Creating custom runbooks from start/stop VM solution for specific sets of VMs using tags for sequenced start/stop

Azure provides a start/stop VM solution that allows you to stop/start VMs on a schedule; it consists of multiple PowerShell runbooks. This solution offers three options when deployed:- Schedule VMs to start and stop Schedule VMs to start and stop in ascending order by using Azure Tags Autostop Vms based on low CPU usage Overtime…

Azure Virtual Machine Security:- 6 Security suggestions to get you started

Quite often I do get asked about Azure Virtual Machine security and what I recommend you to configure/look at in relation to securing your Virtual Machine configuration. In this blog, I am going to include 6 Virtual Machine security security suggestions to get you started that you may want to consider applying to your Virtual…

Azure Virtual Machine Change Tracking

Lets have a look at the Azure Virtual Change Tracking extension/solution that allows you to view guest-related OS changes within your Virtual Machine from Azure. This data can be used to alert-on if required various changes within your Virtual Machine environment. What can be tracked? Currently, the following change-types can be tracked within the Change…

Copy Azure Virtual Machine Snapshots to another region and create Managed disks using PowerShell

In my previous blog, I detailed how to create Virtual Machine (VM) snapshots of all disks and restore in Azure using PowerShell, this is a follow-on blog detailing how you can copy the Virtual Machine disk snapshots to another region, for additional backup purposes for those VMs that cannot be backedup using Azure-related backup resources,…

Azure Managed Disk snapshot and restore using PowerShell

Using Virtual Machines in Azure from time-to-time you may want to have a copy of the current point-in-time of your Virtual Machine, rather than taking a full backup of this using Recovery Services, can you create a snapshot of the Virtual Machine disk(s) using an Azure Snapshot Snapshots are in theory, a simple read-only copy…

Azure Hub-Spoke Network Configuration with Azure Firewall DNAT using PowerShell

I am going to show you how to create a Hub-Spoke network configuration with Azure Firewall using PowerShell. What is a Hub-Spoke network? Think of the Hub-Spoke as two different networks, network1 is hub, network2 is spoke. Network1 acts as the central point of connectivity and perimeter for your network where all traffic has to…

Azure Virtual Machine Boot Diagnostics

This little feature has assisted me many times! Azure Virtual Machine boot diagnostics gives you a log view and screenshot of your Virtual Machine (VM) from the hypervisor level. VM not accessible? This feature may just help you! Checking this feature can confirm if your VM is having issues stopping you from connecting successfully. Enabling…

Monitor connection to a Virtual Machine using Connection Monitor

Monitor connection to a Virtual Machine using Connection Monitor

Network Watcher Connection Monitor is a pretty cool service in Azure, ever need to monitor a Virtual machine but third-party extensions cannot be configured? Connection Monitor allows you to monitor Virtual Machines ports to ensure they’re still listening and reachable. How does it work? The connection is created from a Source Virtual Machine to your…

Availability Sets v Availability Zones in IaaS

Deploying your Production IaaS VMs within Azure you will be wanting to consider redundancy and ensuring your environment is highly available in both the Application itself along with the infrastructure it will be using within Azure. Looking at this from a high-level, you will be deploying each part of the application that you want to…

Securing your secrets using Azure Key Vault and Virtual Machine Managed Identity

In my previous blog I gave an overview of Azure Managed Identity, specifically around virtual machines and managed identities. In this, I will be detailing the process of implementing a secure use of Key Vault with this virtual machine and how Identity Management can be used to retrieve secrets. There are two types of managed…

%d bloggers like this: