Categories
Archives
- September 2024
- August 2024
- July 2024
- June 2024
- April 2024
- March 2024
- January 2024
- December 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- April 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- July 2022
- May 2022
- April 2022
- February 2022
- January 2022
- December 2021
- November 2021
- September 2021
- August 2021
- July 2021
Category: Using deployment slots
Managing APIs with Azure API Gateway – Comparing Application Components
When building cloud solutions and web applications, it is common to use APIs – specific types of apps that only return data in JSON or XML. This data is then used by a consuming application, a desktop application, a mobile application, or even a website. APIs can be used internally or to expose your data …
Managing APIs with Azure API Gateway – Comparing Application ComponentsRead More
Using deployment slots – Comparing Application Components
A powerful feature of app services in Azure is deployment slots. When publishing updates to app services, you need to be confident that your latest changes do not break the existing running application. Although you should always test changes in lower environments such as a development or test environment first, a final production deployment can …
Using deployment slots – Comparing Application ComponentsRead More
Working with web applications – Comparing Application Components
In the previous chapter, we concluded Section 3, Infrastructure and Storage Components, by looking at how to migrate existing on-premises workloads into Azure and what different options were available from an architectural and strategic perspective. With this chapter, we begin Section 4, Applications and Databases, by looking at the different options and architectural patterns for …
Working with web applications – Comparing Application ComponentsRead More
Azure Advisor – Migrating Workloads to Azure
Perhaps the most useful tool, Azure Advisor makes suggestions for you based on your services’ many different aspects. Categorized by cost, security, reliability, operational excellence, and performance, you can quickly see a series of opportunities to optimize your service. Some of these recommendations include cost and performance options. As we discussed earlier, however, Azure Advisor …
Monitoring and optimizing your migration – Migrating Workloads to Azure
Azure has several opportunities for enhancing performance and security that you may not have used with your on-premises systems. It is also possible that your existing servers were underutilized or even overutilized, which can impact costs. Therefore, once migrated, you should monitor your workloads for performance trends, security enhancements, or cost optimizations. To support these …
Monitoring and optimizing your migration – Migrating Workloads to AzureRead More
Understanding migration options – Migrating Workloads to Azure
The next phase of the migration planning is to determine how your migrated services will be built. This may be a simple lift-and-shift of one VM to a new VM in Azure, or you may take the opportunity to modify the technologies you use. This part of the process is more than just technical decisions …
Understanding migration options – Migrating Workloads to AzureRead More
Assessing on-premises systems – Migrating Workloads to Azure
In the previous chapter, we examined Azure storage use, looking at the different types available, including their benefits, and how to secure them. In this chapter, we will focus on migrating workloads from on-premises systems into Azure. The process starts with an analysis of your current environment. We will discuss the areas you must consider, …
Assessing on-premises systems – Migrating Workloads to AzureRead More
Encryption – Exploring Storage Solutions
All storage accounts in Azure are encrypted by Storage Service Encryption (SSE) using a 256-bit Advanced Encryption Standard (AES) cipher. This makes Azure storage FIPS 140-2 compliant. Important note FIPS 140-2 is a US government security standard for the approval of cryptographic processes. By default, the keys used to encrypt the storage are managed by …
Authorization – Exploring Storage Solutions
The next layer of protection ensures the person or application trying to access the data is authorized to. There are several different mechanisms in which to achieve this. RBAC Using RBAC, we can ensure a user or other type of identity (such as a managed identity or service principal) is authorized to perform a task …
VM disks – Exploring Storage Solutions
Windows and Linux servers must have at least one hard disk drive to store the operating system on and, sometimes, you might also need separate data disks. When virtualization was introduced, those disks also become virtual but were stored on physical drives as disk image files used by the Hypervisor. In the case of Windows …