Select Page
Setting up a multi-resource metric alert rule

Monitor at scale in Azure Monitor with multi-resource metric alerts

Our customers rely on Azure to run large scale applications and services critical to their business. To run services at scale, you need to setup alerts to proactively detect, notify, and remediate issues before it affects your customers. However, configuring ... continue reading
XentIT Cloud Security Stack for Azure flowchart

Security for healthcare through vigilant agents and virtual patching

Healthcare organizations depend on data-driven decisions. To enable better decisions and better health outcomes, healthcare organizations are moving to the cloud. There, the latest advances in artificial intelligence, machine learning, and analytics can be more easily tested and implemented. For ... continue reading
View Container Live logs with #Azure Monitoring #AKS #Kubernetes #Containers #AzureDevOps

View Container Live logs with #Azure Monitoring #AKS #Kubernetes #Containers #AzureDevOps

Monitoring Azure Kubernetes Cluster Azure Monitor for containers is a feature designed to monitor the performance of container workloads deployed to either Azure Container Instances or managed Kubernetes clusters hosted on Azure Kubernetes Service (AKS). Monitoring your containers is critical, ... continue reading
image

How to Protect your #Azure resources from Distributed Denial of Service #DDoS attacks #Cloud #SDN #VNET #Security #Alerts #Analytics

Distributed denial of service (DDoS) attacks are some of the largest availability and security concerns facing customers that are moving their applications to the cloud. A DDoS attack attempts to exhaust an application’s resources, making the application unavailable to legitimate ... continue reading
Azure Monitor: Detecting and Alerting on File Changes

Azure Monitor: Detecting and Alerting on File Changes

I am preparing for Microsoft Ignite | The Tour and have been playing around quite a bit with Azure Monitor and the Azure Automation state tracking capabilities. One of the features I've found impressive is the ability to track the ... continue reading
#Microsoft Azure Hub-Spoke model by Enterprise Design 2 of 4 Lift and Shift #Azure #Hyperv #VMware

#Microsoft Azure Hub-Spoke model by Enterprise Design 2 of 4 Lift and Shift #Azure #Hyperv #VMware

Microsoft Azure Hybrid Cloud Architecture HUB-Spoke Model Microsoft Azure Hub-Spoke model This blogpost about Microsoft Azure Hub-Spoke model by Enterprise Design 2 of 4 “Lift and Shift” is part of a Datacenter transition to Microsoft Azure Intelligent Cloud. It’s talking ... continue reading
Let AI help you be more productive with Microsoft Azure CLI

Let AI help you be more productive with Microsoft Azure CLI

Keeping up with the pace of change in Microsoft Azure can be challenging. Every week there are more than 50 pull requests against the Azure Representational State Transfer (REST) API. Over the past 6 months, we’ve been building the AI-powered ... continue reading
#Microsoft Azure Hub-Spoke model by Enterprise Design 1 of 4 #Azure #Cloud

#Microsoft Azure Hub-Spoke model by Enterprise Design 1 of 4 #Azure #Cloud

Azure Hub-Spoke Architecture Microsoft Azure Hub-Spoke Architecture This Enterprise reference architecture shows how to implement a hub-spoke topology in Azure. The hub is a virtual network (VNet) in Azure that acts as a central point of connectivity to your on-premises ... continue reading
Upgrading Azure #Kubernetes Cluster and Set #Azure monitor Alerts on #AKS

Upgrading Azure #Kubernetes Cluster and Set #Azure monitor Alerts on #AKS

Current version of Kubernetes on Microsoft Azure. Upgrading Microsoft Azure Kubernetes Services Azure Kubernetes Service (AKS) makes it simple to deploy a managed Kubernetes cluster in Azure. AKS reduces the complexity and operational overhead of managing Kubernetes by offloading much ... continue reading
Connect to the Intelligent Security Graph using a new API

Connect to the Intelligent Security Graph using a new API

Most organizations deal with high volumes of security data and have dozens of security solutions in their enterprise, making the task of integrating various products and services daunting and complex. The cost, time, and resources necessary to connect systems, enable ... continue reading