Skip to main content

Posts

Showing posts from January, 2021

Did you know SLA for Azure AD is increasing

SLA for Azure AD is increasing the up-time commitment to 99.99% for Azure AD Premium customers to support the need for an Identity service with high resilience and low interruptions On April 1, 2021, Azure Active Directory will update our public service level agreement (SLA) to promise 99.99% uptime for Azure AD user authentication for all licensed Azure AD Premium customers, an improvement over our previous 99.9% SLA. This change is the result of a significant and ongoing program of investment in continually raising the bar for resilience of the Azure AD services. Because Microsoft identity services are vital to keep customer businesses running, resilience and security are and always will be our top priority. In the last year, we've seen a surge in demand as organizations moved workforces online and schools enabled study from home—in fact, some national education systems moved entire student populations online with Azure AD. Azure AD is now serving more than 400 million Monthly Ac

Did you know Resource instance rules for access to Azure Storage

Did you know Resource instance rules for access to Azure Storage are now in public preview in all Azure public regions. Some Azure resources cannot be isolated through a virtual network or an IP address rule. However, you'd still like to secure and restrict access to your storage account to only your application's Azure resources. You can now configure your storage accounts to allow access to only specific resource instances of select Azure services by creating a resource instance rule for more information you refer to the MS documentation https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal Accessing resource instance rules Browse to the resource accoount and under the resource account you have networking section, simply select that Managing virtual network rules To modify vnet rules, simply select either add exiting network or create new network and apply the rule accordingly

Azure Monitor for Containers - support for Private Clusters

Do you know that you can now view live monitoring data for private clusters is in public preview. what are private clusters Private cluster, you can ensure network traffic between your API server and your node pools remains on the private network only" With this update you can do live monitoring for these private clusters.  For more information https://docs.microsoft.com/en-us/azure/aks/private-clusters https://docs.microsoft.com/en-us/azure/azure-monitor/insights/container-insights-livedata-overview

Did you know Resource instance rules for access to Azure Storage.

Did you know Resource instance rules for access to Azure Storage are now in public preview in all Azure public regions. Some Azure resources cannot be isolated through a virtual network or an IP address rule. However, you'd still like to secure and restrict access to your storage account to only your application's Azure resources. You can now configure your storage accounts to allow access to only specific resource instances of select Azure services by creating a resource instance rule for more information you refer to the MS documentation https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal Accessing resource instance rules Browse to the resource accoount and under the resource account you have networking section, simply select that Managing virtual network rules To modify vnet rules, simply select either add exiting network or create new network and apply the rule accordingly

Did you know Resource instance rules for access to Azure Storage.

Did you know Resource instance rules for access to Azure Storage are now in public preview in all Azure public regions. Some Azure resources cannot be isolated through a virtual network or an IP address rule. However, you'd still like to secure and restrict access to your storage account to only your application's Azure resources. You can now configure your storage accounts to allow access to only specific resource instances of select Azure services by creating a resource instance rule for more information you refer to the MS documentation https://docs.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal Accessing resource instance rules Browse to the resource accoount and under the resource account you have networking section, simply select that Managing virtual network rules To modify vnet rules, simply select either add exiting network or create new network and apply the rule accordingly

Azure VM - NCas_T4_v3-Series VMs are now generally available

 NCas_T4_v3-Series These virtual machines are ideal to run ML and AI workloads utilizing Cuda, TensorFlow, Pytorch, Caffe, and other Frameworks or the graphics workloads using NVIDIA GRID technology. These are avaible currently in following regions West US2 West Europe Korea Central regions Below are the pricing for this series in USD For more information  https://techcommunity.microsoft.com/t5/azure-compute/hpc-performance-and-scalability-results-with-azure-hbv2-vms/ba-p/1012813