Archives for Cloud Computing - Page 13
2 way trust – Extend Your On-Premises AD to the AWS Cloud
Extend Your On-Premises AD to the AWS Cloud If you already have an AD infrastructure and want to use it when migrating AD-aware workloads to the AWS Cloud, AWS Managed…
App Load Balancing vs. Network Load Balancing–either AWS or Azure
Too much work to have SSL on layer 7 The application load balancer is operating at level 7 it has to decrypt the HTTP request to inspect its headers, and…
Lambda Scenarios, IAM and Limits
Lambda Scenarios Proxy to other backend services Lambda serves as the ACTUAL backend service (http calls – a new function is launched for each call) API Gateway is part of…
AWS Governance
Governance Users and IAM Governance No Root user creds (lock away creds). Create IAM users and assign specific roles. Create roles with granular access Cross account access roles Accounts Governance…
AWS IAM and Monitoring
Why do you need Roles? Instances and Apps On Instances need to access AWS services. Say an S3 bucket. Now, you can either provide access keys to accomplish this. But…
AWS Elasticache
Access to Cache cluster from OUTSIDE of AWS – Use a NAT Instance
Azure Devops–Repeatable Process
Boards —> work items —> boards —> backlogs —> Sprints —> Queries — backlog items, tasks —> traceability Repos —> TFVC , git, github, pull requests - before committing to…
Azure Visio Diagrams
It wasn't the easiest job finding azure visio diagrams online. I knew these diagrams existed. Here is where to find azure solution diagrams in visio as well as azure visio…
cloudformation basics
Why Automate? Reproducible - Automate infrastructure creation Automatic Dependencies – what to create first , second, next - are resolved automatically – based on the References (Refs) in the stack…
Azure Disks– Azure managed disks
Disk Encryption Azure Disk Encryption helps protect and safeguard your data to meet your organizational security and compliance commitments. It uses the BitLocker feature of Windows and the DM-Crypt feature…