Azure 900
Azure 900
Azure Fundamentals is a series of three learning paths that familiarize you with
Azure and its many services and features.
Azure Fundamentals includes interactive exercises that give you hands-on experience
with Azure. Many exercises provide a temporary Azure portal environment called the
sandbox, which allows you to practice creating cloud resources for free at your own
pace.
Cloud computing is the delivery of computing services over the internet. Computing
services include common IT infrastructure such as virtual machines, storage,
databases, and networking. Cloud services also expand the traditional IT offerings
to include things like Internet of Things (IoT), machine learning (ML), and
artificial intelligence (AI).
Because cloud computing uses the internet to deliver these services, it doesn’t
have to be constrained by physical infrastructure the same way that a traditional
datacenter is. That means if you need to increase your IT infrastructure rapidly,
you don’t have to wait to build a new datacenter—you can use the cloud to rapidly
expand your IT footprint.
You may have heard of the shared responsibility model, but you may not understand
what it means or how it impacts cloud computing.
With the shared responsibility model, these responsibilities get shared between the
cloud provider and the consumer. Physical security, power, cooling, and network
connectivity are the responsibility of the cloud provider. The consumer isn’t
collocated with the datacenter, so it wouldn’t make sense for the consumer to have
any of those responsibilities.
At the same time, the consumer is responsible for the data and information stored
in the cloud. (You wouldn’t want the cloud provider to be able to read your
information.) The consumer is also responsible for access security, meaning you
only give access to those who need it.
Then, for some things, the responsibility depends on the situation. If you’re using
a cloud SQL database, the cloud provider would be responsible for maintaining the
actual database. However, you’re still responsible for the data that gets ingested
into the database. If you deployed a virtual machine and installed an SQL database
on it, you’d be responsible for database patches and updates, as well as
maintaining the data and information stored in the database.
The following diagram highlights how the Shared Responsibility Model informs who is
responsible for what, depending on the cloud service type.
Operating systems
Network controls
Applications
Identity and infrastructure
What are cloud models? The cloud models define the deployment type of cloud
resources. The three main cloud models are: private, public, and hybrid.
Private cloud
Let’s start with a private cloud. A private cloud is, in some ways, the natural
evolution from a corporate datacenter. It’s a cloud (delivering IT services over
the internet) that’s used by a single entity. Private cloud provides much greater
control for the company and its IT department. However, it also comes with greater
cost and fewer of the benefits of a public cloud deployment. Finally, a private
cloud may be hosted from your on site datacenter. It may also be hosted in a
dedicated datacenter offsite, potentially even by a third party that has dedicated
that datacenter to your company.
Public cloud
A public cloud is built, controlled, and maintained by a third-party cloud
provider. With a public cloud, anyone that wants to purchase cloud services can
access and use resources. The general public availability is a key difference
between public and private clouds.
Hybrid cloud
A hybrid cloud is a computing environment that uses both public and private clouds
in an inter-connected environment. A hybrid cloud environment can be used to allow
a private cloud to surge for increased, temporary demand by deploying public cloud
resources. Hybrid cloud can be used to provide an extra layer of security. For
example, users can flexibly choose which services to keep in public cloud and which
to deploy to their private cloud infrastructure.
The following table highlights a few key comparative aspects between the cloud
models.
Multi-cloud
A fourth, and increasingly likely scenario is a multi-cloud scenario. In a multi-
cloud scenario, you use multiple public cloud providers. Maybe you use different
features from different cloud providers. Or maybe you started your cloud journey
with one provider and are in the process of migrating to a different provider.
Regardless, in a multi-cloud environment you deal with two (or more) public cloud
providers and manage resources and security in both environments.
Azure Arc
Azure Arc is a set of technologies that helps manage your cloud environment. Azure
Arc can help manage your cloud environment, whether it's a public cloud solely on
Azure, a private cloud in your datacenter, a hybrid configuration, or even a multi-
cloud environment running on multiple cloud providers at once.
