Learn Azure Administration Explore Cloud Administration Concepts with Networking, Computing, Storage, and Identity Management

Detalles Bibliográficos
Otros Autores: Mrzygłód, Kamil, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd [2023]
Edición:Second edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009790335206719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credit
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Introduction to Azure for Azure Administrators
  • Chapter 1: Azure Fundamentals
  • Technical requirements
  • Exploring Azure Resource Manager
  • Architecture and terminology of ARM
  • Scopes
  • Resource groups
  • Tags
  • Quotas and limits
  • Microsoft Entra ID
  • Terminology
  • Users and groups
  • Applications and service principals
  • Authorization using RBAC and ABAC
  • RBAC
  • ABAC
  • Basic toolset - the Azure CLI, Azure PowerShell, and Cloud Shell
  • Azure CLI
  • Azure PowerShell
  • Cloud Shell
  • Summary
  • Chapter 2: Basics of Infrastructure as Code
  • Technical requirements
  • What is IaC?
  • Exploring ARM templates
  • Template schema
  • Creating a deployment
  • Deployment modes
  • Creating and deploying a simple template
  • Listing deployments
  • Migrating to Azure Bicep
  • Bicep language
  • ARM templates and Bicep compatibility
  • Performing deployments
  • Decompiling an ARM template to Bicep
  • Using ACR as a repository of modules
  • What is ACR?
  • Creating an ACR instance
  • Creating a module
  • Publishing a Bicep module
  • Using the published Bicep module
  • Summary
  • Part 2: Networking for Azure Administrator
  • Chapter 3: Understanding Azure Virtual Networks
  • Technical requirements
  • Planning and deploying virtual networks
  • Planning a network in Azure
  • Deploying a virtual network
  • Understanding NSGs
  • How do NSGs work?
  • Working with NSGs
  • ASGs
  • Working with virtual network peerings
  • How does peering work?
  • Setting up peerings
  • Network routing and endpoints
  • System routes
  • Custom routes
  • Service and private endpoints
  • Summary
  • Chapter 4: Exploring Azure Load Balancer
  • Technical requirements
  • Overview of Azure Load Balancer
  • Load balancing in Azure.
  • Components of Azure Load Balancer
  • Algorithm of Azure Load Balancer
  • The differences between public and internal load balancers
  • Delving into backend pools
  • Adding a frontend IP configuration
  • Adding a backend pool
  • Understanding load balancer rules
  • Creating a load balancer rule
  • High availability ports
  • Floating IP
  • Comprehending health probes
  • Creating a health probe
  • Linking a health probe to a load-balancing rule
  • Differences between probe protocols
  • Additional guidelines for health probes
  • Summary
  • Part 3: Administration of Azure Virtual Machines
  • Chapter 5: Provisioning Azure Virtual Machines
  • Technical requirements
  • Exploring the sizes and families of Azure VMs
  • Families and their pricing
  • Operating systems
  • Delving into Azure VM storage
  • Types of disks
  • Redundancy of disks
  • Deploying a VM
  • Deploying a single VM
  • Connecting to a VM
  • Connecting using SSH
  • Connecting using RDP
  • Connecting with the DNS name
  • Connecting using Azure Bastion
  • The availability of Azure VMs
  • Availability sets
  • VMSS
  • Summary
  • Chapter 6: Configuring Virtual Machine Extensions
  • Technical requirements
  • Using virtual machine extensions
  • Employing an extension in a Windows Azure Virtual Machine
  • Using extension in Linux Azure Virtual Machines
  • Installing extensions
  • Implementing the Custom Script Extension
  • Installing software with the Custom Script Extension
  • Executing a script
  • What is the Desired State Configuration?
  • Azure Automation State Configuration
  • Understanding DSC - general concepts
  • Summary
  • Chapter 7: Configuring Backups
  • Technical requirements
  • Protecting VM data
  • Coping with accidental deletion
  • Utilizing images and snapshots for securing data
  • Understanding backup and restore for Azure VMs
  • Setting up backup for Azure VMs
  • Recovery of Azure VM.
