Collection of Azure notes.
- Able to create access reviews
- Within access reviews, to send periodic review emails to managers
- Within access reviews, Automatically revokes access from users if manager doesn't verify the permissions
- Users can also report for their access reviews
- Users are removed when report that they don't need the permission, or if they do not respond as well
- Create eligible and active permissions
- Both Azure AD and Azure permissions
- Just-in-Time (JIT)
V1 | V2 FileStorage (Premium) |
BlobStorage (Premium) |
V2 Standard | |
---|---|---|---|---|
Access Tier (Hot, Cool) | - | - | ✔️ | ✔️ |
Support File Shares | - | ✔️ | - | ✔️ |
Max Redundancy | ZRS | ZRS | RA-GRS | |
Support Transaction Optimized | - | - | - | ✔️ (Files) |
Immutability | - | ✔️ | ✔️ |
- Hot - Optimized for data accessed frequently
- Cool tier - Minimum o 30 days
- Archive - Minimum of 180 days
- Hot and Cool are online
- Archive can take up to 15 hours
GRS replicates that data but it is not unavailable unless a failover occurs.
RA-GRS makes the data always available for read in the second paired region, even if the primary becomes unavailable.
- Legal Hold: Applied and persists until removed
- Time retention: Persists changes for a period of time (requires version activation)
- AAD Application Proxy allows users to connect to an on-premises app without VPN
- Azure AD Enterprise Application is required first - the configuration of the Application Proxy Service is done per app
- On-premises Application Proxy Connector is required (it runs on Windows on-prem)
- The connector may authenticate to the on-premises Active Directory
- Premium SKU is required for permissions in the Databricks folders
- Premium SKU is required for Credential Passthrough
- IP Flow verify will establish logical verification of connectivity
- Connection Troubleshoot will perform real connectivity tests
- Traffic Analytics provides insights over data collected by Network Watcher services, such as NSG Flow Logs - Since it uses for example IP Flow underneath, it helps identifying connectivity issues.
- Security logs tables for VMs:
- Windows - Events
- Linux - Syslog
There are several agents that can send data to Azure Monitor.
- Policies can be applied to the following scopes:
- Management Groups
- Subscriptions
- Resources Groups
General Purpose (Standard) |
Hyperscale | Business Critical (Premium) |
|
---|---|---|---|
Maximum storage size | 4 TB | 100 TB | 4 TB |
Serverless | ✔️ | - | - |
Zone Redundant | ✔️ | ✔️ | ✔️ |
Server License | ✔️ | ✔️ | ✔️ |
Read scale-out | - | - | ✔️ |
HA Secondary Replicas | - | ✔️ | - |
Advanced Data Corruption Protection | - | - | ✔️ |
Fast geo-recovery | - | - | ✔️ |
Geo-redundant Backups | ✔️ | ✔️ | ✔️ |
Basic | Standard | Premium | |
---|---|---|---|
Maximum storage size | 2 GB | 1 TB | 4 TB |
Serverless | - | - | - |
Zone Redundant | - | - | ✔️ |
Server License | - | - | - |
Read scale-out | - | - | ✔️ |
HA Secondary Replicas | - | - | - |
Geo-redundant Backups | ✔️ | ✔️ | ✔️ |
- Up to 16 TB of storage size.
- Support auto-failover to the secondary region.
- Support CLR.
- Support Linked Servers
- Support distributed server-side transactions using Transact-SQL
- Availability Zones
SQL offers the following resources to help with performance:
- Performance recommendations - Recommendations: Optimize the layout of non-clustered indexes, Fix database schema issues, fix database parameterization issues.
- Query Performance Insight - Lists for top long running queries.
- Automatic Tuning - Azure SQL Database built-in intelligence automatically tunes your databases to optimize performance. Click here to learn more about automatic tuning.