Cloud computing falls under OpEx because cloud computing operates on a consumption-
based model. With cloud computing, you don’t pay for the physical infrastructure,
the electricity, the security, or anything else associated with maintaining a
datacenter. Instead, you pay for the IT resources you use. If you don’t use any IT
resources this month, you don’t pay for any IT resources.
No upfront costs.
No need to purchase and manage costly infrastructure that users might not use to
its fullest potential.
The ability to pay for more resources when they're needed.
The ability to stop paying for resources that are no longer needed.
With a traditional datacenter, you try to estimate the future resource needs. If
you overestimate, you spend more on your datacenter than you need to and
potentially waste money. If you underestimate, your datacenter will quickly reach
capacity and your applications and services may suffer from decreased performance.
Fixing an under-provisioned datacenter can take a long time. You may need to order,
receive, and install more hardware. You'll also need to add power, cooling, and
networking for the extra hardware.
In a cloud-based model, you don’t have to worry about getting the resource needs
just right. If you find that you need more virtual machines, you add more. If the
demand drops and you don’t need as many virtual machines, you remove machines as
needed. Either way, you’re only paying for the virtual machines that you use, not
the “extra capacity” that the cloud provider has on hand.
Public cloud
The public cloud model provides cloud services to virtually anyone interested in
using the cloud services. Datacenters are dedicated to anyone consuming cloud
resources instead of a single customer.
Hybrid cloud ✔
The hybrid cloud model is a combination of public cloud and private cloud, using
both datacenters dedicated solely to one customer and datacenters that are shared
with the public.
Multi-cloud
3. According to the shared responsibility model, which cloud service type places
the most responsibility on the customer?
Instead of maintaining CPUs and storage in your datacenter, you rent them for the
time that you need them. The cloud provider takes care of maintaining the
underlying infrastructure for you. The cloud enables you to quickly solve your
toughest business challenges and bring cutting-edge solutions to your users.
Diagram showing a resource group box with a function, VM, database, and app
included.
Resource groups are simply groupings of resources. When you create a resource,
you’re required to place it into a resource group. While a resource group can
contain many resources, a single resource can only be in one resource group at a
time. Some resources may be moved between resource groups, but when you move a
resource to a new group, it will no longer be associated with the former group.
Additionally, resource groups can't be nested, meaning you can’t put resource group
B inside of resource group A.
Resource groups provide a convenient way to group resources together. When you
apply an action to a resource group, that action will apply to all the resources
within the resource group. If you delete a resource group, all the resources will
be deleted. If you grant or deny access to a resource group, you’ve granted or
denied access to all the resources within the resource group.
When you’re provisioning resources, it’s good to think about the resource group
structure that best suits your needs.
For example, if you’re setting up a temporary dev environment, grouping all the
resources together means you can deprovision all of the associated resources at
once by deleting the resource group. If you’re provisioning compute resources that
will need three different access schemas, it may be best to group resources based
on the access schema, and then assign access at the resource group level.
There aren’t hard rules about how you use resource groups, so consider how to set
up your resource groups to maximize their usefulness for you.
Azure subscriptions
In Azure, subscriptions are a unit of management, billing, and scale. Similar to
how resource groups are a way to logically organize resources, subscriptions allow
you to logically organize your resource groups and facilitate billing.
An account can have multiple subscriptions, but it’s only required to have one. In
a multi-subscription account, you can use the subscriptions to configure different
billing models and apply different access-management policies. You can use Azure
subscriptions to define boundaries around Azure products, services, and resources.
There are two types of subscription boundaries that you can use:
Billing boundary: This subscription type determines how an Azure account is billed
for using Azure. You can create multiple subscriptions for different types of
billing requirements. Azure generates separate billing reports and invoices for
each subscription so that you can organize and manage costs.
Access control boundary: Azure applies access-management policies at the
subscription level, and you can create separate subscriptions to reflect different
organizational structures. An example is that within a business, you have different
departments to which you apply distinct Azure subscription policies. This billing
model allows you to manage and control access to the resources that users provision
with specific subscriptions.
