Like many of you, my first real exposure to AI was when ChatGPT dropped. I spent way too much time prompting it with random stuff, used it for some PowerShell, and tried out the voice feature when ...
In Azure, following a policy-driven approach to governance is crucial. It’s all about making sure that everyone who uses Azure can’t set things up the wrong way. Imagine having a set of clear instr...
If you’ve worked in Azure, you have definitely come across managing access using Role Based Access Control (RBAC) and have been met with different challenges. Until recently, the RBAC model in Azur...
The App Service Environment v3 has brought significant improvements to secure cloud computing. It offers a range of features that enhance the performance, security, and scalability of web applicati...
Automating the process of creating Private Endpoint DNS configurations in their respective zones is key for a successful private networking implementation in Azure. Record creation can be done usi...
I have always wanted to learn a bit of Python, so I set out to do a project in Django where I have a form that I can fill out and when submitted it will start an Azure DevOps pipeline and provide t...
Privileged Identity Management (PIM) in Azure helps you manage and monitor access to your Azure resources. It’s a great service that lets you set up just-in-time access with additional security con...
Alright, so you’re thinking of enabling Private Endpoints for your Azure SQL server to increase your security posture and disable incoming connections from the internet. Maybe you’re hesitant becau...
In this post we’ll talk about authenticating to SQL Managed Instance using Azure AD and Active Directory users and groups. If you’re running SQL server on-premises you most likely already have a st...
In part 1 I gave an introduction on how to set up Private Endpoint and DNS and mentioned that the privatelink DNS zones should be handled centrally by your IT or Azure team. In this post I’ll expan...
A new version of content is available.