RESILIENCE TESTING OF AZURE SERVICES WITH AZURE CHAOS STUDIO
Introduction Azure Chaos Studio Targets and use cases Creating and executing experiments Additional resources This blog post is a contribution to Azure Back to School - an annual community event taking place in September. For the Community by the Community, during the whole month of September, contributors share their knowledge and experience about Azure.
Read moreKUBERNETES PORT FORWARDING: CLEANING UP ORPHANED PORTS
Introduction Is there a way to free up the port in this case? Linux Windows Reserved ports Introduction When working with Kubernetes there may be cases where you may need to use port forwarding to get access to an application running inside the cluster. Some of the use cases may be:
Read moreHOW TO GET ALL AZURE POLICY ASSIGNMENTS OF A SPECIFIC CATEGORY?
I’ve been in quite a pickle recently: I needed to find out how many and what Azure Policy definitions from Guest Configuration category are currently assigned to my subscription, so that I could understand if any of those policies are applicable to Azure Arc-enabled servers that are residing in the same subscription.
Read moreRESOLVING APPLICATION INSIGHTS PERFORMANCE COUNTERS COLLECTION ISSUE FOR .NET APPLICATIONS
If you’re using Application Insights SDK in your .NET applications and you want to gather performance counters like disk, memory or CPU usage, you have two main approaches that you can follow: EventCounters: this is a future-proof, cross-platform alternative to classic performance counters that natively supports collection of system and custom counters both from .
Read moreSCANNING AZURE VMS, AZURE ARC-ENABLED SERVERS AND ACR IMAGES FOR VULNERABILITIES WITH MICROSOFT DEFENDER AND QUALYS
What is Defender for Cloud’s integrated Qualys? Implement scanning of Azure VMs and Azure Arc-enabled servers What about Azure Container Registry (ACR) and AKS? Additional resources In the modern reality with tens of security vulnerabilities that are being disclosed daily you need to continuously implement a variety of security controls in order to ensure that your systems are strongly protected.
Read moreTAKEAWAYS FROM ATTENDING KUBECON+CLOUDNATIVECON EUROPE 2023, WEARING MANY HATS
Trends and session highlights Takeaways and tips from… Attendee Speaker CNCF Ambassador KCD Organizer Summing it up… Last month, 18th-21st of April, KubeCon+CloudNativeCon Europe was happening in Amsterdam in the Netherlands, and it was HUGE! With a fully sold out event, with more than 10000 in-person participants, 5000+ online participants and 20 parallell tracks, it has been the largest conference I’ve attended in-person so far.
Read moreCREATING CUSTOM AZURE POLICY FOR KUBERNETES TO DISALLOW NON-COMPLIANT IMAGE REGISTRIES
There are cases where you may need to explicitly ensure that specific container image registries are blacklisted from being used in your Kubernetes clusters. Let me provide you with a very recent and relevant example. From 3rd April 2023, k8s.gcr.io legacy image registry is officially frozen which means that no images, future Kubernetes versions and patch releases for earlier Kubernetes versions will be pushed to this registry.
Read moreKEEPING AKS CLUSTERS CONTINUOUSLY SECURE WITH AZURE POLICY
AzPolicy 💜 K8s: Introduction and highlights AzPolicy 💜 K8s: Practical walkthrough Azure Policy add-on Microsoft Defender for Containers Enforce Azure Policy definitions Azure Portal Azure CLI Terraform (IaC) Create and enforce custom Azure Policy definitions Azure Policy Remediation Additional resources 🐇This blog post is also a contribution to Azure Spring Clean 2023 where during 5 weekdays of March, 13th-17th, community contributors share learning resources that highlight best practices, lessons learned, and help with some of the more difficult topics of Azure Management.
Read more[🎄.NET ADVENT CALENDAR🎄] STRENGTHENING SECURITY POSTURE OF CONTAINERIZED .NET APPLICATIONS WITH CHISELED UBUNTU CONTAINERS
Introduction Container Security - pitfalls and must do’s Containers and root user Running containers as unprivileged user Rootless Containers Running containers with unprivileged user in Kubernetes Supply chain and third-party dependencies Summary on mitigating common container security pitfalls Chiseled Ubuntu Containers && .NET Example: Porting Cat Encyclopedia app to .
Read more[🎄AZURE ADVENT CALENDAR🎄] EXPLORING UPGRADE STRATEGIES IN AZURE KUBERNETES SERVICE
Why upgrading AKS clusters is important? Cluster and Node OS image upgrade process AKS cluster upgrade flow AKS Auto-upgrade Enabling AKS auto-upgrade in IaC Azure CLI Terraform Bicep Auto-upgrade considerations Additional resources 🎄This blog post is also a contribution to Azure Advent Calendar where during December, experts from the tech community share their knowledge through contributions of a specific technology in the Azure domain.
Read more