If you are using GitHub Copilot, there is an exciting feature you should try: GitHub Copilot custom instructions. With custom instructions, GitHub Copilot can better align […]
Modularity is a key when designing and coding Infrastructure as Code. You need to generalize and be flexible to reuse the code with different types of […]
Deploying a Log Analytics Workspace using Azure Verified Modules (AVM) with Bicep is a streamlined process that leverages the standardized practices of the Azure infrastructure-as-code framework. […]
When managing Azure resources, ensuring your SQL server is secure from unauthorized access is a priority. One way to secure your Azure SQL server is by […]
I recently had the pleasure of taking part in the 2024 Technical Summit – a community event covering the key areas of AI, digital transformation, and […]
When setting up your infrastructure in Azure, using the Azure Verified Modules can streamline the creation of any Azure Resource such as an Azure SQL Server, […]
In the Bicep Language, just like in the arm template, variables and parameters have a data type: string, int, array, object, Boolean, secure string, and secure […]
I have always had a love-hate relationship with building Azure DevOps agent solutions. However, with Managed DevOps Pools, creating an agent solution is easier than ever. […]
Creating an Azure Application Gateway Using Bicep Azure Verified Modules As cloud solutions grow more complex, using infrastructure as code (IaC) has become crucial for managing, […]
Introduction – continuous deployment with Azure Bicep Continuous deployment with Azure Bicep using Azure DevOps provides a streamlined approach to deploying your resources. This method leverages […]
In this blog post, I share my insights on writing readable and maintainable Azure Bicep templates. After several years of working with Azure Bicep templates, I […]
Introduction In today’s digital landscape, managing privileged identities has become paramount for enterprises aiming to safeguard their IT environments against unauthorized access and potential breaches. Privileged […]