To execute console commands do
# login az login az account set --subscription a1a96cc4-4aa4-4c58-a53d-808b88bb4fb4 az account tenant list az account show # logout az account clear
Intro https://learn.microsoft.com/en-us/azure/architecture/aws-professional/messaging
| AWS service | Azure service |
|---|---|
| Simple Queue Service (SQS) | QUEUE |
| Simple Notification Service (SNS) | Service Bus |
| Amazon EventBridge | Event Grid |
| Amazon Kinesis | Event Hubs |
| Amazon MQ | Service Bus |
VMware vSAN ist eine Storage-Virtualisierungssoftware für Unternehmen, die Hyper-Converged Infrastructure (HCI) unterstützt.
VMware vSAN fasst lokale und direkt angeschlossene Datenspeichergeräte in einem VMware vSphere-Cluster zusammen, um einen einzigen Datenspeicher zu erstellen, den alle Hosts in einem vSAN-Cluster gemeinsam nutzen. VMware vSAN ist in den VMware-Hypervisor, ESXi, integriert.
Der vCenter Server dient der Verwaltung einer vSphere-Infrastruktur. Er umfasst Funktionen zum Erzeugen, Löschen oder Ändern von virtuellen Data Centern
Policies are executed sequentially based on their placement within the policy configuration.
Comparison of AWS public / private subnets with Azure: https://devblogs.microsoft.com/premier-developer/differentiating-between-azure-virtual-network-vnet-and-aws-virtual-private-cloud-vpc/
see Default outbound access in Azure https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access
https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-overview
Data Management Landing Zone:
2) Data Landing Zone:
Azure Custom Roles:
IAM and Role Based Access Control
{
"assignableScopes": [
"/"
],
"description": "Allows for send access to Azure Service Bus resources.",
"id": "/providers/Microsoft.Authorization/roleDefinitions/69a216fc-b8fb-44d8-bc22-1f3c2cd27a39",
"name": "69a216fc-b8fb-44d8-bc22-1f3c2cd27a39",
"permissions": [
{
"actions": [
"Microsoft.ServiceBus/*/queues/read",
"Microsoft.ServiceBus/*/topics/read",
"Microsoft.ServiceBus/*/topics/subscriptions/read"
],
"notActions": [],
"dataActions": [
"Microsoft.ServiceBus/*/send/action"
],
"notDataActions": []
}
],
"roleName": "Azure Service Bus Data Sender",
"roleType": "BuiltInRole",
"type": "Microsoft.Authorization/roleDefinitions"
}
Custom role, which allows to assign roles to Azure API Managers.
{
"Name": "APIM Role Assignment Manager",
"IsCustom": true,
"Description": "Allows managing role assignments for Azure API Management",
"Actions": [
"Microsoft.Authorization/*/write",
"Microsoft.Authorization/*/delete"
],
"NotActions": [],
"DataActions": [],
"NotDataActions": [],
"AssignableScopes": [
"/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.ApiManagement/service/<apim-service-name>"
]
}