Resource Locks – Compliance and Cloud Governance

Resource Locks – Compliance and Cloud Governance

Sometimes performing actions without caution will lead to accidental deletion or modification of mission-critical workloads that you have in your environment. In Azure, administrators can use locks to lock a subscription, resource group, or resource from getting deleted or modified. The lock will override any 

Configuring Locks – Compliance and Cloud Governance

Configuring Locks – Compliance and Cloud Governance

From the Azure portal, you can add/delete locks by following the instructions in this section. You can also add/delete locks from Azure PowerShell, the Azure CLI, ARM templates, and the REST API. The first step in assigning a lock is to understand which scope you 

Resource Tags – Compliance and Cloud Governance

Resource Tags – Compliance and Cloud Governance

Resource tags can be used to logically organize the resources in your environment. Each tag comprises a key-value pair, where you will be adding a name and a corresponding value. For example, if your key or name for the tag is Environment, you could have 

Applying Tags – Compliance and Cloud Governance

Applying Tags – Compliance and Cloud Governance

As mentioned earlier, tags can be applied at the subscription, resource group, or resource level. You can always search for Tags in the Azure portal, and the portal will list all tags that are there in your environment, as shown in Figure 2.26. FIGURE 2.26 

Virtual Networks – Virtual Networking

Virtual Networks – Virtual Networking

Whenever you are implementing infrastructure, the first thing you should think about isn’t virtual machine; it’s the network. As mentioned earlier, the network is the fundamental building block that enables communication and requires the most planning. In Azure, virtual networks represent your own network in 

Regions – Virtual Networking

Regions – Virtual Networking

In the Chapter 2, “Compliance and Cloud Governance,” you learned what Azure regions are and what role they play in resource deployment and data residency. In the case of virtual networks, they are always scoped to a single region or location. Nevertheless, this doesn’t stop 

Static and Dynamic Addressing 2 – Virtual Networking

Static and Dynamic Addressing 2 – Virtual Networking

 Creating Virtual Networks 7. Click Review + Create, and your request will be validated. Once the validation is passed, you can click Create to create the resource. In Exercise 3.1, you created a virtual network with address spaces 10.1.0.0/16 and 192.168.0.0/16. You also added two 

Static and Dynamic Addressing – Virtual Networking

Static and Dynamic Addressing – Virtual Networking

IP addresses can be assigned or allocated in two ways, statically or dynamically. In on-premises, we had a similar concept of fixed IP addresses for our resources; a static IP address is the same logic. With statically assigned IP addresses, the IP addresses do not 

Public IP Address – Virtual Networking

Public IP Address – Virtual Networking

Public IP addresses are associated with a virtual machine NIC, public load balancer, VPN gateways, application gateways, and any other resource that can be accessed from the Internet. Here also we can choose the allocation method to be static or dynamic. However, the availability of 

Network Routes – Virtual Networking

Network Routes – Virtual Networking

Network routes or route tables have existed in traditional networks for an exceptionally long time. The routes that are part of the route table decide how to direct a packet to the destination or, in other words, determine which is the next hop the resource