Badges
Tags
Categories
Meta
Author Archives: abatishchev
Carnation Anapa Winery, vol 3, day 153: corking
Today I’m bottling my wine. I got a 6-gallom carboy that went down to about 5 during the initial testing. In the first batch I bottled 10 bottles. Each contains about 15g of water where I diluted about 0.8g of … Continue reading
Following circular nested profile path identified
If you’re getting the following error: Circular nested profile definitions are not allowed. Following circular nested profile path identified: example.trafficmanager.net -> example.trafficmanager.net. Then very likely you got an ARM template like this: What means you created a Geographic traffic-routing based … Continue reading
How to get secret from Key Vault using PowerShell and Managed Identity
First you need to acquire a token using Managed Identity by calling the local IMDS endpoint: Note that audience must match the service you’re calling and is different from example calling ARM. Then call Key Vault REST API to get … Continue reading
Reliable and scalable infrastructure: Traffic
This is a series of posts: Introduction Principles Layers Traffic (this post) Secrets Now you have multiple environments, each consisting of multiple data centers, each consisting of multiple scale units. How do you wire up them all together to be … Continue reading
How to assigned permissions for user-assigned managed identity on multiple subscriptions in bulk
First get the subscriptions you want to assign permissions on: Then get the client id of the identity you to assign permissions for: Now perform the actual permissions assignment: That’s it, folks!
Reliable and scalable infrastructure: Layers
This is a series of posts: Introduction Principles Layers (this post) Traffic Secrets When designing your service’s infrastructure, you need to remember that your deployment (or scale, more below) unit can go down at any point of time for any … Continue reading
Reliable and scalable infrastructure: Principles
This is a series of posts: Introduction Principles (this post) Layers Traffic Secrets First and foremost, you have to threat your service’s infrastructure as you threat your service’s code. In other words as infrastructure-as-code. This may include the techniques that … Continue reading
3 ways to assign access policy for user-assigned managed identity on key vault using ARM template
This post is a summary of my experience dealing with user-assigned managed identity and key vaults in Azure, it explores multiple ways to achieve the same result – how to assign access policies using an ARM template. Each of the … Continue reading
Reading books vs writing one
I have an issue with reading books. I read blogs and articles on the Internet often but physical books almost never. Back in the day when I lived in Moscow, I used to commute to college and work an hour … Continue reading
Carnation Anapa Winery, vol 3, day 4: yeast
Due to the pandemic and workaholism, everything takes longer this year. I’m adding 5g of RC212 by Cellar Science (batch #52495, whatever it means) to the 5-gallon bucket of Petit Sirah. But first, to avoid shock, I’m diluting the yeast … Continue reading