Search This Blog

Wednesday, February 22, 2023

Sunday, February 19, 2023

Tuesday, February 7, 2023

how often azure applies storage lifecycle management rule ?

 how often azure applies storage lifecycle management rule

once a day
The platform runs the lifecycle policy once a day. Once you configure a policy, it can take up to 24 hours to go into effect. Once the policy is in effect, it could take up to 24 hours for some actions to run for the first time.5 days ago

Monday, February 6, 2023

How do I provide time limited access to my storage account? ~ Azure

 Answer:- To provide time-limited access to the storage1, we need to use SAS (shared access signature). If you have an Azure storage account and the name of the account is storage1 and you need to provide time-limited access to your azure storage account named storage1 then you need to use SAS.

Sunday, February 5, 2023

What is a proximity placement group in Azure? Which resources can be placed in a proximity placement group?

 A proximity placement group is created as an Azure resource. You can choose the proximity placement group to be used when creating availability sets, VMs, or VM scale sets. While using availability sets and VM scale sets, the proximity placement group is configured at the resource level as opposed to the VM level.

- src internet


Who can perform access review in Azure?

 To create access reviews for Azure resources, you must be assigned to the Owner or the User Access Administrator role for the Azure resources. To create access reviews for Azure AD roles, you must be assigned to the Global Administrator or the Privileged Role

azure bastion

 When you deploy from VM settings, Bastion is automatically configured with default values from the VNet

NameDefault value
AzureBastionSubnetThis subnet is created within the VNet as a /26
SKUBasic
NameBased on the virtual network name
Public IP address nameBased on the virtual network name

Saturday, February 4, 2023

Assigning the Report Reader built-in role to a Resource Group or VM isn't possible, because the Report Reader is currently an Azure AD role-based access control (RBAC) role.

 Assigning the Report Reader built-in role to a Resource Group or VM isn't possible, because the Report Reader is currently an Azure AD role-based access control (RBAC) role.

What are managed identities for Azure resources?

 A common challenge for developers is the management of secrets, credentials, certificates, and keys used to secure communication between services. Managed identities eliminate the need for developers to manage these credentials.

You can use managed identities to authenticate to any resource that supports Azure AD authentication, including your own applications.

Managed identity types

There are two types of managed identities:


System-assigned. Some Azure resources, such as virtual machines allow you to enable a managed identity directly on the resource. When you enable a system-assigned managed identity:


A service principal of a special type is created in Azure AD for the identity. The service principal is tied to the lifecycle of that Azure resource. When the Azure resource is deleted, Azure automatically deletes the service principal for you.

By design, only that Azure resource can use this identity to request tokens from Azure AD.

You authorize the managed identity to have access to one or more services.

The name of the system-assigned service principal is always the same as the name of the Azure resource it is created for. For a deployment slot, the name of its system-assigned identity is <app-name>/slots/<slot-name>.

User-assigned. You may also create a managed identity as a standalone Azure resource. You can create a user-assigned managed identity and assign it to one or more Azure Resources. When you enable a user-assigned managed identity:


A service principal of a special type is created in Azure AD for the identity. The service principal is managed separately from the resources that use it.

User-assigned identities can be used by multiple resources.

You authorize the managed identity to have access to one or more services.

Network Security Group service tag for Azure Backup is now available

 

Network Security Group service tag for Azure Backup is now available

Deploy container instances into an Azure virtual network

 To deploy a container group to an existing virtual network:

  1. Create a subnet within your existing virtual network, use an existing subnet in which a container group is already deployed, or use an existing subnet emptied of all other resources and configuration.

How do I connect to Azure Container registry?

 Sign into the Azure CLI on your local machine, then run the az acr login command. Specify only the registry resource name when logging in with the Azure CLI. Don't use the fully qualified login server name. The command returns Login Succeeded once completed.


Friday, February 3, 2023

Soft delete for Azure Backup

 Soft delete protection is available for these services:


Soft delete for Azure virtual machines

Soft delete for SQL server in Azure VM and soft delete for SAP HANA in Azure VM workloads

what is azure soft delete ?

 Soft delete for VMs protects the backups of your VMs from unintended deletion. Even after the backups are deleted, they're preserved in soft-delete state for 14 additional days.

azure backup vault limitations

 Is there a limit on the amount of data backed up using a Recovery Services vault? There's no limit on the total amount of data you can back up using a Recovery Services vault. The individual data sources (other than Azure VMs), can be a maximum of 54,400 GB in size.