Create additional Azure subscriptions
Similar to using resource groups to separate resources by function or access, you
might want to create additional subscriptions for resource or billing management
purposes. For example, you might choose to create additional subscriptions to
separate:
If you have many subscriptions, you might need a way to efficiently manage access,
policies, and compliance for those subscriptions. Azure management groups provide a
level of scope above subscriptions. You organize subscriptions into containers
called management groups and apply governance conditions to the management groups.
All subscriptions within a management group automatically inherit the conditions
applied to the management group, the same way that resource groups inherit settings
from subscriptions and resources inherit from resource groups. Management groups
give you enterprise-grade management at a large scale, no matter what type of
subscriptions you might have. Management groups can be nested.
Some examples of how you could use management groups might be:
Create a hierarchy that applies a policy. You could limit VM locations to the US
West Region in a group called Production. This policy will inherit onto all the
subscriptions that are descendants of that management group and will apply to all
VMs under those subscriptions. This security policy can't be altered by the
resource or subscription owner, which allows for improved governance.
Provide user access to multiple subscriptions. By moving multiple subscriptions
under a management group, you can create one Azure role-based access control (Azure
RBAC) assignment on the management group. Assigning Azure RBAC at the management
group level means that all sub-management groups, subscriptions, resource groups,
and resources underneath that management group would also inherit those
permissions. One assignment on the management group can enable users to have access
to everything they need instead of scripting Azure RBAC over different
subscriptions.
Important facts about management groups:
Resource groups provide a convenient way to group resources together. When you
apply an action to a resource group, that action will apply to all the resources
within the resource group. If you delete a resource group, all the resources will
be deleted. If you grant or deny access to a resource group, you’ve granted or
denied access to all the resources within the resource group.
Imagine your website back-end has reached capacity but the front end and storage
aren't being stressed. With containers, you could scale the back end separately to
improve performance. If something necessitated such a change, you could also choose
to change the storage service or modify the front end without impacting any of the
other components.
There are other hosting options that you can use with Azure, including Azure App
Service.
Azure App Service is a robust hosting option that you can use to host your apps in
Azure. Azure App Service lets you focus on building and maintaining your app, and
Azure focuses on keeping the environment up and running.
Azure App Service is an HTTP-based service for hosting web applications, REST APIs,
and mobile back ends. It supports multiple languages, including .NET, .NET Core,
Java, Ruby, Node.js, PHP, or Python. It also supports both Windows and Linux
environments.
Web apps
App Service includes full support for hosting web apps by using ASP.NET, ASP.NET
Core, Java, Ruby, Node.js, PHP, or Python. You can choose either Windows or Linux
as the host operating system.
API apps
Much like hosting a website, you can build REST-based web APIs by using your choice
of language and framework. You get full Swagger support and the ability to package
and publish your API in Azure Marketplace. The produced apps can be consumed from
any HTTP- or HTTPS-based client.
WebJobs
You can use the WebJobs feature to run a program (.exe, Java, PHP, Python, or
Node.js) or script (.cmd, .bat, PowerShell, or Bash) in the same context as a web
app, API app, or mobile app. They can be scheduled or run by a trigger. WebJobs are
often used to run background tasks as part of your application logic.
Mobile apps
Use the Mobile Apps feature of App Service to quickly build a back end for iOS and
Android apps. With just a few actions in the Azure portal, you can:
Public endpoints have a public IP address and can be accessed from anywhere in the
world.
Private endpoints exist within a virtual network and have a private IP address from
within the address space of that virtual network.
Isolation and segmentation
Azure virtual network allows you to create multiple isolated virtual networks. When
you set up a virtual network, you define a private IP address space by using either
public or private IP address ranges. The IP range only exists within the virtual
network and isn't internet routable. You can divide that IP address space into
subnets and allocate part of the defined address space to each named subnet.
For name resolution, you can use the name resolution service that's built into
Azure. You also can configure the virtual network to use either an internal or an
external DNS server.
Internet communications
You can enable incoming connections from the internet by assigning a public IP
address to an Azure resource, or putting the resource behind a public load
balancer.
Virtual networks can connect not only VMs but other Azure resources, such as the
App Service Environment for Power Apps, Azure Kubernetes Service, and Azure virtual
machine scale sets.
