Cost Allocation Tags A cost allocation tag starts as a regular resource tag. Typically, these tags can be assigned when creating a resource or after the resource has already been created. For example, Figure 14.1 demonstrates tags being assigned to an EC2 resource as it is being created, whereas Figure 14.2 demonstrates tags being assigned to an […]
Return Value of Assignment Operators One final thing to know about assignment operators is that the result of an assignment is an expression in and of itself equal to the value of the assignment. For example, the following snippet of code is perfectly valid, if a little odd-looking: long wolf = 5; long coyote = […]
Note The dynamic AS number prefix peer configuration overrides the individual AS number configuration that is inherited from a BGP template. To establish BGP sessions between peers, BGP must have a router ID, which is sent to BGP peers in the OPEN message when a BGP session is established. The BGP router ID is a […]
Assign administrator permissions Azure has many different roles for managing access to Azure resources. These include classic subscription administrative roles like Account Administrator, Service Administrator, or Co-Administrator, as well as Azure role-based access controls (RBAC) that are available in Azure Resource Manager (ARM). Note that classic roles and resources are scheduled to be deprecated in […]
Remove resource groups In Azure, you can delete individual resources in a resource group, or you can delete a resource group and all its resources. Deleting a resource group also deletes all the resources contained within it in one operation. When deleting resource groups, exercise caution because the resource group might contain resources that other […]
Tracking Deployment Tracking and monitoring your deployment is of particular importance since the last thing you want is to end up with a broken release in production without even knowing about it until your users or customers start complaining. You want to make sure that whatever strategy and solution you put in place to deploy […]
Security Association Markup Language Security Association Markup Language (SAML) is used to simplify authentication services and allow for single sign-on operations. SAML allows users to authenticate with the identity provider one time using a single set of credentials; they then get access to multiple applications and services without any additional sign-ins. SAML-enabled applications delegate authentication […]
Move resources across resource groups When moving resources between subscriptions, the resource provider of the source resource must also be registered in the target subscription. A resource provider is the underlying service that allows that service to function and operate in your subscription. To see the list of resource providers, navigate to your subscription. On […]
Data Encapsulation Terminology As you can see from the explanations of how HTTP, TCP, IP, and Ethernet do their jobs, when sending data, each layer adds its own header (and for data-link protocols, also a trailer) to the data supplied by the higher layer. The term encapsulation refers to the process of putting headers (and sometimes […]
VPCs Together There are several different techniques that you can use to network VPCs together. Which method you use depends mainly on your requirements. The most common are shown in the following list: Having gone through an overview of the techniques used to network VPCs together, you can proceed to take a deeper look at […]