In today’s world, where cyber threats evolve faster than ever, securing your digital infrastructure isn’t just an option—it’s a necessity. That’s why I’ve created an in-depth YouTube video that explores the power of Microsoft 365 and Azure Security tools to help businesses of all sizes protect what matters most. If you haven’t watched it yet, here’s what you’re missing out on!
Hey there, friends!
Today's blog post is all about Microsoft Security Certifications. Why? Because when I was trying to figure out where to start and how to navigate through the certifications, I couldn't find a clear answer. So, I decided to put together this post to simplify things and give you a clear certification path (and even some infographics) for starting your journey into Microsoft’s
As cloud environments grow more complex, keeping track of every resource within an Azure subscription can quickly become overwhelming. Whether you're managing a small deployment or an enterprise-scale environment, the need for a comprehensive overview of your resources is essential for maintaining control, ensuring compliance, and optimizing costs. This is where Azure Resource Inventory (ARI)
Crunchy PostgreSQL for Kubernetes is the cloud-native way to manage your own database-as-a-service (DaaS) in any public, private, or hybrid cloud. Crunchy PostgreSQL for Kubernetes is an enterprise deployment solution for PostgreSQL that unlocks true open-source cost savings and efficiency with the flexibility to run your databases on any infrastructure from a single interface.
'Cui bono' you
Very often, in the active development phase, regular logging does not help too much. Azure Functions that process some data or heavier payloads (like images or video files even) tend to store temporary processing data inside the container. By default, there's no way you can get inside the container to take a look at what's going on at the file system level. For such purposes, Secure Shell (SSH)
I had no opportunity to write in recent days. In this topic, I decided to share something unusual and highly theoretical. I want to talk about the best practices for adapting apps for the cloud (Microsoft Azure, particularly, but most of them are applicable to any cloud provider). I hope that the concepts outlined below will help you to understand the process better, and hence, apply it in
If you decided to go with a self-hosted agent(s) as I described in one of my previous articles, you might run into specific runtime issues related to the absence of a framework or software installed on a target machine. One such error is “[error] No agent found in pool … which satisfies the specified demands: java Agent.Version -gtVersion 2…x”. The ways it looks in Azure Pipelines:
The error
We have already covered SSL certificates preparation and conversion in the previous topic. For completeness sake, I’d like to cover another important aspect in DevOps, which is SSH keys configuration. The case where you may need an SSH key are:
Accessing a Linux-based Virtual Machine (VM)
Accessing Git repository
Build/release pipeline
Deployment automation tools like Chef/Ansible/Puppet etc.
This time I decided to devote a separate topic to generate a Private Key and CSR. In the world of DevOps, security certificates are something you deal with on a daily basis, so knowing how to get an SSL certificate and convert it into a proper format is critical. Despite many similar topics over the internet, people still can’t make heads and tails around this theme and the explanation below is
The idea to write this topic came to me after a production system failure we experienced recently. Failures are unavoidable. Nothing is worse than having your business application down without the proper way to mitigate the issue. That’s exactly how the catastrophe may develop, i.e. due to the somebody's negligence, lack of experience, bugs sneaked into the software, natural disaster, hacker