I finally decided to carve out an afternoon to test workload identity on AKS. I had done some preliminary reading, and my conclusion was that there had to be some voodoo magic and quantum entanglement at play there to make it work, so I braced myself for failure. The goal of the exercise was clear: … Continue reading Workload identity on AKS with Python: boring
This post is going to be a bit different than the rest, because I have no complex network designs with many boxes and IP addresses. Instead, I have been confronted with a different challenge: how can you configure Azure Firewall to allow traffic to Office 365 endpoints? Why would you want to do that? There … Continue reading Azure Firewall rules for Office 365
You are probably a Microsoft CSP partner if you are reading this, so you most likely already know that it stands for Cloud Solutions Provider. And you probably know too that you can interact with it over the Partner Center GUI, or through the Partner Center APIs. Have you automated the deployment of customers, their … Continue reading Using Python with the CSP API to automate customer onboarding
If you are reading this post, you might already know what CSP stands for: Cloud Solution Provider, it is the preferred selling model for Microsoft partners today when dealing with Azure. The authentication model in CSP has essentially two levels: you have CSP-level users, typically employees working for the Cloud Solution Provider itself, and you … Continue reading Automation with Azure CSP – CSP and ARM APIs authentication
Lately I have been involved in quite some conversations, where organisations have shown a lot of interest in the integration between Cisco ACI and F5 BigIP and BigIQ (or should I say iWorkflow?). As you might know, Cisco ACI offers the option to integrate L4-L7 services in the network. What does this mean? Optionally, you … Continue reading What do Cisco ACI, microsegmentation, service insertion, REST and Docker containers have in common?