This Week I Learned - Week #27 2020

This Week I Learned -

Azure Traffic Manager is a DNS-based traffic load balancer that you can use to distribute traffic optimally to services across Azure regions globally. Traffic Manager uses DNS to direct clients to a specific service endpoint IP address based on the rules of the traffic routing method that's used. Clients connect directly to the selected endpoint. Traffic Manager isn't a proxy or gateway. Traffic Manager doesn't see the traffic that passes between the clients and the service; it just gives clients the IP address of where they need to go.

* When Traffic Manager receives a DNS request, it chooses an available endpoint to return in the DNS response. There are three types of endpoint  or destination locations supported by Traffic Manager - Azure endpoints, External endpoints, Nested endpoints

SQL elastic pools are used to manage the budget and performance of multiple SQL databases. SQL elastic pools are a resource allocation service used to scale and manage the performance and cost of a group of Azure SQL databases. Elastic pools allow you to purchase resources for the group. SQL elastic pools are ideal when you have several SQL databases that have a low average utilization, but have infrequent, high utilization spikes. The general guidance is, if the combined resources you would need for individual databases to meet capacity spikes is more than 1.5 times the capacity required for the elastic pool, then the pool will be cost effective. Depending on the performance tier, you can add up to 100 or 500 databases to a single pool.

* You can use multiple elastic pools with a single server.

* Basic infrastructure services like DHCP, DNS, IMDS, and health monitoring are provided through the virtualized host IP addresses 168.63.129.16 and 169.254.169.254. These IP addresses belong to Microsoft and are the only virtualized IP addresses used in all regions for this purpose.

The public IP address 168.63.129.16 is used in all Azure Regions and all national clouds. This special public IP address is owned by Microsoft and will not change. Microsoft recommends that you allow this IP address in any local (in the VM) firewall policies (outbound direction). The communication between this special IP address and the resources is safe because only the internal Azure platform can source a message from this IP address. If this address is blocked, unexpected behavior can occur in a variety of scenarios.

* The same network security group can be associated to as many subnets and network interfaces as you choose.

* Unless you have a specific reason to, we recommend that you associate a network security group to a subnet, or a network interface, but not both.

* A service tag represents a group of IP address prefixes from a given Azure service. It helps to minimize complexity of frequent updates on network security rules.

* Application security groups enable you to configure network security as a natural extension of an application's structure, allowing you to group virtual machines and define network security policies based on those groups. You can reuse your security policy at scale without manual maintenance of explicit IP addresses.

* Microsoft recommends that you utilize authenticated SMTP relay services (typically connected via TCP port 587, but often others, as well) to send email from Azure Virtual Machines. SMTP relay services specialize in sender reputation, to minimize the possibility that third-party email providers reject messages. Such SMTP relay services include, but are not limited to, Exchange Online Protection and SendGrid. Use of SMTP relay services is in no way restricted in Azure, regardless of your subscription type.

Subnets are created using classless internet domain routing (CIDR) blocks of the address space that was designed for the Virtual Network. As an example, the smallest range you can specify for a subnet is /29, which provides eight IP addresses. 5 are reserved so you effectively have 3 addresses in this range. /29 represents the bit mask for the network, telling us how many bits are the same for each IP on the subnet and which bits are variable.  the /29 means the first 29 bits of the octet are the same, as shown in bold below:
0000 1010 – 0000 0001 – 0000 0000 – 0000 0000
This means, the last three bits can be 0 or 1. If we make them all 1s, we get the maximum IP value in the range: 0000 1010 – 0000 0001 – 0000 0000 – 0000 0111
This equates to 10.1.0.7, so we have our range as 10.1.0.0 – 10.1.0.7

* If a subnet needs to be updated, this is possible but can sometimes be a bit of a pain. The change is easy enough, but any changes to subnets and address ranges can only be made if there are no devices connected to the subnet. Additionally, subnets can only be deleted from Virtual Networks if they are empty.

