Microsoft AZ-900 Exam Notes

Table of Contents

1. Microsoft Azure Fundamentals: Describe cloud concepts

1.1. Describe Cloud Computing

1.1.1. Learning Objectives:

  • Define cloud computing.
  • Describe the shared responsibility model.
  • Define cloud models, including public, private, and hybrid.
  • Identify appropriate use cases for each cloud model.
  • Describe the consumption-based model.
  • Compare cloud pricing models.

1.1.2. What is Cloud Computing?

  • Delivery of computing services over internet
    • VMs, Storage, DBs, Networking
    • Compute Power: allows for flexible amounts of compute, instead of strict 4/8/16gb or specific hardware.
    • Storage: allows for flexible amounts of storage (as well as backups), instead of specific hardware requirements.
  • Why?
    • As business needs change, compute and storage can be as flexible as possible

1.1.3. Shared Responsibility Model

  1. Example Corporate Datacenter:
    • Company responsible for storage, security, maintenance/replacement.
    • IT department responsible for infrastructure and necessary software for upkeep
      • Also responsible for patching and versioning
  2. With Shared Responsiblity:
    • Physical security, power, cooling handled by provider.
    • Data, information, network security handled by consumer.
    1. Cloud DB:
      • Provider maintains DB Hardware
      • Consumer maintains Data and Software Versioning
  3. Cloud Service Types:
    1. Infrastructure as a Service (IaaS)
      • Responsibility leans towards consumer
      • Provider only responsible for physical aspects
        • security of hardware
        • power
        • internet access
    2. Platform as a Service (PaaS)
      • Median responsiblity between IaaS and SaaS
    3. Software as a Service (Saas)
      • Responsibility leans towards provider
      • Consumer only worries about data (mostly) as well as devices and accounts
  4. Responsibilities:
    1. Consumer (Minimum):
      • Information and Data stored in the cloud
      • Devices allowed to connect to cloud (phones, computers)
      • Accounts and Identities of people/services/devices * Cloud Provider (Minimum):
      • Physical datacenter
      • Physical network
      • Physical host machines
    2. Changes based on service model:
      • Operating Systems
      • Network Configuration
      • Applications and Software
      • Identity and Infrastructure

1.1.4. Cloud Models:

  • Deployment Type of Cloud Resources
Public Cloud Private Cloud Hybrid Cloud
No expenditures to scale up Complete Control over resources/stability Most Flexible (both options)
Quick provisioning Complete Control over data Pick between both options
Pay as you go Own your own hardware Both
Don’t have full access Responsible for maintenance and upgrades Security/Compliance/Legal managed manually
  1. Private:
    • Cloud used by single entity
    • Can be hosted onsite in your own datacenter
    • Subject to your own corporate network access
  2. Public:
    • Entirely third-party provider cloud
    • General Availability
  3. Hybrid:
    • Private cloud that can request public cloud resources when necessary
    • Specific services can be kept private, while others can be scaled publicly when necessary.
  4. Multi-Cloud:
    • Multiple public cloud providers
    • Manage resources and security in two public environments
  5. Azure Arc:
    • Technologies to manage cloud environments, usable on public/private/hybrid/multi
  6. Azure VMWare Solution:
    • Run VMWare workloads on Azure machines with seamless integration and scalability

1.1.5. Consumption-based Model

  • Two types of expense:
    • Capital Expense (CapEx)
      • 1-time, up-front payment for tangible resources
    • Operational Expenditures (OpEx)
      • Leases, Subscriptions, etc.
  1. Cloud Computing Model:
    • OpEx, you only pay for IT resources you use.
    • No upfront cost
    • No need to purchase infrastructure (“Future-proofing”)
    • Pay more for more resources when necessary
    • Pay less for less resources when necessary

1.2. Describe benefits of using cloud services

1.2.1. Benefits of High Availability and Scalability in the Cloud

  1. High Availability

    Focus on ensuring maximum availability, regardless of disruptions or other events that may occur.

  2. Scalability
    • Ability to adjust resources to meet demand
    • Pay-As-You-Go model synergizes with scalability, when demand increases can also increase computing power
    1. Vertical Scaling
      • Add more CPUs or RAM to a machine, or remove them
    2. Horizontal Scaling
      • Automatic or Manual scaling (autodeployments)
      • Add additional VMs or containers

1.2.2. Benefits of Reliability and Predictability in the Cloud

  1. Reliability
    • Ability of a system to recover from failures and continue to function.
    • Cloud naturally supports reliable and resilient infra
    • Even when one region goes down, there are many other regions around the world that can serve business needs.
  2. Predictability
    1. Performance Predictablity
      • Predicting resources needed to account for demand.
      • i.e Autoscaling, Load Balancing, High Availability
    2. Cost Predictability
      • Predicting/Forecasting cloud spending
      • Track resource use in real-time, monitor efficiency of resources, use data analytics to plan future resource deployments.
      • Tools for estimating cloud spend:
        • Total Cost of Ownership (TCO)
        • Pricing Calculator

1.2.3. Benefits of Security and Governance in the Cloud

  • Support for governance and compliance for businesses and enterprise
  • “Cloud Based Auditing”
  • Set templates ensure corporate and government regulatory standards are met
    • Allow for updating older resources to comply with new requirements
    • Software patches and updates can also be automatically applied
  • IaaS allows self-management of software and OS
  • PaaS and SaaS can take care of OS, Software and maintenance.
  • Cloud can mitigate DDoS attacks on your services.

1.2.4. Benefits of manageability in the Cloud

  1. Management of the Cloud
    • Automatically scale resource deployments
    • Deploy resources based on prebuilt templates
    • Monitor health of resources
    • Automatically replace failing resources
    • Trigger automatic alerts based on metrics
  2. Management in the Cloud
    • Web Portal
    • Command-Line-Interface (CLI)
    • APIs
    • PowerShell

1.3. Describe Cloud Service Types

1.3.1. Describe Infrastructure as a Service (IaaS)

  • Most flexible category of cloud services
  • Most control of resources
  • Cloud provider maintains hardware, network and physical security.
    • Consumer responsible for:
      • OS
      • Configuration (Network, DB, Storage)
      • Maintenance
  • “Renting hardware in a datacenter”
  1. Common Scenarios
    1. Lift-And-Shift Migration:
      • Setting up cloud resources similar to on-prem
      • Migrate services across from on-prem to cloud
    2. Testing and Development:
      • Replicate dev and test environment configurations

1.3.2. Describe Platform as a Service (PaaS)

  • Middle ground between IaaS and SaaS
  • Cloud provider maintains:
    • Physical security
    • Physical infrastructure
    • Network Connection
    • OS
    • Middleware
    • Dev Tools
    • Business Intelligence Services
    • Licensing and Patching
  • Ideal for “dev environment without maintenance”
  1. Common Scenarios
    1. Development Framework:
      • PaaS provides a framework devs can build on to develop/customize cloud-based applications
      • Features like scalability, reliability, availability, multi-tenancy are available
    2. Analytics/Business Intelligence:
      • Tools provided with PaaS allow businesses to analyze and mine their own data, allowing insights and discovery of new patterns to improve forecasting, design decisions, investment returns, etc..