  • Using Azure Backup Server
  • Installation platforms
  • Installation of Azure Backup Server
  • Exploring Azure Site Recovery
  • Replication
  • RTO and RPO targets
  • Network integration
  • Configuring Azure Site Recovery
  • Summary
  • Chapter 8: Configuring and Managing Disks
  • Technical requirements
  • Expanding on OS and data disks
  • Shared disks
  • Encryption
  • Exploring ephemeral OS disks
  • Deploying a virtual machine with an ephemeral OS disk
  • Adding, detaching, and expanding disks
  • Adding a disk to a virtual machine
  • Mounting a disk
  • Detaching disks
  • Expanding a disk
  • Swapping OS disks
  • Summary
  • Part 4: Azure Storage for Administrators
  • Chapter 9: Configuring Blob Storage
  • Technical requirements
  • Exploring storage accounts, containers, and blobs
  • Storage accounts
  • Containers and blobs
  • Configuring access tiers in Blob Storage
  • Hot and cold storage
  • Configuring the access tier
  • Configuring the access tier on a blob level
  • Archive tier
  • Configuring lifecycle and replication in Blob Storage
  • Replication of a storage account
  • Lifecycle of blobs in Blob Storage
  • Uploading blobs to Blob Storage
  • Using the Azure CLI to upload a file
  • Using azcopy to upload a file
  • Summary
  • Chapter 10: Azure Files and Azure File Sync
  • Technical requirements
  • Managing Azure Files (File Service)
  • Available access protocols
  • Creating a File Service instance
  • Creating a File Service share
  • Mounting a file share
  • Working with file share snapshots
  • Creating a file share snapshot
  • Configuring soft delete
  • Working with Azure File Sync
  • Planning for Azure File Sync
  • Summary
  • Chapter 11: Azure Storage Security and Additional Tooling
  • Technical requirements
  • Configuring soft delete in Blob Storage
  • Enabling soft delete for containers
  • Enabling soft delete for blobs.
  • Use cases for soft delete and versioning in Blob Storage
  • Using Azure AD for authorization
  • Azure AD authorization benefits
  • Data plane and data actions in role-based access control
  • Examples of roles in Azure for Azure Storage
  • Using Azure AD in Azure CLI
  • Using managed identities
  • Definition of managed identity
  • Incorporating a managed identity into an application
  • Considering various options for automation
  • Automated cleanup of data
  • SAS token handling
  • Stored access policies
  • Rotating access keys
  • Using the Azure Import/Export service
  • Azure Import/Export technical details
  • Azure Import/Export requirements
  • Preparing disks and configuring the job
  • Summary
  • Part 5: Governance and Monitoring
  • Chapter 12: Using Azure Policy
  • Technical requirements
  • The basics of Azure Policy
  • Azure Resource Manager and Azure Policy
  • Deploying policies
  • Deploying a policy using the Azure CLI
  • Creating custom policies
  • Understanding the syntax
  • Building and deploying custom policy
  • Simplifying the deployment of policies using initiatives
  • The idea behind initiatives
  • When to use initiatives
  • Reviewing example policies
  • Policy - secrets should not be active for longer than the specified number of days
  • Policy - allowed virtual machine size SKUs
  • Policy - assign a built-in user-assigned managed identity to Virtual Machine Scale Sets
  • Summary
  • Chapter 13: Azure Monitor and Alerts
  • Technical requirements
  • Chapter materials
  • Getting started - an overview of Azure Monitor
  • Monitoring scenarios
  • Understanding logs in Azure Monitor
  • Platform logs
  • Understanding data types and events in Azure Monitor
  • Using custom logs
  • Querying activity logs
  • Using the Azure CLI to query activity logs
  • Using the Azure CLI to find correlated events.
  • Implementing custom alerts for Azure infrastructure
  • Defining an alert
  • Implementing an alert
  • Summary
  • Chapter 14: Azure Log Analytics
  • Technical requirements
  • Getting started - an overview of Azure Log Analytics
  • Use cases for Azure Log Analytics
  • Structure of Azure Log Analytics
  • Using workspaces
  • Using Azure Log Analytics Workspace
  • Querying data
  • The basic syntax of Kusto
  • Common operators in Kusto
  • Aggregate functions
  • Visualizing results
  • render function
  • Summary
  • Chapter 15: Exploring Network Watcher
  • Technical requirements
  • Getting started - an overview of Network Watcher
  • Network Watcher toolset
  • Verifying flows
  • Diagnosing next hops
  • Visualizing the network topology
  • Summary
  • Index
  • Other Books You May Enjoy.