certificates provide greater security. However, the certificate must be generated by a certificate authority and securely provided to your consumers. But when security and control are of …

Client certificates – Comparing Application ComponentsRead More

Using API policies – Comparing Application Components

Azure API Management policies allow you to change how your APIs function and behave. Typical examples include rate-limiting responses, converting one format to another, such as XML to JSON, or even modifying the contents of the data returned. Azure API Management offers a range of built-in policies, or you can create custom ones. The following …

Using API policies – Comparing Application ComponentsRead More

Managing APIs with Azure API Gateway – Comparing Application Components

When building cloud solutions and web applications, it is common to use APIs – specific types of apps that only return data in JSON or XML. This data is then used by a consuming application, a desktop application, a mobile application, or even a website. APIs can be used internally or to expose your data …

Managing APIs with Azure API Gateway – Comparing Application ComponentsRead More

Migrating databases – Migrating Workloads to Azure

Like the VM migration service, you must create a database migration project in the Azure Migrate blade in the Azure portal to get started with the database migration service.The first step is to download the Data Migration Assessment (DMA) tool. Unlike the VM migration tool that comes pre-installed on a VM image, the DMA tool …

Migrating databases – Migrating Workloads to AzureRead More

Migrating virtual machines and databases – Migrating Workloads to Azure

Depending on how you plan to migrate into Azure, determine your next steps and what tools are required. Refactorization, re-architecting, rebuilding, and replacing are manual processes and will need to be managed as individual projects. There are several tools available for VM migrations, and again, the Azure Migrate tool can perform this task for you. …

Migrating virtual machines and databases – Migrating Workloads to AzureRead More

Assessing on-premises systems – Migrating Workloads to Azure

In the previous chapter, we examined Azure storage use, looking at the different types available, including their benefits, and how to secure them. In this chapter, we will focus on migrating workloads from on-premises systems into Azure. The process starts with an analysis of your current environment. We will discuss the areas you must consider, …

Assessing on-premises systems – Migrating Workloads to AzureRead More

AzCopy – Exploring Storage Solutions

AzCopy is a command-line tool available for Windows, Linus, and macOS that wraps some of the REST APIs calls to make it easier to perform actions against storage accounts. AzCopy has a login command to authenticate you to your Azure subscription and obtain an authorization token. You could use SAS to grant access without the …

AzCopy – Exploring Storage SolutionsRead More

Authorization – Exploring Storage Solutions

The next layer of protection ensures the person or application trying to access the data is authorized to. There are several different mechanisms in which to achieve this. RBAC Using RBAC, we can ensure a user or other type of identity (such as a managed identity or service principal) is authorized to perform a task …

Authorization – Exploring Storage SolutionsRead More

VM disks – Exploring Storage Solutions

Windows and Linux servers must have at least one hard disk drive to store the operating system on and, sometimes, you might also need separate data disks. When virtualization was introduced, those disks also become virtual but were stored on physical drives as disk image files used by the Hypervisor. In the case of Windows …

VM disks – Exploring Storage SolutionsRead More



          Copyright © 2015-2024 | About | Terms of Service | Privacy Policy