1.3.3. Describe Software as a Service (SaaS)

  • Complete cloud service model
  • Fully built software (Email, Financial Software, Messaging, Connectivity Software)
  • Least flexible, but easiest to get running and deployed, least amount of technical knowledge/expertise necessary
  1. Common Scenarios:
    1. Email / Messaging
    2. Business Productivity
    3. Finance / Expense tracking

2. Microsoft Azure Fundamentals: Describe Azure Architecture and Services

  • Describe Azure regions, region pairs, and sovereign regions.
  • Describe Availability Zones.
  • Describe Azure datacenters.
  • Describe Azure resources and Resource Groups.
  • Describe subscriptions.
  • Describe management groups.
  • Describe the hierarchy of resource groups, subscriptions, and management groups.

2.1. What is Microsoft Azure

  • continually expanding set of cloud services

2.1.1. What does Azure Offer?

  • Trusted platform
  • AI/Cloud Services
  • Secure

2.1.2. What Can I do with Azure?

  • Run existing applications on VMs
  • AI/ML Services
  • Storage Solutions

2.2. Get Started with Azure Accounts

  • Azure subscription required
    • Once account is made, can split different use cases into different subscriptions for billing purposes:
      • Separate subscriptions for dev, sales, marketing
    • Each subscription holds resource groups

2.2.1. What is the Azure Free Account?

  • Free access to certain services (12 months)
  • Credit for first 12 months
  • Free access to certain dev tools
  1. Azure Free Student Account:
    • Extra $100 credit without credit card

2.2.2. What is the Microsoft Learn Sandbox?

  • Temporary sub for learning

2.3. Describe Azure Physical Infrastructure:

2.3.1. Physical Infrastructure:

  • Datacenters (dedicated cooling/power/infrastructure)
  • Grouped into AZ (availability zones) or regions

2.3.2. Regions:

  • Geographical area with at least one (but may be many) datacenters nearby and networked together.

2.3.3. Availability Zones:

  • Physically separate datacenters within a region.
  • 1+ datacenters with independent power, cooling, networking
  • To ensure resiliency, a minimum of three separate availability zones are present in all availability zone-enabled regions.
    • However, not all Azure Regions currently support availability zones.
  1. Use Availability Zones in your apps
    • co-locate computer, storage, networking and data.
    • primary use is for VM, managed disk, load balancer, and SQL DB
    1. Zonal Services
      • Pin Resource to specific Zone
    2. Zone-Redundant Services
      • Replicates automatically to multiple zones
    3. Non-regional services
      • Always available and resilient to region outages

2.4. Describe Azure management infrastructure

2.4.1. Resources / Resource Groups

  • Resource is basic building block of Azure.
    • Anything created, provisioned, deployed is a resource
    • Resource Groups are groupings of resources.
      • Created resources are required to be placed in a resource group.
      • Can contain many resource in one resource group, but resources can only belong to one group
      • Resource Groups cannot be nested within one another.
      • Actions apply across all resources within a group, including deletion and access control.
  1. Example: Setting up dev environment
    • Grouping all resources together means they can all be removed when not necessary anymore by just deleting a resource group.
    • If we needed 3 different roles to access different resources, then we might create 3 resource groups and then assign access through those.

2.4.2. Subscriptions:

  • Unit of management, billing and scale.
  • Allow for logical organization of billing resources.
  • All Azure accounts are initialized with a subscription, which provides authenticated and authorized access to Azure products/services.
    • Subscriptions allow provisioning of resources/groups
    • Subscriptions link to Azure accounts, which is an entry in Entra ID (Active Directory) or in a directory that Entra ID trusts.
  1. Accounts:
    • Accounts can have multiple subscriptions, but always has one to start with.
    • Multi-subscriptions allow different billing models and access-management policies.
  2. Subscription Boundaries:
    • Billing Boundary:
      • how an account is billed for using Azure different
      • subscription has a separate report and invoice
    • Access Control Boundary:
      • Access-management policies applied at subscription level
      • Separate subscriptions can be created to reflect how your organization is structured.
      • Manage and control access to resources that users provision with specific subscriptions.
  3. Create Additional Azure Subscriptions:
    • Reasons:
      • Environments (dev/test, security, compliance)
      • Organlizational Structures (lower-cost resources per team, IT has full access)
      • Billing (production vs dev vs test workload pricing)

2.4.3. Azure Management Groups:

  • Resource -> Resource Groups
  • Resource Groups -> Subscriptions
  • Subscriptions -> Management Groups
  • 10,000 management groups are supported per directory
  • Management group trees support 6 levels of depth (not including root or subscription)
  • Each management group + subscription can only support one parent

2.4.4. Overall Hierarchy:

_20241002_105429screenshot.png

2.5. Describe Azure Compute and Networking Services

2.5.1. Describe Azure Virtual Machines:

  • VMs are part of IaaS as a virtualized server
  • Ideal when you need:
    • Total Control over OS
    • Ability to run Custom Software
    • Custom Hosting Configurations
  • Flexible for virtualization without maintaining physical hardware.
  • Custom preset images are usable for rapid provisioning and deployment.
  1. Scale VMs in Azure
    • Single VMs for testing / dev / minor tasks
    • Groupings can be managed using Scale Sets and Availability Sets.
    1. Scale Sets
      • Group of Identical, Load-Balanced VMs
      • Central Management, Configuration and Updates
      • Instances can increase/decrease based on demand, or on a scheduled basis.
      • Automatically deploys a load balancer to ensure efficient use.
      • Useful for compute, big data, container workloads.
    2. Availability Sets
      • Designed to ensure maximum availability, including staggered updates and varied power/network connectivity
      1. Update Domain:
        • Group VMs that can be rebooted simultaneously.
        • Apply updates on rotation, with 30-minute recovery time before maintenance on next set begins.
      2. Fault Domain:
        • Group by Power Source / Network Switch
        • By Default across 3 domains, which protects against physical power or network failure.
  2. When to Use VMs
    • Testing/Deployment (easy provisioning and deletion)
    • General Running Applications (no need for hardware)
    • Extending datacenter to cloud (SharePoint and other local MS services can run on Azure)
    • Disaster Recovery (Create VMs to backup primary data center)
    1. Move to Cloud
      • Lift and Shift (discussed previously)
      • Image of physical server can be hosted on VM with little to no changes
  3. VM Resources
    • Size (processor cores / RAM)
    • Storage Disks (HDD, SSD, etc.)
    • Networking (Virtual Network, Public IP, Port Configuration)

