To execute console commands do
# login az login az account set --subscription a1a96cc4-4aa4-4c58-a53d-808b88bb4fb4 az account tenant list az account show # logout az account clear
Intro https://learn.microsoft.com/en-us/azure/architecture/aws-professional/messaging
AWS service | Azure service |
---|---|
Simple Queue Service (SQS) | QUEUE |
Simple Notification Service (SNS) | Service Bus |
Amazon EventBridge | Event Grid |
Amazon Kinesis | Event Hubs |
Amazon MQ | Service Bus |
VMware vSAN ist eine Storage-Virtualisierungssoftware für Unternehmen, die Hyper-Converged Infrastructure (HCI) unterstützt.
VMware vSAN fasst lokale und direkt angeschlossene Datenspeichergeräte in einem VMware vSphere-Cluster zusammen, um einen einzigen Datenspeicher zu erstellen, den alle Hosts in einem vSAN-Cluster gemeinsam nutzen. VMware vSAN ist in den VMware-Hypervisor, ESXi, integriert.
Der vCenter Server dient der Verwaltung einer vSphere-Infrastruktur. Er umfasst Funktionen zum Erzeugen, Löschen oder Ändern von virtuellen Data Centern
Policies are executed sequentially based on their placement within the policy configuration.
Comparison of AWS public / private subnets with Azure: https://devblogs.microsoft.com/premier-developer/differentiating-between-azure-virtual-network-vnet-and-aws-virtual-private-cloud-vpc/
see Default outbound access in Azure https://learn.microsoft.com/en-us/azure/virtual-network/ip-services/default-outbound-access
https://learn.microsoft.com/en-us/azure/load-balancer/load-balancer-overview
Data Management Landing Zone:
2) Data Landing Zone:
Azure Custom Roles:
IAM and Role Based Access Control
{ "assignableScopes": [ "/" ], "description": "Allows for send access to Azure Service Bus resources.", "id": "/providers/Microsoft.Authorization/roleDefinitions/69a216fc-b8fb-44d8-bc22-1f3c2cd27a39", "name": "69a216fc-b8fb-44d8-bc22-1f3c2cd27a39", "permissions": [ { "actions": [ "Microsoft.ServiceBus/*/queues/read", "Microsoft.ServiceBus/*/topics/read", "Microsoft.ServiceBus/*/topics/subscriptions/read" ], "notActions": [], "dataActions": [ "Microsoft.ServiceBus/*/send/action" ], "notDataActions": [] } ], "roleName": "Azure Service Bus Data Sender", "roleType": "BuiltInRole", "type": "Microsoft.Authorization/roleDefinitions" }
Custom role, which allows to assign roles to Azure API Managers.
{ "Name": "APIM Role Assignment Manager", "IsCustom": true, "Description": "Allows managing role assignments for Azure API Management", "Actions": [ "Microsoft.Authorization/*/write", "Microsoft.Authorization/*/delete" ], "NotActions": [], "DataActions": [], "NotDataActions": [], "AssignableScopes": [ "/subscriptions/<subscription-id>/resourceGroups/<resource-group-name>/providers/Microsoft.ApiManagement/service/<apim-service-name>" ] }