Shared Image Gallery enables image distribution across multiple subscriptions and regions through a centralized image management platform. You can build standardized images through your own imaging pipeline or use the Azure VM Image Builder service. Automatic OS image upgrade feature monitors your image gallery and automatically begins scale set upgrades when a new image version is deployed, facilitating faster image deployment without manual overhead.

* Storage Explorer is a GUI application developed by Microsoft to simplify access to, and the management of, data stored in Azure storage accounts. Storage Explorer is available on Windows, macOS, and Linux. The interface lets you connect to Azure Cosmos DB and Data Lake (which is based on Apache Hadoop, is designed for large data volumes and can store unstructured and structured data) to investigate and download data.

* Pivotal is now a part of the VMware Tanzu portfolio

* Helm, the package manager for Kubernetes, was originally created by a company called Deis and released at the end of 2015. Deis open-sourced the project but the company was later acquired by Microsoft. Helm is the best way to find, share, and use software built for Kubernetes.

* While Google’s decision to begin charging for control plane usage for non-Anthos clusters stirred some frustrations among the developer community, GKE undoubtedly remains the king of managed Kubernetes in terms of features, support, and ease of use. Azure Kubernetes Service (AKS) remains  the only service to not charge for control plane usage.

* The JSON file containing the IP address ranges for Public Azure as a whole, each Azure region, and ranges for several Azure Services (Service Tags) such as Storage, SQL and Azure Traffic Manager, is updated weekly.

A brief history of SAP products - SAP has a large portfolio of applications. If we stick to the main enterprise resource planning products we can abbreviate the history of the company to six key versions, roughly a major iteration each decade.
HANA stands for Hasso’s New Architecture (Hasso Plattner is one of the five founders of SAP) or alternatively, “High-Performance Analytical Application”. S/4HANA stands for “SAP business suite 4 SAP HANA”.  It is a technical upgrade or a functional enhancement. The three main building blocks of S/4HANA are:
- The HANA platform (or HANA database) – a new database that solves the problems faced by ERP;
- S/4HANA (i.e. the HANA business suite) – an updated version of business suite 7 taking advantage of the benefits of the HANA platform;
- Fiori – a new approach to UI with more focus on flexible app style development and mobile.
With SAP HANA, all data is available in main memory, which avoids the performance penalty of disk I/O (i.e. read/write to auxiliary memory).
* Facebook has never been a neutral platform—it is a company whose business model depends on monitoring its users, modifying and manipulating their behavior, and selling their attention to the highest bidder - New Yorker

Bloviation is a style of empty, pompous, political speech which originated in Ohio and was used by US President Warren G. Harding, who described it as "the art of speaking for as long as the occasion warrants, and saying nothing".

* China shares its borders with 14 nations.

* Gairsain in Chamoli district is the summer capital of Uttarakhand

* 'Royal Bengal Tiger' became the National animal of India in 1973 after the inception of the Project Tiger in 1973.

* Kushok Bakula Rimpochee Airport at Leh capital of Ladakh, is the highest airport in India

Rahul Bajaj graduated from St Stephen's College in Delhi in 1958  and also earned a degree in law from Bombay University. Then he went on to pursue MBA from Harvard Business School in the US and became CEO of Bajaj Auto in 1968, when he was just 30 years. Rahul Bajaj has always been regarded as plain-spoken and his friends call him 'fearless'. In the 1970s, when Italy's Piaggio didn’t renew Bajaj's license, he began manufacturing his own brand of scooters with names like Chetak and Super.

* Hailing from a Marwari family, Ashok Khemka and Ramon Magsaysay Award winner, Arvind Kejriwal have both studied at IIT Kharagpur & joined Civil Services of India.

In his affidavit to Election Directorate before his second term elections in 2015, Arvind Kejriwal had declared that he has 10 criminal charges and 47 total charges against him.

* What is the difference between apes and monkeys? Most monkeys have tails, apes do not.

Comments

Popular posts from this blog

Maven Crash Course - Learn Power Query, Power Pivot & DAX in 15 Minutes

"Data Prep & Exploratory Data Analysis" course by Maven Analytics

Oracle Cloud Infrastructure 2024 Generative AI Professional Course & Certification Exam (1Z0-1127-24)