2.5.2. Describe Azure Virtual Desktop:

  • Cloud-Hosted Windows from any location.
  • Centralized Security Management via Entra ID or RBAC (Role-Based Access Control)
  • Data/Apps separate from hardware, no risk of confidential data left on personal devices.
  • Isolation between single and multi-session environments
  1. Multi-Session Windows 10 / 11 deployment:
    • Concurrent Users on a single VM
    • Broader Application support vs. Windows Server

2.5.3. Describe Azure Containers:

  • Virtualization Environment
  • Multiple Containers per physical/virtual host
  • No management of OS
  • Light weight / more agile method compared to VMs
  • Quick restart if crash or hardware issue.
  • Azure supports Docker
  1. Azure Container Instances:
    • Fastest/Simplest way to run container
    • PaaS, upload container
  2. Azure Container Apps:
    • PaaS, but includes load balancing and scaling
  3. Use Containers in Your Solutions:
    • Often used with microservice architecture
    • Containers allow scaling back-end separately to improve performance, without impacting front-end and storage.

2.5.4. Describe Azure Functions:

  • event-driven, serverless copmute
  1. Benefits of Azure Functions
    • Ideal when no concern for platform/infra
    • Response to Event (REST / http common), timer, or message
    • used for small workloads
    • scale automatically based on demand, with no dedicated hardware
    • charged only for CPU time used while your function runs, and no other cost.
    • When functions are Stateless, they behave as if they restart every time an event is triggered
    • Stateful Functions (aka Durable Functions) have a context passed through to track prior triggers.

2.5.5. Describe Application Hosting Options

  1. Azure App Service:
    • App Service enables build/host of web apps, background jobs, mobile back-ends, and RESTful APIs
      • With NO infra cost
    • Features automatic scaling and high availability, with Windows and Linux.
    • Links Azure DevOps, GitHub, and other git repos for continuous deployment.
    • HTTP-based
    • other Features:
      • Integrated Deployment/Management
      • Secure Endpoints
      • Quick Scaling
      • Built-In Load-Balancing and Traffic Management
    1. Web Apps:
      • ASP.net / Core
      • Java
      • Ruby
      • Node.js
      • PHP
      • Pyton
    2. API Apps:
      • Swagger Support
      • Package/Publish API in Azure Marketplace
      • Consumed via HTTP/HTTPS
    3. WebJobs:
      • Run Program/Script in same context as Web App, API, Mobile
      • Schedule or Triggered
      • Common for background tasks
    4. Mobile Apps:
      • Quick back-end
      • Database
      • Authentication with MSA, Google, X, Facebook
      • Push Notifications
      • Custom Logic in C# / Node.js
      • SDK support for native iOS and Android, Xamarin, and React Native.

2.5.6. Describe Azure Virtual Networking

  • networks and subnets enable azure services to communicate with each other
  • Key networking capabilities:
    • Isolation and segmentation
    • Internet communication
    • Communication between Azure resources
    • Communication with on-premises resources
    • Routing network traffic
    • Filtering network traffic
    • Connecting virtual networks
  1. Isolation and Segmentation:
    • Create multiple isolated virtual networks
      • Each has private IP address space (defined by public/private IP ranges)
      • IP range only exists within the virtual network
      • Able to be further divided into subnets
    • Azure DNS available, or use internal/external DNS server
  2. Internet Communications:
    • Enable communications via public IP or load balancer
  3. Communicate between Azure Resources:
    • Virtual networks can connect many different kinds of Azure Resources:
      • App Service Environment (Power Apps)
      • Azure Kubernetes Service
      • VM Scale Sets
    • Service Endpoints can connect to other resource types:
      • Azure SQL DB
      • Azure Storage Accounts
    • Useful for security purposes
  4. Communicate with On-Premises Resources:
    • Point-to-site VPN connections:
      • From computer outside network into your corporate network
      • Client -> Azure Virtual Network
    • Site-To-Site VPN:
      • On-Premises gateway to Azure VPN gateway
      • Encrypted over internet
    • Azure ExpressRoute:
      • Dedicated private connection to Azure without internet
      • Max bandwidth and security
  5. Route Network Traffic:
    • Azure routes between subnets and VPNs
    • Route Tables define rules on how packets should be routed
    • Border Gateway Protocol
  6. Filter Network Traffic:
    • Network Security Groups are resources that contain inbound/outbound security rules
      • Can allow/deny traffic based on source/destination address, port and protocol.
    • Network Virtual Appliances are specialized VMs
      • Run Firewalls or Wide Area Network (WAN) optimization
  7. Connect Virtual Networks:
    • Virtual Network Peering: 2 Virtual Networks connect directly to each other
      • Travels on Microsoft network, not public internet
      • Resources in each Virtual Network to communicate with each other
        • Even if in separate region
      • Creates a global interconnected network through Azure.
    • User-defined Routes allow control of routing tables between subnets within a Virtual Network (or peered Network)

2.5.7. Describe Azure Virtual Private Networks (VPN):

  • A VPN uses an encrypted tunnel within another network.
  • Typically deployed to connect trusted private networks over an untrusted network (internet)
  • Traffic is encrypted to prevent eavesdropping or MITM attacks
  1. VPN Gateways:
    • Connect on-prem to Virtual Networks through site-to-site connections
    • Connect individual devices to Virtual Networks through point-to-site connections.
    • Connect Virtual Networks to other Virtual Networks through network-to-network connections.
    1. Policy-Based Gateway:
      • Specify Static IP address of packets to be encrypted
      • Evaluates each data packet against IP address sets
    2. Route-Based Gateway:
      • IP Routing (static/dynamic) decides which inet interface to use when sending a packet.
      • More resilient than Policy-based.
    3. Use-Cases:
      • Connections between Virtual Networks
      • Point-to-Site connections.
      • Multisite connections.
      • Use of Azure ExpressRoute gateway.
  2. High-Availability Scenarios:
    • VPN should be highly available and fault tolerant
    1. Active/Standby (Default):
      • 2 instances (even if you only see one)
      • When maintenace affects service, the other swaps in within a few seconds
      • When disruptions occur, up to 90 second failover time.
    2. Active/Active:
      • BGP Routing allows 2 unique instances up at all time with no failover time
    3. ExpressRoute Failover:
      • ExpressRoute circuits are resilient, but not against physical issues
      • VPN Gateway for alternate connection to Virtual Networks.
    4. Zone-Redundant Gateways:
      • Works across AZs and require different gateway SKUs and Standard public IP Addresses

