IT Talks and IT Gupshup
48:39
Жыл бұрын
Azure Private endpoint in Hindi
16:50
Azure Private Endpoints
15:01
Жыл бұрын
Azure Application Gateway Demo
22:19
2 жыл бұрын
Azure App Gateway Demo in Hindi
14:01
Azure Landing Zones in HINDI
23:24
2 жыл бұрын
Azure Landing Zones
20:11
2 жыл бұрын
1. Introduction to Terraform
6:56
2 жыл бұрын
Пікірлер
@MukundNarayanJha
@MukundNarayanJha 4 күн бұрын
Excellent video. Can you please provide terraform code.
@chinmayapandya8990
@chinmayapandya8990 20 күн бұрын
So clear and crisp. Good content, thanks.
@umakant76705
@umakant76705 Ай бұрын
video stuck at 2:10
@techonlogic
@techonlogic Ай бұрын
Not for me 😊, plz try again or with a diff phone or account
@vaibhavm1986
@vaibhavm1986 Ай бұрын
Excellent Explaination and demo thanks
@soumyakhandelwal1810
@soumyakhandelwal1810 Ай бұрын
awesome
@sharatBhaskar
@sharatBhaskar Ай бұрын
Time: 5:38, Q- what if there is a scenario where you have two 3 spokes and you want two spokes to talk with each other but not with 3rd spoke then it that case also you will need routing with firewall subnet?
@techonlogic
@techonlogic Ай бұрын
Not really, routing thru Firewall in this case was done to allow traffic via hub vnet, there are many cases where you have direct vnet peering between spokes vnet and traffic do not go via hub or firewall, To answer ur question: if you want communication between two spoke via hub firewall, u wud need route table. if you don't want to connect to spoke vnet and make it isolated or only connected to hub then u don't create routes to that vnet
@sharatbhaskar527
@sharatbhaskar527 Ай бұрын
@@techonlogic so you mean even if i have gateway connected with hub vnet and there are 3 spokes then still i will need route table attached with firewall subnet and route table routes will have the configuration which spoke will talk to which spoke. Is that understanding correct?
@techonlogic
@techonlogic Ай бұрын
If Spoke vnet are peered with hub vnet and not with other spoke vnet Then for communication between spoke vnet U wud need route device, here it's azure firewall So in order to route the next hope, we need route table to be attached to the subnet of the source spoke vnet Feel free to drop ur mobile no. To my email id : [email protected] I will call n explain
@Abhilash_Azure
@Abhilash_Azure Ай бұрын
content is clear , but poor video quality
@amanujjani8708
@amanujjani8708 2 ай бұрын
sir , how do i uninstall tha MMA ? i have both MMA and AMA
@sopankumbhare222
@sopankumbhare222 2 ай бұрын
bahot badhiya sir
@sunilchander8885
@sunilchander8885 2 ай бұрын
Nice
@sunilchander8885
@sunilchander8885 2 ай бұрын
Nice
@sudhirsingh7964
@sudhirsingh7964 3 ай бұрын
Hi, nice video.. Can you please guide in one of the secnario. We need to implememt the private end point and its should be not accesible on internet if we do so then our developer not able to access the storage account to trouble shoot the application related issue. How we can provide access only to developer, they dont do the ssh to the vnet server?
@techonlogic
@techonlogic 3 ай бұрын
Access to private endpoint happens once the traffic is allowed at Firewall and NSG. Also DNS come into picture when you are trying to access from On-prem or from laptop connected to VPN. In this case where you deny any public access and only allow Private access, you would need to allow traffic from developer IP in NSG and Firewall , to be able to reach the storage account destination. Let me know who it goes, else you can email me and we can connect if needed
@sudhirsingh7964
@sudhirsingh7964 3 ай бұрын
@@techonlogic 1) we have found one solution that in storage account firewal we add vnet(subnet) ip range in which out vpn is confogured,so that it will allow access to our developer . 2) Through private emdpoint our application will communicate with storage account
@goutamgupta25
@goutamgupta25 3 ай бұрын
Well explained 👍
@digitalentertainment4120
@digitalentertainment4120 3 ай бұрын
As always, simple and detailed explanation! Thank you.
@digitalentertainment4120
@digitalentertainment4120 3 ай бұрын
As always, one more excellent video with great explaination. Thank you 🙏
@techonlogic
@techonlogic 3 ай бұрын
Please don't mind me saying FDQN instead of FQDN in the video
@M4nishS
@M4nishS 3 ай бұрын
Please continue terraform series
@gaurav13851
@gaurav13851 3 ай бұрын
Very well explained
@sivas4861
@sivas4861 3 ай бұрын
Good sir Thank you.
@sivas4861
@sivas4861 3 ай бұрын
Hi sir G afternoon when we try to see Github link not available could you please post URL to check the Terraform resources infra.
@sopankumbhare222
@sopankumbhare222 4 ай бұрын
how we can connect sir can you share you are no
@techonlogic
@techonlogic 4 ай бұрын
@@sopankumbhare222 hi You can reach out to me at my email id: [email protected]
@jeenieb6255
@jeenieb6255 4 ай бұрын
This video was the best one for me. I could finally wrap my head around this concept clearly. If you could please make more videos (Hindi explanation) on various aspects of Azure Landing zones. Thank you.
