Cilium Network Policy in AKS
If you are following the Azure Kubernetes Service space, I am sure you noticed that Azure CNI powered by Cilium…
If you are following the Azure Kubernetes Service space, I am sure you noticed that Azure CNI powered by Cilium…
Virtually every expert out there recommends following an Infrastructure-as-Code approach to manage Azure Networks, and even more so when dealing…
Windows Hello Fingerprint Biometric tokenization is the process of substituting a stored biometric template with a non-sensitive equivalent, called a token, that lacks…
Introduction If you are a developer who wants to build AI-first apps with natural language processing and large language models,…
In this blog, I am writing about Defender for DevOps and Microsoft DevOps Security. This blog explains the required steps…
Windows Terminal with Azure Cloud Shell CLI Microsoft Azure Artificial Intelligence (AI) is going fast in the Cloud, It can…
Build5Nines Weekly provides your go-to source to keep up-to-date on all the latest Microsoft Azure news and updates. Included within…
Today I was looking at IPvlan on a docker container in Azure along a colleague, and we found that there…
In this post, I’ll explain how to check if a client service, such as an App Service, has access to…
Wow, that was a long title. Let me give you another one: if you haven’t tested your High Availability (HA)…
Azure Arc Extensions Keep your Azure Arc extensions up-to-date
In every network you want to know what traffic is using it. Networking devices offer multiple options to report on…
Microsoft Azure Arc Microsoft Azure Arc Services is a bridge that extends the Azure platform to help you build applications…
Managing user access and permissions in Azure DevOps can be a time-consuming task, especially for larger organizations. In this blog…
ITOps Talk GitHub Repo GitHub has become the central location for open-source projects, samples, and even content – but primarily…
Here is a PowerShell script to check the Image or Model versions of each instance in an Azure Virtual Machine…
In a previous blog post, we discussed two Python programs, upload_vectors.py and search_vectors.py. These programs were used to create and…
In this blog post, we’ll show you a different approach to searching through a large database of blog posts. The…
In this post, I’ll show how I solved a failure, that occurred during an Azure Image Builder (Packer) build with…
In a previous post, we wrote about using vectorized search and cosine similarity to quickly query a database of blog…
If your developers are building notebooks directly in Azure Databricks portal, then you can quickly enhance their productivity but adding…
It is possible to dynamically retrieve the resulting IP address of an Azure Private Endpoint and use it in other…
Searching through a large database of blog posts can be a daunting task, especially if there are thousands of articles.…
In this post, I’m going to discuss the shock that switching from traditional CapEx spending to cloud/OpEx spending causes. I…
Windows Server Insider Preview Downloads With Microsoft Prerelease Software like Windows Server Insider Preview Builds, you can experience and test…
In this blog post, we will be discussing how to build your own chat bot using the ChatGPT API. It’s…
Conditional access is a crucial security feature for protecting your organisations services from unauthorised access. However, by default, personal access…
I’ve been doing some work recently using Azure Storage Queues with Azure Functions to ingest data from a third party.…
This one is going to be about a setup I recently tested with a customer: an Azure Data Factory pipeline…
An unfortunately common scenario is where you must create a site-to-site network connection with a third-party network from your Azure…
How to access onedrive files using Graph API? Currently there are two ways, those are delegated and application flows, and…
Terraform Associate Exam Practice Questions – Terraform Associate Level Questions Part 2 How many ways you can assign variables in…
Terraform Associate Exam Practice Questions – Terraform Associate Level Questions Part 1 What is idempotent in IAC? In the context…
This post will show you how to get the ARM (also for Bicep, Terraform, etc) names of the diagnostics logs…
This article will explain how to simply import a resource that was successfully deployed by Terraform from a GitHub action…
I have been using GitHub Copilot for a while now, and I love it! The AI assistant has significantly improved…
Automate provisioning and governance of your on-premises applications – SCIMming into the Future: Provisioning On-Premises Apps with Azure AD Identity…
Don’t leave your Azure AD environment vulnerable – Take action to secure it now! – Tutorial : Require Step Up…
Here I will describe how you can deal with an issue where you cannot delete a subnet from a VNet…
Securing Azure Cloud Environment with Terraform and Microsoft Defender – Enabling Microsoft Defender for Cloud Plan using Terraform Terraform is…
If you need to set up CI/CD for your Data Factory, here is how to do it in less than…
Automate provisioning and governance of your on-premises applications – SCIMming into the Future: Provisioning On-Premises Apps with Azure AD Identity…
How to Connect Users Across Multiple Tenants in a Multi-Tenant Organization – Cross Tenant Sync Cross-tenant synchronization is a new…
A Guide to Implementing Precise Access Control in Microsoft Azure – Azure Attribute-based Access Control (ABAC) As an organization expands,…
Exploring the Challenges and Benefits of Microsoft Identity Manager in Hybrid AD Environment – The Importance of Microsoft Identity Manager…
I will explain a recent situation where an application that uses SignalR/WebSockets disconnected when routed through the Azure Application Gateway…
Do you want to query SharePoint and get the files or list information in a secure way using Azure’s Service…
Did you ever have the DeploymentNotFound error when using Azure Bicep without any syntax errors? I had the same problem.…
The delivery plan shows the scheduled work items by sprint … The steps to manage Agile software delivery plans across…
In this post, we will take a look at managed identities in general and system-assigned managed identity in particular. Managed…