Microsoft SQL Server is the backbone of many businesses, but when it comes to high availability, which path should you take: Always On Availability Groups (AG) or Failover Cluster Instances (FCI)?
Having a controlled minimum set of permissions in your Active Directory (AD) will ensure nothing will slip during clone publishing. Otherwise, VMware Horizon, when instant clones are published, can make unwanted corrections in the AD service account while creating computer objects in the target organizational unit. You don’t want that.
Azure Kubernetes Service (AKS) recently introduced the ability to view the state of your AKS resources from a GUI. Azure Portal now enables you to view in-depth details of your workloads in real-time. You can view the workload of your deployments, pods, and replica sets, and various other capabilities without digging in the cmdline.
Among many good things, remote work creates new challenges for business cybersecurity. Regardless of whether the user uses VPN, having additional security measures can never hurt. Microsoft Defender for Endpoint introduces additional layers where you can also set web content filters to avoid your employees creating unwanted cyber threats.
Evaluating the state of your Active Directory (AD) is perceived as a laborious and complex task. If you do that manually, then perhaps it is. However, checking up on the state of your AD is necessary to rule out potential threats to your environment. Luckily, there’s one tool that can help you generate a comprehensive security report on your chosen AD within minutes.
Good understanding of storage is vital to every IT admin, freshman or not. vSphere continues to innovate how it uses storage, so it’s better to brush up on existing ways before getting into novelties. So before checking out vSphere 7 and Tanzu with their Paravirtual Container Storage Interface (pvCSI), let’s repeat the core material.
The issue with, for example, employees leaving your company is that they can take the Kube file with them. With that file, they can access your Azure Kubernetes Service (AKS). One way to avoid that is to remove the opportunity of access entirely by renewing certificate authority for the designated AKS cluster.
In large infrastructures, there may be clusters of hosts that require patching. A full reboot would take quite a long time. Now, vSphere Lifecycle Manager (vLCM) has a quick boot option (a kind of a warm boot), which allows for a much smoother boot. Additionally, the “desired state” image of the cluster feature will ensure that new hosts that differ for some reason from the “image” will be remediated to the desired state.
Normally, the pods within your Azure Kubernetes Service (AKS) communicate freely. Such a situation can compromise your security if met with a certain threat. To avoid that, you can use Azure or Calico Network Policies to restrict communication and allow only a set configuration for communication between your pods to avoid unnecessary cyber threats.
More transparency, fewer hardware restrictions, freedom of choice, clarity of control, and immutability — that’s where backups are headed. Microsoft has been taking too long to adapt its ReFS to those consumer demands. Veeam and Linux, on the other hand, leverage those trends and offer immutability with reasonable freedom of object and cloud storage choice.
More transparency, fewer hardware restrictions, freedom of choice, clarity of control, and immutability — that’s where backups are headed. Microsoft has been taking too long to adapt its ReFS to those consumer demands. Veeam and Linux, on the other hand, leverage those trends and offer immutability with reasonable freedom of object and cloud storage choice.