Azure
2020-03-05
Creation of ALERTS using AZURE MONITOR
2019-10-03
☁ How to Install Managed Instance in Azure
2019-09-12
Sergi Roig
2020-03-05
Sergi Roig
Hi everyone! In this post we will learn how to deploy alerts using Azure Monitor. The alerts are useful to know when occur a performance failure in our resources. In this way, we can solve the problem quickly and more accurate. Before starting to create Read More
Nacho Cotanda
2020-02-06
Nacho Cotanda
Continuing with the post of my colleague Fran Lens’ about Instance Pools, today I am going to teach you Step by Step how to create Instance Pool in Azure using Powershell. Next, I show you the steps to follow to carry out this process: 1. Creation of a Valid Virtual Read More
Fran Lens
2020-01-28
Fran Lens
For more than a year we have been working and migrating clients to Managed Instance in Azure, that’s why when last September 4, 2019 Microsoft made the news of a new option for this, called Instance Pools, we wrote it to the list ” We have to prove Read More
Nacho Cotanda
2019-10-03
Nacho Cotanda
Today, we are back with another post related to the Microsoft Azure Cloud platform, this time we are going to talk about a new service, a service that will mark a before and after in the migrations from SQL Server to Azure, we will talk about Managed Read More
Sergi Roig
2019-09-12
Sergi Roig
In today’s post I will explain how to prepare our Azure subscription to deploy the Kubernetes service. Follow the simple steps below: 1. First of all we will need the VMSSPREVIEW service to use node scaling in AKS. This way we will open the command line to register the service in our Read More
Nacho Cotanda
2019-01-31
Nacho Cotanda
Today we return with an entry where we will discuss the creation of a Virtual Machine in Azure with the new version of Windows Server 2019 Datacenter. To start we must have a subscription in Microsoft Azure, if we do not have one we can get a free with Read More
Fran Lens
2019-01-24
Fran Lens
In the previous entry of the series we learned to manage the access and use of data, but to be completely safe, it is not enough to just secure the data in use, we also have to protect it at rest and in transit. Why is Read More