@ppkfamtrtn
@ppkfamtrtn 4 ай бұрын
very descriptive and very nicely explained. Thanks a lot for this video
@anchalgosain-ns9mx
@anchalgosain-ns9mx 5 ай бұрын
Very nicely explained ❤
@AadityaDwivedi
@AadityaDwivedi 6 ай бұрын
Really well explained 🎉
@divyagupta4308
@divyagupta4308 6 ай бұрын
Sir i have one doubt as landing zone are of two types platform landing zone and application landing zone and in the platform landing zone we have Identity, management, connectivity and have few resources also inside them so are we suppose to deploy resources inside platform or inside application landing zone?
@techonlogic
@techonlogic 6 ай бұрын
Yes, you are right Application landing zone will have a subscription with separate vnet and will have only application workload, it can be PaaS Or IaaS Similarly for platform landing zone we will have identity, connectivity and management subscription Which can be one Or different for large enterprises and is also recommended by MS
@seeemant
@seeemant 6 ай бұрын
Kindly share github link if code is there. Thanks
@sagarp7610
@sagarp7610 6 ай бұрын
Could you share that excel sheet on google drive . I am trying similar approach for my demo project
@abhishekknegi007
@abhishekknegi007 7 ай бұрын
Thanks Sourabh !!
@abhishekknegi007
@abhishekknegi007 7 ай бұрын
Thanks !! Sourabh bhai please keep making such interesting videos
@abhishekknegi007
@abhishekknegi007 7 ай бұрын
thanks
@abhisheksreedhar6568
@abhisheksreedhar6568 7 ай бұрын
Can we use application gateway in this type of architecture
@techonlogic
@techonlogic 7 ай бұрын
Yes we can, As per our architecture we can place them in hub vnet or spoke vnet as per our requirement
@techonlogic
@techonlogic 7 ай бұрын
It can be used for both, public and private traffic.
@venkateshbonnada2921
@venkateshbonnada2921 8 ай бұрын
Nice explanation. Keep up the good job. Will look for more content from you
@vijaysingh-rz6cu
@vijaysingh-rz6cu 8 ай бұрын
brother i have gone through many channels but yur explaination is dome good ..pls continue making more video.
@sharatbhaskar527
@sharatbhaskar527 8 ай бұрын
can you please provide this sample spreadsheet
@QuickBites_in
@QuickBites_in 8 ай бұрын
Well explained 😊just clear whole concept for monitoring and how it links with each functions.
@rwj_dk
@rwj_dk 9 ай бұрын
I've set this up to collect Windows Event viewer logs from an Azure Windows VM... I set it to send Error and Warnings, but for some reason I only receive the warning, not the errors from the machine despite there being some... Then I set up another machine in same DCR and that receive both Errors and Warning, but the first still refuse to snd errors... Any clue what could could be wrong or how to troubleshoot?
@techonlogic
@techonlogic 9 ай бұрын
For any specific vm issue It is always the agent which is at fault Try reinstalling the agent or check the version
@AmitVerma-cv5fy
@AmitVerma-cv5fy 9 ай бұрын
Explained so well.. Crystal clear
@akhilendragautam5921
@akhilendragautam5921 9 ай бұрын
Thanks for explaining Hub & Spoke
@akhilendragautam5921
@akhilendragautam5921 9 ай бұрын
nice explaination
@DinosKonstantinou
@DinosKonstantinou 10 ай бұрын
Thanks for the content. Friendly suggestion: buy a proper microphone!
@tribhuwantiwari2386
@tribhuwantiwari2386 10 ай бұрын
Good description 👍
@godharan3510
@godharan3510 10 ай бұрын
Good video, Why didn't you used Firewall instead of NSG?
@techonlogic
@techonlogic 10 ай бұрын
Firewall is also there in Hub vnet I did not show it and only showed NSG Also firewall is extra cost for every rule and execution NSG are free and can work at individual subnet That means the traffic did not even left spoke vnet to reach hub firewall n is blocked at subnet or at nic level itself
@godharan3510
@godharan3510 10 ай бұрын
​@@techonlogic You have used several NSGs, which is hassled to manage. On the other hand, you have to use unique public IPs in every VM for RDP instead you have used Firewall DNAT rules to translate the single Firewall Public IPs to all VMs.
@techonlogic
@techonlogic 10 ай бұрын
@@godharan3510 Public ip to Vm’s are never advised. For any paas service we usually have waf For public facing vm it usually has to be either behind app gateway or a front door which will have its own firewall and will not use Azure Firewall. In cases were we are keeping vm behind firewalls and using firewall Nat as you said , that is also an option which we can design and implement. But again that is the decision taken by the architect with the he app owner for specific requirements
@happyshoppi1036
@happyshoppi1036 11 ай бұрын
Very nicely Explained the concept of Hub and Spoke
@qammarabbas6763
@qammarabbas6763 11 ай бұрын
can you please provide the github repository for the terraform please .
@qammarabbas6763
@qammarabbas6763 11 ай бұрын
Great Work . Thanks for such to the point Logical Videos . Can you please provide a github repository for these terraform files .
@SanjayYadav-xj6nr
@SanjayYadav-xj6nr Жыл бұрын
Nice
@abhishekknegi007
@abhishekknegi007 Жыл бұрын
Thanks very informative such content not available in hindi
@abhishekknegi007
@abhishekknegi007 Жыл бұрын
Keep doing it
@abhishekknegi007
@abhishekknegi007 Жыл бұрын
Awesome sir