Operations Management Suite (OMS) is a management offering which provides monitoring for Azure Resources through the Log Analytics service. Log Analytics enables users to collect, correlate and visualize structured and unstructured data. Through the out of the box solutions available in OMS Log Analytics, users can easily monitor and receive notifications on the health of their Azure Resources such as SQL Azure.
- Always Encrypted - Encrypt entire columns and allow only the application access it
- Dynamic Data Masking - Masks parts of sensitive data and allow, allowing for role configuration.
- Transparent Data Encryption - Is the encryption at storage level of the disks
- Basic - Supports only VPN Gateways
- Standard - Required for ExpressRoute
Consumption (Serverless) |
Premium | Dedicated (App Service Plan) |
ASE | |
---|---|---|---|---|
Virtual Network | - | ✔️ | - | ✔️ |
Azure Functions has SendGrid connectors for emails.
It is possible to connect Logic Apps to an On-premies SQL Server by using an On-premises Data Gateway and a connection gateway resource.
Consumption (Serverless) |
Basic | Standard | Premium | |
---|---|---|---|---|
Multiple custom domains | - | - | - | ✔️ |
Availability zone support | - | - | - | ✔️ |
Virtual network support | - | - | - | ✔️ |
Multi-region deployment | - | - | - | ✔️ |
To take action with budgets, create a Budget and associate to an Action Group from (Azure Monitor) Alert.
If you wish for example, to turn off resources, it would be created with an Automation Runbook.
Maximum retention period is 730 days (or 24 months / 2 years).
IT Service Management, for example running on-premises, can me integrated with Azure Monitor to receive alerts of service health by configuring an ITSM Connector action group.
PaaS solution to provide enterprise-grade data models.
Combine from multiple data-sources into a single tabular data model.
See and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise.
- Synchronized identity (passthrough credentials) allow authentication on Azure AD with on-premises credentials.
- Federated identity allow for authentication by on-premises domain controller.
IdFix is used to perform discovery and remediation of identity objects and their attributes in an on-premises Active Directory environment in preparation for migration to Azure Active Directory.
From compare AD Auth methods:
- Password Hash synchronization + Seamless SSO => Authentication happens in the Cloud
- Pass-through authentication + Seamless SSO => Authentication happens in the cloud AFTER on premises
- Federation with AD FS => On-Premises
Seamless Sign-on is compatible with Pass-through and also Password-hash synchronization.
To give an app delegated permissions, such as managing access reviews or key vault, create an App on Azure AD admin center, and apply API permissions in the app for Graph API.
Used to have access to the VMs, but not to manage them using the portal. What would be PIM.
Only blueprints can restrict Subscription owner permissions, such as deleting resources groups via Blueprint lock.
The Integration Runtime (IR) is the compute infrastructure used by Azure Data Factory and Azure Synapse pipelines to provide the following data integration capabilities across different network environments.
Example: Connect data from within a VM.
With that you should be able to just create a pipeline directly if import files.
When running SQL Server on VMs, prefer the following configuration:
- Logs Disk - No Cache
- Data Disk - Read-Only Cache
When encrypting Managed Disks on VMs:
- Disk Encryption
It will allow for transparent encryption, and with custom keys if needed (via Key Vault).
Other options:
- Client-side Encryption - This will not apply to VM disks
- Storage Service Encryption - This would be for unmanaged disks
- Encryption File Systems (EFS) - This is for Windows only
Enable network acceleration to send network traffic directly to resources.
Reservations is a tool within Azure Portal that allows you to calculate reservation costs of resources.
The highest consistency tier with write SLA guarantee is Bounded Staleness
Strong consistency is the exception and cannot guarantee write SLA.
As in this comparison:
Azure Migrate is the migration tool, and Azure Site Recovery should be used for disaster recovery.
Recovery can only be made to same subscription & geography.
For each On-premises node, a Site Recovery Provider must be installed. (It's not per VM)
Using a node with higher number of CPUs mean you can enable parallel task execution and reduce the number of nodes required.