Azure Kubernetes Service (AKS) with Terraform deployment

AKS components I assumed that you are familiar with the Kubernetes Cluster concepts (elementary level). Therefore I didn’t do any deep dive into the elementary components. The focus of this post is the following topics: The control plane (Kubernetes core component) It’s the core of the Kubernetes Cluster and doesn’t matter on which cloud providerContinue reading “Azure Kubernetes Service (AKS) with Terraform deployment”

Azure Arc enabled Kubernetes

Introduction What does “Arc-enabled Kubernetes” mean? it means a Kubernetes Cluster that the Azure Arc Agent has been installed on. Should an instance of Azure Arc be provisioned? No, Azure Arc is a global service. What about data security? very good question! I’ll explain it below. Because first, you have to know how Azure ArcContinue reading “Azure Arc enabled Kubernetes”

Azure Identity & Access Managemen

Introduction As we know Microsoft Azure Cloud platform works seamlessly with Azure Active Directory (AAD). The following products are three of many cloud-based Microsoft products. As demonstrated below each of them has its own RBAC. But only AAD manages the identities and the Azure Subscription & Azure DevOps and also the other products which canContinue reading “Azure Identity & Access Managemen”

Multi-Cloud

Introduction This document gives us the definition of different cloud classifications and focuses on the Multicloud and Hybrid cloud and the organization’s tendency to adapt to the cloud, especially for multi-cloud. This document even refers to the challenges of multi-cloud at the management and technical level and the reasons for them, and in the lastContinue reading “Multi-Cloud”

Throttling Design Pattern

Knows as Rate Limiting. We place a throttle in front of the target service or process to control control the rate of the invocations or data flow into the target. We can use the cloud services to apply this design pattern. This can be useful if we have an old system and we don’t wantContinue reading “Throttling Design Pattern”

Security

The security in “Bring Your Enterprise on Cloud” topic is a very hug job. But it’s implementation is not impossible. This topic is based on the related links. The conceptual check list for security is as follows Enterprise Infrastructure Security Network security Data encryption Key and secret management Identity & Access Management Duty segregation LeastContinue reading “Security”

Azure Credential Management

Topics Use cases Key/Vault HSM HashiCorp Vault Related topics Onboarding : Azure Data Encryption Onboarding : Azure Data Storages and databases Use cases To manage and safe guard the credentials. What are the credentials? Certificates Keys API Keys Encryption Keys (It’s recommended to use RSA-Keys to encrypt data at rest) Storage Keys Event Hub Access Keys …Continue reading “Azure Credential Management”

Bring Your Enterprise on Cloud

We cannot generalize a migration way to the cloud for all the companies & enterprises. But I have provided a check list of topics which can help to have a good start without wasting the time with staring from scratch. Enterprise Infrastructure On-Prem <-> Cloud Azure VPN Express Route AWS … DNS Azure DNS private,Continue reading “Bring Your Enterprise on Cloud”