Service endpoints can connect to other Azure resource types, such as Azure SQL
databases and storage accounts. This approach enables you to link multiple Azure
resources to virtual networks to improve security and provide optimal routing
between resources.
Communicate with on-premises resources
Azure virtual networks enable you to link resources together in your on-premises
environment and within your Azure subscription. In effect, you can create a network
that spans both your local and cloud environments. There are three mechanisms for
you to achieve this connectivity:
Point-to-site virtual private network connections are from a computer outside your
organization back into your corporate network. In this case, the client computer
initiates an encrypted VPN connection to connect to the Azure virtual network.
Site-to-site virtual private networks link your on-premises VPN device or gateway
to the Azure VPN gateway in a virtual network. In effect, the devices in Azure can
appear as being on the local network. The connection is encrypted and works over
the internet.
Azure ExpressRoute provides a dedicated private connectivity to Azure that doesn't
travel over the internet. ExpressRoute is useful for environments where you need
greater bandwidth and even higher levels of security.
Route network traffic
By default, Azure routes traffic between subnets on any connected virtual networks,
on-premises networks, and the internet. You also can control routing and override
those settings, as follows:
Route tables allow you to define rules about how traffic should be directed. You
can create custom route tables that control how packets are routed between subnets.
Border Gateway Protocol (BGP) works with Azure VPN gateways, Azure Route Server, or
Azure ExpressRoute to propagate on-premises BGP routes to Azure virtual networks.
Filter network traffic
Azure virtual networks enable you to filter traffic between subnets by using the
following approaches:
Network security groups are Azure resources that can contain multiple inbound and
outbound security rules. You can define these rules to allow or block traffic,
based on factors such as source and destination IP address, port, and protocol.
Network virtual appliances are specialized VMs that can be compared to a hardened
network appliance. A network virtual appliance carries out a particular network
function, such as running a firewall or performing wide area network (WAN)
optimization.
Connect virtual networks
You can link virtual networks together by using virtual network peering. Peering
allows two virtual networks to connect directly to each other. Network traffic
between peered networks is private, and travels on the Microsoft backbone network,
never entering the public internet. Peering enables resources in each virtual
network to communicate with each other. These virtual networks can be in separate
regions, which allows you to create a global interconnected network through Azure.
User-defined routes (UDR) allow you to control the routing tables between subnets
within a virtual network or between virtual networks. This allows for greater
control over network traffic flow.
Depending on the configuration, you or the cloud provider may be responsible for
networking settings and connectivity within your cloud environment, network and
application security, and the directory infrastructure.
Development framework: PaaS provides a framework that developers can build upon to
develop or customize cloud-based applications. Similar to the way you create an
Excel macro, PaaS lets developers create applications using built-in software
components. Cloud features such as scalability, high-availability, and multi-tenant
capability are included, reducing the amount of coding that developers must do.
Analytics or business intelligence: Tools provided as a service with PaaS allow
organizations to analyze and mine their data, finding insights and patterns and
predicting outcomes to improve forecasting, product design decisions, investment
returns, and other business decisions.
While the SaaS model may be the least flexible, it’s also the easiest to get up and
running. It requires the least amount of technical knowledge or expertise to fully
employ.
Introduction
Completed
100 XP
1 minute
Microsoft Power BI is a complete reporting solution that offers data preparation,
data visualization, distribution, and management through development tools and an
online platform.
Power BI can scale from simple reports using a single data source to reports
requiring complex data modeling and consistent themes. Use Power BI to create
visually stunning, interactive reports to serve as the analytics and decision
engine behind group projects, divisions, or entire organizations.
Power BI is an essential tool to data analysts and their organization; however, all
data professionals benefit from understanding how Power BI works to explore and
present data insights within organizations.
Use Power BI
Completed
100 XP
3 minutes
In order to create reports with Power BI, you must first understand the tools
necessary. There are three primary components to Power BI:
You can access the Power BI service at app.powerbi.com with a school or work
account. If your organization doesn't already use Power BI, you can still explore
the service by getting a free trial or signing up for a free Microsoft 365
Developer account.