til

az-104

https://learn.microsoft.com/en-us/credentials/certifications/azure-administrator/

https://www.youtube.com/watch?v=YEKzldQ9N98 https://www.youtube.com/watch?v=wYUhumwOGrM&list=PLA_CqAntXBh4DPIYCcplBWLjT3AYl1822&index=2

https://github.com/undergroundwires/Azure-in-bullet-points/tree/master/AZ-104%20Microsoft%20Azure%20Administrator

https://mslabs.cloudguides.com/guides/AZ-104%20Exam%20Guide%20-%20Microsoft%20Azure%20Administrator%20Exercise%2014 https://mslabs.cloudguides.com/guides/AZ-104%20Exam%20Guide%20-%20Microsoft%20Azure%20Administrator%20Exercise%2016 https://mslabs.cloudguides.com/guides/AZ-104%20Exam%20Guide%20-%20Microsoft%20Azure%20Administrator%20Exercise%208

entra id

account is an identity, that has data associated with it you cannot have an account without an identity

editions: free, premium p1, premium p2

sspr - self service password reset - office phone number - security questions - mobile app notification

ad ds -> active directory domain services

entra id is a cloud based alternative to ad ds

p1 and p2:

p2 only:

authentication and authorization

user accounts

types of user accounts:

applications

application <-> service principal

Both represent applications in Microsoft Entra ID. An object in the Application class contains an application definition and an object in the servicePrincipal class constitutes its instance in the current Microsoft Entra tenant. Separating these two sets of characteristics allows you to define an application in one tenant and use it across multiple tenants by creating a service principal object for this application in each tenant. Microsoft Entra ID creates the service principal object when you register the corresponding application in that Microsoft Entra tenant.

arm

resource groups

When creating a resource group, you need to provide a location for that resource group. The resource group stores metadata about the resources. Therefore, when you specify a location for the resource group, you’re specifying where that metadata is stored. -> this is different from the location of the resources themselves

rbac

concepts:

scopes

examples:

azure roles vs microsoft entra roles

three types of roles:

Microsoft Entra admin roles are used to manage resources in Microsoft Entra ID, such as users, groups, and domains. These roles are defined for the Microsoft Entra tenant at the root level of the configuration.

Azure RBAC roles provide more granular access management for Azure resources. These roles are defined for a requestor or resource and can be applied at multiple levels: the root, management groups, subscriptions, resource groups, or resources.

Fundamental azure rbac roles:

virtual networks

static ip addresses

Feature Basic SKU Standard SKU
IP assignment Static or Dynamic Static
Security Open by default Secure by default, closed to inbound traffic
Resources Network interfaces, VPN gateways, Application gateways, and internet-facing load balancers Network interfaces or public standard load balancers
Redundancy Not zone redundant Zone redundant by default

network security groups (NSGs)

can be associated to a subnet or a network interface

source: Identifies how the security rule controls inbound traffic. The value specifies a specific source IP address range that’s allowed or denied. The source filter can be any resource, an IP address range, an application security group, or a default tag.

destination: Identifies how the security rule controls outbound traffic. The value specifies a specific destination IP address range that’s allowed or denied. The destination filter value is similar to the source filter. The value can be any resource, an IP address range, an application security group, or a default tag.

service: Specifies the destination protocol and port range for the security rule. You can choose a predefined service like RDP or SSH or provide a custom port range. There are a large number of services to select from.

priority: Assigns the priority order value for the security rule. Rules are processed according to the priority order of all rules for a network security group, including a subnet and network interface. The lower the priority value, the higher priority for the rule.

application security groups

Application security groups work in the same way as network security groups, but they provide an application-centric way of looking at your infrastructure. You join your virtual machines to an application security group.

vnet peering

azure vpn gateway

alternative connectivity methods

Virtual network peering is the least complex way to connect virtual networks together. Other methods focus primarily on connectivity between on-premises and Azure networks rather than connections between virtual networks.

ExpressRoute is a dedicated, private connection between an on-premises datacenter and the Azure backbone network. The virtual networks that connect to an ExpressRoute circuit are part of the same routing domain and can communicate with each other. ExpressRoute connections don’t go over the public internet, so your communications with Azure services are as secure as possible.

VPNs use the internet to connect your on-premises datacenter to the Azure backbone through an encrypted tunnel. You can use a site-to-site configuration to connect virtual networks together through VPN gateways. VPN gateways have higher latency than virtual network peering setups. They’re more complex and can cost more to manage.

routing

system routes user-defined routes next hop targets - virtual appliance - virtual network gateway - virtual network - internet - none

servivce endpoints

Azure Private Link provides private connectivity from a virtual network to Azure platform as a service (PaaS), customer-owned, or Microsoft partner services. It simplifies the network architecture and secures the connection between endpoints in Azure by eliminating data exposure to the public internet.

