Tracking Deployment Tracking and monitoring your deployment is of particular importance since the last thing you want is to end up with a broken release in production without even knowing about it until your users or customers start complaining. You want to make sure that whatever strategy and solution you put in place to deploy […]
Security Association Markup Language Security Association Markup Language (SAML) is used to simplify authentication services and allow for single sign-on operations. SAML allows users to authenticate with the identity provider one time using a single set of credentials; they then get access to multiple applications and services without any additional sign-ins. SAML-enabled applications delegate authentication […]
Move resources across resource groups When moving resources between subscriptions, the resource provider of the source resource must also be registered in the target subscription. A resource provider is the underlying service that allows that service to function and operate in your subscription. To see the list of resource providers, navigate to your subscription. On […]
Data Encapsulation Terminology As you can see from the explanations of how HTTP, TCP, IP, and Ethernet do their jobs, when sending data, each layer adds its own header (and for data-link protocols, also a trailer) to the data supplied by the higher layer. The term encapsulation refers to the process of putting headers (and sometimes […]
VPCs Together There are several different techniques that you can use to network VPCs together. Which method you use depends mainly on your requirements. The most common are shown in the following list: Having gone through an overview of the techniques used to network VPCs together, you can proceed to take a deeper look at […]
Summary In this chapter, we covered a lot of the theory behind MDM, having a single source of truth for data records, and some methods for its implementation, along with considerations for doing so. While Salesforce is often implemented to act as the de facto source of truth, it is important to understand why that […]
Border Gateway Protocol Border Gateway Protocl (BGP) provides loop-free routing between different autonomous systems or organizations, or domains. It uses a path-vector routing algorithm to exchange routing information between BGP speakers. Based on this information, each BGP speaker determines a path to reach a particular destination while detecting and avoiding paths with routing loops. The […]
TCP/IP Data-Link and Physical Layers The TCP/IP model’s data-link and physical layers define the protocols and hardware required to deliver data across some physical network. The two work together quite closely; in fact, some standards define both the data-link and physical layer functions. The physical layer defines the cabling and energy (for example, electrical signals) […]
Manage resource groups When creating resource groups, it is important that you consider factors for your resource group design: region or location details along with a valid resource group name (see Figure 1-42). FIGURE 1-42 Create A Resource Group blade Move resources across resource groups Some resources in Azure can be moved between resource groups and even across subscrip- tions, but support for move operations varies based on the service. A reference of services that can be moved can be found at https://learn.microsoft.com/en-us/azure/azure-resource- manager/management/move-support-resources. In Figure 1-43, the VM in Resource Group 2 can be moved into Resource Group 1, and it can also be moved across subscriptions into the resource […]
Securing SageMaker notebooks If you are reading this section of the chapter, then you have already learned how to use notebook instances, which type of training instances should be chosen, and how to configure and use endpoints. Now, let’s learn about securing those instances. The following aspects will help to secure the instances: In this […]