2.5.8. Describe Azure ExpressRoute:

  • Extend on-prem into Microsoft cloud using an ExpressRoute Circuit
    • Any-To-Any (IP VPN)
    • Point-To-Point (Ethernet)
    • Virtual Cross-Connection (External Facility)
  • Connections go to Microsoft cloud, not public internet.
    • More Reliable
    • Faster Speed
    • Better Latency
    • Higher Security
  1. Features / Benefits:
    1. Connectivity to Microsoft Cloud Services:
      • Office 365
      • Dynamics 365
      • Azure Compute
      • Azure Cloud
    2. Global Connectivity:
      • Exchange Data across on-prem sites on different continents using ExpressRoute circuits instead of public internet.
    3. Dynamic Routing:
      • BGP protocol
    4. Built-In Redundancy:
      • ExpressRoute Circuits have redundancy options for your corporate network.
  2. Connectivity Models:
    1. CloudExchange Colocation:
      • Facilities colocated at a cloud exchange (i.e at an ISP)
      • Can request a virtual cross-connect to Microsoft Cloud
    2. Point-to-Point Ethernet:
      • Self-Explanatory
    3. Any-To-Any Networks:
      • Provide connections to offices and datacentres
      • Works like the connection between your datacentre and branch offices.
    4. Direct from ExpressRoute sites:
      • Connect direct in a specific location
      • Dual 100 Gbps or 10-Gbps
  3. Security Considerations:
    • No public internet use
    • Private connection from you to Microsoft Cloud
    • DNS Queries, Certificate checking, Azure CDN are on public internet.

2.5.9. Describe Azure DNS:

  • Hosting for DNS domains using Azure infrastructure.
  • Manage DNS records and domains using the same tools as your other services.
  • Cannot use Azure DNS to buy a domain, but can use App Service or a third-party.
  1. Benefits:
    1. Reliability and Performance:
      • Global Network
      • AnyCast Networking (closest server answers query)
      • Fast performance
      • High Availability
    2. Security:
      • Azure RBAC
      • Activity Logs
      • Resource Locking
    3. Ease of Use:
      • DNS for Azure and external services
      • Part of Azure portal
      • Available with Azure CLI
      • Configurable with REST API and SDKs
    4. Customizable Virtual Networks with Private Domains:
      • Private Custom DNS names instead of Azure names
    5. Alias Records:
      • Azure DNS supports Alias Record Sets
        • Refer to an Azure Resource (Public IP, Traffic Manager Profile, CDN Endpoint)
        • Alias record auto updates for dynamic IP Addresses

2.6. Describe Azure Storage Services

2.6.1. Describe Azure storage accounts:

  • Unique Namespace for Data over HTTP/S
  • Storage Options:
    • Locally Redundant Storage (LRS)
    • Geo Redundant Storage (GRS)
    • Read-Access Geo Redundant Storage (RA-GRS)
    • Zone Redundant Storage (ZRS)
    • Geo Zone Redundant Storage (GZRS)
    • Read-Access Geo Zone Redundant Storage (RA-GZRS)
Type Supported Services Redundancy Usage
Standard general-purpose v2 Blob Storage, Data Lake, Queue, Table, Azure Files All Options Standard Storage Type for most scenarios
Premium Block Blobs Blob Storage, Data Lake LRS, ZRS Premium for block/append blobs for high transaction rates or smaller objects or low-latency
Premium File Shares Azure Files LRS, ZRS File Shares Only, Enterprise-scale. Supports Server Message Block (SMB) and NFS
Premium Page Blobs Page Blobs Only LRS Premium for page blobs only
  1. Storage Account Endpoints:

2.6.2. Describe Azure Storage Redundancy:

  1. Redundancy in Primary Region:
    • Always replicated 3x
    • Replication Option is either LRS or ZRS
  2. Locally Redundant Storage (LRS):
    • Replicates within a single data center in primary region
    • 11 9s of durability 99.999999999%
    • Lowest cost Redundancy
    • Protects against hardware failures
    • Does not protect against data center destruction or damage
  3. Zone-Redundant Storage (ZRS):
    • ZRS replicates across 3 AZs in the primary region
    • 12 9s of durability
    • Works even when a zone is unavailable
    • No remounting of files from clients
    • Azure will repoint DNS to proper data centre
    • Ideal for High Availability or restricting replication in a certain region
  4. Redundancy in a Secondary Region:
    • Paired Secondary Region is generated by Azure Region Pairs, and cannot be changed.
    • Data in secondary region is not available for read/write unless failover or primary region is unavailable
    • Data is replicated to secondary region asynchronously, which means data can still be lost if something happens in that time
      • Usually less than 15 minute Recovery Point Objective (RPO), but not defined in the Service Level Agreement (SLA)
  5. Geo-Redundant Storage (GRS):
    • Uses LRS in primary region, then LRS in secondary region
    • 16 9s of durability
  6. Geo-Zone-Redundant Storage (GZRS):
    • ZRS in primary region with LRS for secondary region
    • 16 9s of durability
    • Recommended for maximum consistency, durabiilty, availability, performance, and resilience.
  7. Read Access to Data (GRS/GZRS):
    • You can enable read access to secondary storage using RA-GRS and RA-GZRS
    • Else it is unavailable until Failover occurs