FQDN - fully qualified domain name

Azure Private DNS allows for private name resolution between Azure virtual networks. Azure public DNS provides DNS for public access, such as name resolution for a publicly accessible website. Azure-provided name resolution does not support user-defined domain names and only supports a single virtual network. A DNS server on a virtual machine can also be used to achieve the goal but involves much more administrative effort to implement and maintain than using Azure Private DNS.

azure load balancer

Basic SKU vs Standard SKU

The load balancer uses a five-tuple hash to map traffic to available servers:

azure application gateway

Azure Application Gateway is a load balancer for web traffic. The back-end pool can include Azure virtual machines, Azure Virtual Machine Scale Sets, Azure App Service, and even on-premises servers.

ip addressing

215.11.0.0 to 215.11.255.255 is routable on the internet

public ip addresses:

NSG - destinations? #TODO

virtual network link #TODO

application security group #TODO Application security groups allow you to group together the network interfaces from multiple virtual machines, and then use the group as the source or destination in an NSG rule. The network interfaces must be in the same virtual network.

availability set #TODO

azure load balancer, incl. SKU #TODO Basic Azure Load Balancer supports deployment in a single availability zone. Basic Azure Load Balancer supports only Basic SKU public IP. Azure Standard Load Balancer is zone-redundant, but has a higher cost.

A network interface is used to connect a virtual machine to a subnet.

For virtual network peering, both virtual networks must have non-overlapping IP addresses.

You can use a network security group (NSG) to be assigned to a network interface. NSGs can be associated with subnets or individual virtual machine instances within that subnet. When an NSG is associated with a subnet, the access control list (ACL) rules apply to all virtual machine instances of that subnet.

storage

services

types

Standard general-purpose v2

Premium block blobs

Premium file shares

Premium page blobs

replication

blob storage access

blob storage access tiers

blob object replication

blob types

authorization

stored access policy

can be created for:

identifier, start time, expiry time, permissions

azure file share

entra id authentication is not supported for file shares auto expansion is not supported for file shares

compute

host os vs guest os

azure virtual machines

availability sets

availability zones

virtual machine scale sets

azure app service

app service plans:

Feature Free Shared Basic Standard Premium Isolated
Disk space 1 GB 1 GB 10 GB 50 GB 250 GB 1 TB
Auto scale n/a n/a n/a Supported Supported Supported
Max instances n/a n/a Up to 3 Up to 10 Up to 30 Up to 100
Swapped settings Slot-specific settings
General settings, such as framework version, 32/64-bit, web sockets Custom domain names
App settings * Nonpublic certificates and TLS/SSL settings
Connection strings * Scale settings
Handler mappings Always On
Public certificates IP restrictions
WebJobs content WebJobs schedulers
Hybrid connections ** Diagnostic settings
Service endpoints ** Cross-origin resource sharing (CORS)
Azure Content Delivery Network ** Virtual network integration
Path mapping Managed identities
  Settings that end with the suffix _EXTENSION_VERSION

azure application insights

azure container instances

azure container apps

types of containers:

Azure Container Apps doesn’t provide direct access to the underlying Kubernetes APIs. If you would like to build Kubernetes-style applications and don’t require direct access to all the native Kubernetes APIs and cluster management, Container Apps provides a fully managed experience based on best-practices.

Azure Container Instances (ACI) can be managed in several ways. Azure Container Apps (ACA) is one way, and Azure Kubernetes Service (AKS) is another.

unmanaged vs managed disks

With unmanaged disks, you’re responsible for the storage accounts that are used to hold the VHDs corresponding to your VM disks.

Managed disks are the newer (and recommended) disk-storage model. They elegantly solve the complexity of unmanaged disks by putting the burden of managing the storage accounts onto Azure. You specify the disk type (Premium or Standard) and the disk size, and Azure creates and manages both the disk and the storage it uses. You don’t have to worry about storage account limits, which makes them easier to scale out.

monitor

azure alerts The alert state is manually set by the user and does not have any automated logic behind it. The alert state can be either New, Acknowledged, or Closed.

azure monitor:

tiers of monitoring data:

data types:

azure activity logs

categories:

log analytics workspace

network watcher

azure alerts

composition:

azure monitor logs

layers:

backup

Recovery Time Objective (RTO) is the target time within which a business process must be restored after a disaster occurs to avoid unacceptable consequences. Recovery Point Objective (RPO) is the maximum amount of data loss, measured in time, that your organization can sustain during an event.

backup options:

create recovery services vault (GRS is default, LRS is an option) -> define backup policy options -> back up your virtual machine Azure Backup extension requires Microsoft Azure Virtual Machine Agent to be present on the virtual machine

azure backup

aspects:

misc:

azure site recovery

Azure Site Recovery is a service that helps ensure business continuity by replicating workloads from a primary site to a secondary location

Azure recovery services vault #TODO

Azure site recovery #TODO

backup center #TODO

backup extensions #TODO

practice exams

azure import/export service: create dataset and driveset CSV file before LRS: 3 copies of data within a single physical location in the primary region storage net use: uses smb protocol and supports only account key for authentication

azure file sync has 3 fundamental management objects:

azure file sync has a conflict resolution strategy

DFS

First Action: Create a gateway subnet The gateway subnet is part of the virtual network IP address range that you specify when configuring your virtual network. It contains the IP addresses that the virtual network gateway resources and services use.

Second Action: Create a VPN gateway The virtual network gateway uses the gateway subnet.

Third Action: Create a local network gateway A local network gateway is a specific object that represents your on-premises location (the site) for routing purposes. You give the site a name by which Azure can refer to it, then specify the IP address of the on-premises VPN device to which you will create a connection. You also specify the IP address prefixes that will be routed through the VPN gateway to the VPN device.

Fourth Action: Create a VPN connection Create the Site-to-Site VPN connection between your virtual network gateway and your on-premises VPN device.

TODO

azure registration network