Azure Arc Servers is a feature of Azure Arc that enables organizations to manage servers across different environments, including on-premises, multi-cloud, and edge environments, through a single control plane. This allows organizations to have a consistent management experience across all their servers, regardless of where they are located.
At a high level, the various features of Azure Arc Servers, include:
Server management: With Azure Arc Servers, organizations can manage their servers using Azure Policy and Azure Security Center, which provide policy-based control, monitoring, and threat protection.
Azure Stack HCI is a hardware appliance that allows businesses to run their own private cloud infrastructure on their own servers. It is designed for companies that want to keep their data and applications on-premises (i.e., not in the public cloud). With Azure Stack HCI, companies can create their own cloud-like environment for their applications and data, but with the added benefits of Azure services, such as backup, monitoring, and security.
If you find yourself in a scenario where you need to change the registration subscription of an Azure Stack Hub deployment, the below is what you need to do to complete the task..
High level:
Gather info or source and destination Remove existing registration Register to new subscription Gather info or source and destination First thing is to get your new subscription ID
$NewSubscriptionId = "325*****-****-****-****-********432" Connect to Azure Stack ARM endpoint
Quick tip:Â Another day in the life of a Cloud Operator
Got a call from a user who was in the Azure Stack tenant portal and could access some resource types but not others and when in those resources blades the info was all weird (technical term…) as shown below:
I thought it was a cache/auth issue, so I asked the user to open a new browser and try again.
I suggest you check out this Free Webinar by Altaro
Azure Security Center: How to Protect Your Datacenter with Next Generation Security
Security is a major concern for IT admins and if you’re responsible for important workloads hosted in Azure, you need to know your security is as tight as possible. In this free webinar, presented by Thomas Maurer, Senior Cloud Advocate on the Microsoft Azure Engineering Team, and Microsoft MVP Andy Syrewicze, you will learn how to use Azure Security Center to ensure your cloud environment is fully protected.
Last week I received the exciting news that I had been recognized as a Microsoft MVP for another year.
It is an absolute honour to be considered for this amazing award, let alone actually receiving one.
If you’ve being paying attention to my activities, not that I expect you would have, you may have noticed I have a focus on Microsoft Azure Stack of late. Given that Azure Stack falls under the Microsoft Azure category, I have been awarded in a new category to reflect my community contributions.
Excited to be speaking at Microsoft Ignite The Tour in Sydney. For those coming along, below are my sessions and demo times slots… If you see me make sure you come up and say hi!
[table id=5 /]
You’re a cloud operator for an Azure Stack Integrated system and for whatever reason you have the task of deploying the App Services Resource provider…
In this blog series, I’m going to take you through the considerations and deployment process of the App Services resource provider on an Azure Stack Integrated System. This should work on an ASDK but you’re probably going to make life tough for your single server instance.
So, if you’ve found your way here you have got yourself an Azure Stack Integrated System and need to register it as a Cloud Solution Provider (CSP).
Before we registered we needed to identify the type of subscription we want to use. The choice is a CSP or APSS subscription.
This deployment is being registered directly to my company as the CSP reseller so a CSP subscription was the preferred choice.
So over the last year or so I’ve had a lot of fun extending client environments to Azure. One of the methods I’ve used has been leveraging Azure Application Gateway (AAG) with Web Application Firewall (WAF) to protect these services.
The AAG’s with WAF have been a very fast and cost effective way for clients to deploy fast and protected services to Azure without the requirement for expensive 3rd-party WAF appliance licenses.
In a recent project, the management were keen to see some dashboards and insights into their organizations shiny new infrastructure.
Whilst SCOM gives some great data and statistics, it’s not overly helpful in demonstrating the high level view to management out of the box.
This is where Microsoft Operations Management Suite (OMS)Â steps in..
Background: This engagement included a new Hyper-converged platform (Hyper-V and Storage Spaces Direct) managed and monitoring with System Center (SCVMM and SCOM), so we had a great foundation to light up OMS and some chosen solutions.
This is one I use regularly, so thought it might come in handy for you..
Assumption here is you are connected via PowerShell to your intended subscription..
A few key points:
The VM will need to be stopped to execute Check the Azure VM sizing to see how many NICs you can attach I have a pre-created Network Interface with my desired settings #Using OGV to target your objects $RG = Get-AzureRmResourceGroup | ogv -PassThru $NIC = Get-AzureRmNetworkInterface | ogv -PassThru $VM = Get-AzureRmVm | ogv -PassThru #The actual adding of the NIC to the VM $VM = Add-AzureRmVMNetworkInterface -VM $VM -Id $NIC.