2.6.3. Describe Azure Storage Services:

  • Azure Blobs
    • Massively scalable object store for text and binary
    • Supports Big Data Analytics via Data Lake
  • Azure Files
    • Managed File Shares for cloud/on-prem
  • Azure Queues
    • Messaging store for application components
  • Azure Disks
    • Block-level storage volumes for VMs
  • Azure Tables
    • NoSQL option
  1. Benefits:
    • Durable and Highly Available
    • Secure
    • Scalable
    • Managed
    • Accessible
  2. Azure Blobs:
    • Unstructured
    • Scalable with thousands of simultaneous uploads
    • Not limited to common formats
    • No disk management necessary
    1. Use Case:
      • Serving Images/Documents to browser
      • Storing Files
      • Streaming video/audio
      • Storing data for backup
      • Storing data for analysis
    2. Access:
      • HTTP/S Direct URL
      • Azure Storage REST API
      • Azure PWSH
      • Azure CLI
      • Azure Storage SDK
    3. Storage Tiers:
      • Hot/cool/cold set at account level, or blob level
      • Archive stores offline, cool/cold are still online but lower availability
      • Hot access: frequent access
      • Cool access: Infrequently access and stored for ~30 days
      • Cold access: Infrequently access and stored for ~90 days
      • Archive access: Rarely accessed and stored for ~180 days
  3. Azure Files:
    • Fully Managed file share via Server Message Block (SMB) or Network File System (NFS)
    • can be mounted concurrently by cloud or on-prem
    • SMB Accessible from windows/linux/macos
      • Cachable on windows servers with Azure File Sync
    • NFS accessible from linux/macos
    1. Benefits:
      • shared access
      • managed
      • pwsh cli scripting tooling for azure applications
      • resilient
      • familiar access via system apis
      • sdk options
  4. Azure Queues:
    • Store and Retrieve Messages via http/s
    • Messages up to 64kb in size
    • Can be combined with Azure Functions to trigger actions on message receieved.
  5. Azure Disks:
    • Block level volumes meant for Azure VMs
    • Managed, user only provisions with a VM
  6. Azure Tables:
    • Large amounts of structured data
    • NoSQL datastore with authentication in/outside of Azure
    • ideal for structured, non-relational data.

2.6.4. Identify Azure Data Migration Options

  1. Azure Migrate:
    • Unified Migration Platform (single portal)
    • Integration with other tools
    • Easily Access and Migrate
  2. Integrated Tools:
    • “Discovery and Assessment”
      • Assess VMWare, Hyper-V, and physical servers
    • “Server Migration”
      • Migrate VMWare, Hyper-V, physical servers, virtualized servers, and public cloud VMs
    • “Data Migration Assistant”
      • Assess SQL Servers
        • Unsupported features
        • New Features
        • Migration Issue Identification
    • “App Service Migration Assistant”
      • .NET and PHP web app migration
    • “Data Box”
      • migration of offline data to azure
  3. Azure Data Box:
    • Secure Data transfer over a proprietary “Data Box” storge device
      • Maximum capacity of 80 TB
      • Transported to and from your datacenter via mail
      • Physical migration Service
    • NIST 800-88r1 standards
    • Disks are erased once Azure datacenter receives package.
  4. Use Cases:
    • Data Box is meant for 40TB or larger scenarios with no -> limited network connectivity.
    • One-time migration
    • Media library migration (offline tapes -> online media)
    • Migrating VM farm, SQL Server, and other applications
    • Moving historical data for analysis and reporting with HDInsight
    • Initial bulk transfer -> Incremental transfers
    • Periodic uploads

2.6.5. Identify Azure File Movement Options:

  • Individual Files / Small File Groups
  1. AzCopy
    • CLI for copying blobs/files to/from storage accounts
    • upload/download/copy/sync
    • Works with other cloud providers
    • Only works in 1-direction
  2. Azure Storage Explorer
    • GUI for managing files and blobs
    • Windows/MacOS/Linux
    • Uses AzCopy under the hood
  3. Azure File Sync
    • Centralize file shares and compatible with Windows File Server
    • Similar to CDN
    • Bi-Directional Sync
    • Works with SMB, NFS, FTPS
    • Have as many caches as necessary
    • Replace failed server with an Azure File Sync
    • Use Cloud Tiering technology for replication

2.7. Describe Azure Identity, Access and Security

2.7.1. Describe Azure Directory Services

  • Similar to Active Directory, hosted by Microsoft.
  • AD but with high availability because Microsoft hosts it
  1. Who Uses Entra ID?
    • IT Administrators (RBAC)
    • App Developers (SSO)
    • Users
    • Online Service Subscribers (O365)
  2. What Does Entra ID do?
    • Authentication
      • Self-Service Password Management
      • MultiFactor Authentication (MFA)
      • Custom Banned Passwords
      • Smart Lockout Services
    • Single-Sign-On (SSO)
    • Application Management
    • Device Management
      • Register personal devices
      • Device-based conditional access
  3. Can I Connect On-Prem AD with Entra ID?
    • Microsoft Entra Connect synchronizes identities between AD and Entra ID
    • SSO, MFA available under both AD and Entra ID
  4. What is Entra Domain Services?
    • Provides services for domains:
      • Lightweight Directory Access Protocol (LDAP)
      • Kerberos and NTLM Authentication
    • Don’t need to host your own Domain Controllers (DCs)
    • Can run legacy applications that can’t use modern authentication methods
      • Or for cases where hitting the on-prem AD server are unnecessary
  5. How does Entra Domain Services Work?
    • Define unique namespace for your domain name
    • 2 Windows Server DCs are deployed in your region as a replica set
    • Azure manages the DCs, including encryption and backups
  6. Is Information Synchronized?
    • One-Way sync from Entra ID to Entra Domain Services
    • In hybrid on-prem, Entra Connect syncs with Entra ID which syncs to managed domain

      _20241002_170128screenshot.png

    • Applications, Services and VMs in the managed domain can use Entra Domain Services mentioned above.

2.7.2. Describe Azure Authentication Methods

  • Authentication:
    • The process of establishing the identity of a person/service/device.
    • Requires person/service/device to provide credentials to verify their identity.
  • Azure supports multiple authentication methods
    • Standard passwords
    • Single-Sign-On (SSO)
    • Multifactor Authentication (MFA)
    • Passwordless

