Skip to main content

Posts

Showing posts from April, 2020

Application Change Analysis

Application change analysis will provide you a centralized view along with the analysis of all the recent changes for different components of a web app and its dependencies. Suppose you have noticed some downtime in your app caused by a changed App Setting, but you do not know what has caused the issue. So, you can enable this feature which help to identify the changes made to web application. The changes it includes are both infrastructure and deployment. The changes are stored in azure storage called Azure Resource Graph database which includes infrastructure level changes. Another source that saves the changes is App Services back-end. It takes the snapshot of your web app for every 4 hours. It clearly tells you who made the change and what it is in detail with date-time stamp. It is useful especially when multiple teams are working on same project. Currently this feature is in public preview. How to enable Change Analysis Feature Navigate to your Azure Web App in th

Difference between Azure Front Door Service and Traffic Manager

Azure Front Door Service is Microsoft’s highly available and scalable web application acceleration platform and global HTTP(s) load balancer. Azure Front Door Service supports Dynamic Site Acceleration (DSA), SSL offloading and end to end SSL, Web Application Firewall, cookie-based session affinity, URL path-based routing, free certificates and multiple domain management. In this article, I will compare Azure Front Door to Azure Traffic Manager in terms of performance and functionality. Similarity: Azure Front Door service can be compared to Azure Traffic Manager in a way that this also provides global HTTP load balancing to distribute traffic across different Azure regions, cloud providers or even with your on-premises. Both AFD & Traffic Manager support: Multi-geo redundancy: If one region goes down, traffic routes to the closest region without any intervention. Closest region routing: Traffic is automatically routed to the closest region. Differences: Azu

Cryptocurrency mining attack against Kubernetes clusters

Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers are using ransomware-like tactics and poisoned websites to get your employees’ computers to mine cryptocurrencies. Several vendors in recent days have reported a huge surge in illegal crypto-mining activity involving millions of hijacked computers worldwide. Kubernetes have been phenomenal in improving developer productivity. With lightweight portable containers, packaging and running application code is effortless. However, while developers and applications can benefit from them, many organizations have knowledge and governance gaps, which can create security gaps. Some of the Past Cases of Cryptocurrency on Kubernetes cluster: Tesla Case: The cyber thieves gained access to Tesla's Kubernetes administrative console, which exposed access credentials to Tesla's AWS environment. Once an attacker gains admin privilege of the Kubernetes cluster, he or she can discover all the se