Author Archives: abatishchev

Following circular nested profile path identified

If you’re getting the following error: Circular nested profile definitions are not allowed. Following circular nested profile path identified: example.trafficmanager.net -> example.trafficmanager.net. Then very likely you got an ARM template like this: What means you created a Geographic traffic-routing based … Continue reading

Posted in Infrastructure | Tagged , | Leave a comment

How to get secret from Key Vault using PowerShell and Managed Identity

First you need to acquire a token using Managed Identity by calling local endpoint: Note that audience must match the service you’re calling and is different from example calling ARM. Then call Key Vault REST API to get the secret: … Continue reading

Posted in Programming | Tagged , , | Leave a comment

Reliable and scalable infrastructure: Traffic

This is a series of posts: Introduction Principles Layers Traffic (this post) Secrets Now you have multiple environments, each consisting of multiple data centers, each consisting of multiple scale units. How do you wire up them all together to be … Continue reading

Posted in Infrastructure | Tagged , , , | Leave a comment

How to assigned permissions for user-assigned managed identity on multiple subscriptions in bulk

First get the subscriptions you want to assign permissions on: Then get the client id of the identity you to assign permissions for: Now perform the actual permissions assignment: That’s it, folks!

Posted in Programming | Tagged , | Leave a comment

Reliable and scalable infrastructure: Layers

This is a series of posts: Introduction Principles Layers (this post) Traffic Secrets When designing your service’s infrastructure, you need to remember that your deployment (or scale, more below) unit can go down at any point of time for any … Continue reading

Posted in Infrastructure | Tagged , , | Leave a comment

Reliable and scalable infrastructure: Principles

This is a series of posts: Introduction Principles (this post) Layers Traffic Secrets First and foremost, you have to threat your service’s infrastructure as you threat your service’s code. In other words as infrastructure-as-code. This may include the techniques that … Continue reading

Posted in Infrastructure | Tagged , , , | Leave a comment

3 ways to assign access policy for user-assigned managed identity on key vault using ARM template

This post is a summary of my experience dealing with user-assigned managed identity and key vaults in Azure, it explores multiple ways to achieve the same result – how to assign access policies using an ARM template. Each of the … Continue reading

Posted in Infrastructure | Tagged , , | Leave a comment

Reading books vs writing one

I have an issue with reading books. I read blogs and articles on the Internet often but physical books almost never. Back in the day when I lived in Moscow, I used to commute to college and work an hour … Continue reading

Posted in Thoughts | Tagged | Leave a comment

Carnation Anapa Winery, vol 3, day 4: yeast

Due to the pandemic and workaholism, everything takes longer this year. I’m adding 5g of RC212 by Cellar Science (batch #52495, whatever it means) to the 5-gallon bucket of Petit Sirah. But first, to avoid shock, I’m diluting the yeast … Continue reading

Posted in Winemaking | Tagged | Leave a comment

Carnation Anapa Winery, vol 3, day 3: Potassium Metabisulfite

Last time when I added Potassium Metabisulfite the outcome was much better when I did not. So this time I’m adding it to both buckets of must, ~1.5 x ΒΌ tsp per 5 gallons.

Posted in Winemaking | Tagged | Leave a comment