_20241002_170645screenshot.png

  1. What is Single Sign-On (SSO)?
    • SSO enables users to sign in one-time and use the same credential to access multiple resources and applications from various providers.
    • Initial authenticator must be trusted by providers of applications.
    • Only one ID and password is required for access across applications
    • As users change roles and leave organizations, access is linked to the single identity.
    • SSO is only as secure as the initial authenticator (subsequent connections are based on the security of the initial authenticator)
  2. What is Multifactor Authentication (MFA)?
    • Process of prompting for an extra form/factor of identification during the sign-in process
    • MFA helps to protect against password compromise
    1. Categories of MFA elements:
      • Something the User Knows -> challenge question
      • Something the User has -> 2FA code
      • Something the User is -> biometric auth (fingerprint / face ID)
  3. What is Microsoft Entra Multifactor Authentication?
    • Allows additional form of auth during sign-in, such as phone call or app notification
  4. What is Passwordless Auth?
    • Passwordless auth has to be set up on a device, and then you can be authenticated without using a password
    • Microsoft global Azure and Azure Government offer 3 options:
      • Windows Hello for Business
      • Microsoft Authenticator App
      • FIDO2 Security Keys
    1. Windows Hello for Business
      • Ideal for workers with designated Windows PC
      • Biometric/PIN credentials
    2. Microsoft Authenticator
      • Authenticator can be used both as MFA and as just Passwordless
      • Any iOS or Android phone can be used to sign up and sign in
    3. FIDO2 Security Keys
      • Fast IDentity Online (FIDO) Alliance helps to promote open authentication standards and reduce password use.
      • FIDO2 is the latest standard that incorporates the WebAuthn standard.
      • Unphishable standards-based passwordless authenitcation, and is an open standard.
      • Security Keys are often USB devices, but can also be Bluetooth or NFC.
      • Hardware Device reduces security risks as there’s no password to guess

2.7.3. Describe Azure External Identities

  • External Identity:
    • A person/device/service outside your organization
  • Entra External ID refers to ways you can securely interact with users outside of your organization
  • Users can bring their own identities
    • Corporate/Government-issued
    • Social Identity (Google/Facebook)

_20241002_173604screenshot.png

  • Business to Business (B2B) Collaboration
    • Use preferred identity to sign in to your applications
    • Represented in your directory as guest users
  • B2B Direct Connect
    • Establish a mutual trust between Entra organizations for collaboration
    • Supports Teams shared channels, but aren’t represented in your directory
  • Active Directory Business to Consumer (B2C)
    • Publish modern SaaS or custom apps (not Microsoft) to consumers/customers
    • Use AD B2C to manage identity and access

2.7.4. Describe Azure Conditional Access

  • Conditional access is a tool that Entra ID uses to allow/deny access to resources based on identity signals.
  • IT Administrators can:
    • Empower users to be productive
    • Protect organizational assets
  • Conditional Access allows for granular MFA experience based on known location or other signals.

    _20241002_174136screenshot.png

  1. When Can I Use Conditional Access?
    • Require MFA for application
    • Require access to services only through approved clients
    • Require managed devices in order to access applications
    • Block access from untrusted sources

2.7.5. Describe Azure Role-Based Access Control (RBAC)

  • Hierarchical access
    • Parent access is inherited by children
      • Management Group can manage everything under it
  • Scopes:
    • Management Group
    • Single Subscription
    • Resource Group
    • Single Resource

_20241002_174335screenshot.png

  1. How is Azure RBAC Enforced?
    • Any action initiated against an Azure resource through Azure Resource Manager.
      • Resource Manager is a management service that provides a way to organize and secure your cloud resources
      • Access through Portal, Cloud Shell, PowerShell, CLI
      • Not enforced at application/data level, this should be handled by your application.
    • Allow-model based
      • i.e if one role gives read access and other role gives write access, you have both read & write access

2.7.6. Describe Zero Trust Model

  • Security model that assumes worst case scenario (to protect resources)
    • Assumes breach at outset, and verifies requests as if they were untrusted.
  • Guidelines:
    • Verify Explicitly
      • Always authenticate and authorize based on all available data points
    • Least Privilege Access
      • Limit user access with Just-In-Time (JIT) and Just-Enough-Access (JEA)
      • Use risk-based adaptive policies and data protection policies.
    • Assume Breach
      • Minimize blast radius
      • Segment access to resources
      • Verify End-To-End Encryption
      • Use Analytics for Visibility, Threat Detection, Defense.
  1. Adjusting to Zero Trust
    • Different from Traditional Corporate model
      • Corporate networks restricted, protected, generally assume safe.
      • Only managed computers could join, with tight VPN access
      • Personal devices frequently restricted or blocked
    • Zero-Trust grants access based on authentication, not location.

      _20241004_114655screenshot.png

2.7.7. Describe defense-in-depth

  • Objective: to protect information and prevent unauthorized access
  • Layers (in order):
    1. Physical Security
    2. Identity & Access
    3. Perimeter
    4. Network
    5. Compute
    6. Application
    7. Data
  1. Physical Security
    • Securing access to buildings and computer hardware within data centre
    • Intent is to provide physical safeguards against access
    • Without physical access, other layers cannot be bypassed
    • Lost/Theft handled appropriately
  2. Identity & Access
    • Ensure that identities are secure, necessary, and logged
    • Control access to infra and change control
    • Use SSO and MFA
    • Audit events and changes
  3. Perimeter
    • Protect from network-based attacks
    • Use DDoS protection to filter large-scale attacks before users are affected
    • Use firewalls to identify and alert malicious attacks against your network
  4. Network
    • Limit communication between resources
    • Deny by default
    • Restrict inbound access and limit outbound access
    • Implement secure connectivity to on-prem networks
  5. Compute
    • Secure access to VMs
    • Implement endpoint protection on devices
    • Keep systems patched and current
  6. Application
    • Ensure applications are secure and free of vulnerability
    • Store sensitive application secrets in a secure storage medium
    • Make security a design requirement in application development
  7. Data
    • Attackers are after data that is:
      • Stored in a DB
      • Store on disk in a VM
      • Stored in SaaS applications (O365)
      • Managed through cloud storage

2.7.8. Described Microsoft Defender for Cloud

  • Monitoring tool for security posture management and threat protection
  • monitors cloud, on-prem, hybrid, multicloud environments
  • Tools needed to harden resources, protect against cyber attacks, streamline security management
  • Natively integrated into Azure
  1. Protection everywhere you’re deployed
    • Many Azure services monitored without any deployment
    • In hybrid or multicloud, Azure services are not the complete picture
      • Log Analytics agent for this purpose through Azure Arc
      • Cloud Security Posture Management (CPSM)
  2. Azure-Native Protections
    • Azure PaaS Services:
      • Azure App Service
      • Azure SQL
      • Azure Storage Account
      • etc.
    • Azure Data Services
    • Networks
      • Harden VMs
  3. Defend your Hybrid Resources
    • Add Defender for Cloud using Azure Arc
      • Add Defender for Cloud using Azure Arc
  4. Defend Resources Running on Other Clouds
    • With AWS, you can enable:
      • CSPM for AWS CIS, PCI DSS, Foundation Security Best Practices
      • Defender for Containers for Amazon EKS Linux
      • Defender for Servers for Windows and Linux EC2 Instances
  5. Assess, Secure, Defend
    1. Continuously Assess
      • Defender for Cloud (VM, Container Registry, SQL Server)
      • Defender for Endpoint
    2. Secure
      • Defender for Cloud built on top of Azure Policy controls
        • Run on management groups, subscriptions, tenants
      • Configures, flags, and recommends
      • Supported by Azure Security Benchmark
      • Secure score gives you at-a-glance indicator of health of Security Posture
    3. Defend
    4. Security Alerts
      • Describe details of affected resources
      • Suggest remediation steps
      • Provide (in some cases) an option to trigger a response
      • All exportable
      • Fusion kill-chain Analysis based on cyber kill-chain analysis
      • Understand story of attack, where it started, what impact it had

3. Microsoft Azure Fundamentals: Describe Azure Management and Governance

3.1. Describe Cost Management in Azure

3.1.1. Describe Factors that can affect costs in Azure:

  • OpEx impacted by:
    • Resource Type
    • Consumption
    • Geography
    • Subscription Type
    • Azure Marketplace
  1. Resource Type:
    • Type of resource
    • Settings of resource
    • Region
    • Meters track resource usage and generate records
    1. Examples:
      1. Storage Account:
        • Specify type, performance tier, access tier, redundancies, region
        • Different regions have different costs, different attributes affect price
      2. Virtual Machine:
        • OS licensing
        • Software licensing
        • Processor and Cores
        • Attached Storage
        • Network Interface
  2. Consumption:
    • Can do Pay-As-You-Go or Reserved Resources
    • Reserved Resources provide a discount of up to 72%, but you prepay (1 to 3 years)
    • Can still Pay As You go backup, but you have at least X amount of resources
    • If you know you have a consistent workload, prepay
    • When workload spikes, add with PAYG
  3. Maintenance:
    • Additional resources (i.e Storage/Network) may not deprovision at same time as the main resource (i.e VM)
    • Keep an eye on resources to reduce costs
  4. Geography:
    • Global deployment -> global pricing differences
    • Resources can differ in cost to deploy on a region basis
      • Power, Labor, Taxes, Fees in different regions change
    • Network Traffic depends on geography
      • Within Europe or US is easier than across continents
  5. Network Traffic
    • Bandwidth: Data moving in and out of Datacenters
    • Inbound data Transfer: Data going into datacentres
      • Some are free, some are paid
    • Outbound data Transfer: Data leaving a datacentre
      • Based on zone where you transfer to
    • Zone: geographical grouping of Azure regions for billing purposes
  6. Subscription Type:
    • Some subscription types have usage allowances
      • Azure free trial allows access to number of products for 12 months
      • Also credit is included for 30-days of sign up
      • Up to 25 Always-free products (based on resource/region availability)
  7. Azure Marketplace:
    • Purchase Azure-based solutions/services from third-party vendors
      • i.e server with preinstalled/configured software, firewall, backup services
    • You pay for the service as well as the Azure resources
    • All Azure Marketplace solutions are certified and compliant with Azure policies and standards

3.1.2. Compare the Pricing And Total Cost of Ownership Calculators

  1. Pricing Calculator:
    • Designed to give an estimated cost for provisioning resources in Azure
      • Estimate individual resources
      • Build out a solution
      • Simulate scenarios
    • Information purposes only, nothing is actually added to your account when using the pricing calculator
  2. Total Cost of Ownership (TCO) Calculator:
    • Designed to help compare costs for running on-prem compared to cloud infra
    • Enter current infrastructure configuration
      • Servers
      • DBs
      • Storage
      • Outbound network metrics
    • Presented with Cloud configuration offer and difference

3.1.3. Describe the Microsoft Cost Management Tool

  • Service to monitor provisioned resources
  1. What is Cost Management?
    • Ability to quickly check resource costs
    • Create alerts based on resource spend
    • Create budgets to automate management of resources
    • Cost analysis: quick visual of Azure costs and forecasts by billing cycle, region, resource, etc.
  2. Cost Alerts:
    • Budget Alerts
    • Credit Alerts
    • Department Quota Alerts
    1. Budget Alerts:
      • When spending (based on usage or cost) reaches/exceeds amount defined in budget
      • Azure Portal = cost
      • Azure Consumption API = cost or usage
      • Generated automatically, appears in dashboard and emailed to recipient list
    2. Credit Alerts:
      • When credit commitments are consumed
      • Used for Enterprise Agreements (EAs)
      • Generated Automatically at 90% and 100% of your balance
      • Appears in dashboard and emailed to recipient list
    3. Department Spending Quota Alerts:
      • When department spending reaches a fixed threshold of quota
      • Configured in EA portal
      • Appears in dashboard and emailed to recipient list
  3. Budgets:
    • Where you set a spending limit for Azure
    • Based on subscription, resource group, service type, etc.
    • Also set a budget alert when you create
    • Can also enable budget conditions to automate suspension/modification of resources when trigger occurs.

3.1.4. Describe the Purpose of Tags

  • Tags provide metadata about your resources
  1. Uses:
    • Resource management:
      • Locate/Act on resources associated with specific workloads, environments, business units, and owners.
    • Cost management & Optimization:
      • Group resources to report on costs, track budgets, etc.
    • Operations Management:
      • Group resources based on business critical criteria, and availability
      • Helps formulate Service-Level Agreements (SLA: uptime/performance guarantee between you and users)
    • Security:
      • Classify by public/confidential security
    • Governance/Regulatory Compliance:
      • Identify resources that align with compliance requirements (ISO 27001)
      • Can also be tagged with owner/department name
    • Workload Optimization and Automation:
      • Tags help visualize all resources that participate in complex deployments
      • Tag with application name and use Azure Devops to automate
  2. How do I manage resource tags?
    • PowerShell, Azure CLI, Azure Resource Manager templates, Azure REST API, Azure Portal.
    • Azure Policy can enforce tagging rules and conventions
      • Require tags be added to new resources on provision
      • Define rules that reapply removed tags
    • Resources don’t inherit tags from subscriptions and resource groups

3.2. Describe Features and Tools in Azure for Governance and compliance

3.2.1. Describe the purpose of Microsoft Purview

  • Family of data governance, risk, compliance solutions
  • Insight about on-prem, multicloud, SaaS data
  • Provides Automated data discovery, sensitive data classification, E2E data lineage
  1. Risk and Compliance Solutions
    • Microsoft 365 Teams, OneDrive, Exchange use Purview
    • Helps orgs protect sensitive data, identify risks, and manage regulatory compliance requirements
  2. Unified Data Governance:
    • Create an up-to-date map of your entire data estate that includes data classification and end-to-end lineage.
    • Identify where sensitive data is stored in your estate.
    • Create a secure environment for data consumers to find valuable data.
    • Generate insights about how your data is stored and used.
    • Manage access to the data in your estate securely and at scale.

3.2.2. Describe the purpose of Azure Policy

  • Service that enables you to create, assign, manage policies that control and audit resources
  • Enforce rules across resource configurations to be compliant with corporate standards
  1. How does Azure Policy define policies?
    • Define individual policies and groups of policies (initiatives)
    • Evaluates resources and highlights non-compliant resources
    • Can also prevent non-compliant resources from being created
    • Can set policies at resource/group/subscription/etc. levels
    • Policies are inherited (parent-child)
    • Built-in Policy and Initiative definitions for Storage/Networking/Compute/Security Center/ Monitoring.
    • Can also automatically remediate non-compliant resources and configurations
    • Integrates with Azure DevOps for CI/CD pipelines
  2. What are Azure Policy Initiatives?
    • Way of grouping related policies together
    • i.e “Enable Monitoring” in Azure Security Center includes the following and more:
      • “Monitor unencrypted SQL Database in Security Center”
      • “Monitor OS vulnerabilities in Security Center”
      • “Monitor missing Endpoint Protection in Security Center”

3.2.3. Describe the purpose of Resource Locks

  • Prevents resources from being accidentally deleted or changed
  1. Types of Resource Locks
    • Prevent users from deleting
    • Prevent users from changing or deleting resource
  2. How do I manage resource locks?
    • Azure Portal/ PWSH/ Azure CLI/ Azure Resource Manager
  3. How do I delete or change a locked resource?
    • Remove lock (even if you’re an owner)
    • Apply Action

3.2.4. Describe the purpose of the Service Trust Portal

  • Portal that provides access to content, tools, and other resources about Microsoft security/privacy/compliance practices.
  • Details about Microsoft’s implementation of controls and processes that protect services and customer data
  • There is an NDA to accept for compliance materials
  1. Locations:
    • Service Trust Portal (home page)
    • My Library (save/pin documents)
    • All documents (landing page for documents on the portal)
      • Documents Available to download for at least 12 months after publishing (or until a new version is provided)

3.3. Describe Features and Tools for Managing and Deploying Azure resources

3.3.1. Describe Tools for Interacting with Azure

  1. What is the Azure Portal?
    • web-based console, manage by GUI
    • Build, Manage, Monitor all deployments
    • Create custom dashboards
    • Configure accessibility options
    • Present in every Azure datacenter, and is deployed on “edge”
  2. Azure Cloud Shell
    • browser-based shell tool
    • Supports Azure PowerShell and Azure CLI (bash)
    • Authenticated to Azure credentials
  3. Azure PowerShell
    • Interface to Azure REST API
    • Scripting language (PowerShell)
  4. Azure CLI
    • Interface to Azure REST API
    • Scripting language (Bash)

3.3.2. Describe Purpose of Azure Arc

  • Arc extends compliance/monitoring to hybrid and multicloud configuration
  • Centralized way to:
    • Manage all environments together by projecting non-Azure resource into ARM
    • Manage multi-cloud, hybrid VMs, Kubernetes Clusters, DBs in Azure
    • Use familiar services and management capabilities on all resources
    • Continue using traditional ITOps while introducing DevOps practices
    • Configure custom locations as abstraction layers on top of clusters.
  1. Capability outside of Azure:
    • Servers
    • Kubernetes clusters
    • Azure data services
    • SQL Servers
    • Virtual Machines (in preview)

3.3.3. Describe Azure Resource Manager (ARM), templates, and Bicep

  • Deployment/management Service for Azure
  • Layer to CRUD resources in Azure Account
  • Includes the Azure REST API
  1. Benefits:
    • manage infra through JSON templates
    • deploy/manage/monitor resources in groups
    • Re-deploy through the Software Development Life Cycle (SDLC) consistently
    • Define dependencies between resources, and deploy in correct order
    • Apply RBAC to all services
    • Apply tags to resources
    • View billing
  2. Infrastructure as Code (IaC)
    • Manage infra as code
    1. ARM Templates (JSON Format)
      • Verified before run
      • Define desired state and configuration, template does rest
  3. Benefits of ARM Templates:
    • Declarative Syntax
    • Repeatable Results
    • Orchestration
    • Modular Files
    • Extensibility with PWSH or Bash
  4. Bicep
    • Language to deploy Azure resources
    • Defines Infrastructure and Configuration
    • Bicep is simpler, more concise than ARM Templates
    • Immediately supports preview and versions of Azure services
    • All the benefits of ARM Templates minus PWSH and Bash

3.4. Describe Monitoring Tools in Azure

3.4.1. Describe Purpose of Azure Advisor

  • Evaluates Azure resources and makes recommendations
  • Designed to save time on cloud optimization
  • Take actions, postpone, or dismiss
  • Available to provide notifications and alerts for new recommendations
  • Dashboard displays personalized recommendations for all subscriptions
    • Can be filtered
    • Categories: Reliability, Security, Performance, Operational Excellence, Cost.

3.4.2. Describe Azure Service Health

  • Azure Status is global Azure status and outages
  • Service Health focuses on your Azure regions and services
  • Resource Health is a view of your Azure resources
  • Together, all provide complete view of your Azure environment from global to specific resources.

3.4.3. Describe Azure Monitor

_20241005_142832screenshot.png

  • Platform for collecting, analyzing, visualizing, and acting on data based on your resources.
  • Can monitor Azure, on-prem, and multi-cloud resources.
  • Use data to help react to events in real-time via SMS, Email, Autoscaling resources, etc.
  1. Azure Log Analytics
    • Write/Run log queries on data gathered by Azure Monitor
    • Can sort/filter/analyze records
    • Advanced queries for statisticaly analysis and visualization of trends
  2. Azure Monitor Alerts
    • Automated way to stay informed when thresholds are crossed in Azure Monitor.
    • Provides the notification service, and can attempt corrective action on resources.
    • Can monitor logs and metrics and trigger events.
  3. Application Insights
    • Monitor web apps in Azure, on-prem and multicloud
    • SDK in application or agent on your VM
    • Metrics Monitored:
      • Request rates, response times, failure rates
      • Dependency rates, response times, failure rates (external services)
      • Page views, browser performance
      • AJAX calls from pages (rates, response times, failure)
      • User/Session Counts
      • CPU/memory/network usage

Author: Daniel Ibanescu

Created: 2024-10-05 Sat 14:33