Sir John, I have seen hours and hours of your content by now and have also spent considerable amount of time on videos by other creators. Not to negate others' work but in my humble opinion, you have a special gift when it comes to explaining the concepts. For students and IT professionals looking for training in Azure, you are really doing God's work. Thank you
@NTFAQGuy2 жыл бұрын
That is very kind of you to say, thank for the great complement 🤙🙏
@mauriciozaragoza37093 жыл бұрын
Thank you very much for the video John. As I always say: You are saving us to google/discard/re-google/find/read/understand/re-read a lot of documents. The explanation is great all the times. Thanks for your videos. I lost the count on how many times I am grateful to find one of your materials when I am in a struggle. Keep the good work please !
@NTFAQGuy3 жыл бұрын
Thank you, glad it’s useful
@allthingsdata2 жыл бұрын
As always, so good. Just nicely summarizes the most important points rather than me trying to connect the many dots from the docs and being confused how it fits together. Thanks!
@vchandm233 жыл бұрын
Finally, I understood the fundamental difference between Service Endpoint vs Private Endpoint. My goodness, the best explantion ever !
@NTFAQGuy3 жыл бұрын
Thanks
@bcchagas2 жыл бұрын
It very quickly became my main source of knowledge for Azure. Wish I've known the channel before. Thanks for another great video. Really appreciated. It's not easy to organize and explain so much in so little time.
@NTFAQGuy2 жыл бұрын
Thank you 🙏
@anukaw18193 жыл бұрын
Thanks John. I was under the impression that applying an NSG at Subnet level and also applying a NSG at VM level is going to offer double protection. thanks for the clarification 😃
@NTFAQGuy3 жыл бұрын
Nope :)
@anuraggupta65563 жыл бұрын
You are Superman of Azure ...Your every video is just perfect and best available in youtube . Concepts explained are so crystal clear that you dont need to fetch anywhere else for doubts..
@NTFAQGuy3 жыл бұрын
That’s very kind, thank you
@NdamuleloNemakh2 жыл бұрын
You are making it enjoyable to learn Azure, thanks!
@meatycash78192 жыл бұрын
Thanks so much for these clear and well explained videos. So many others and even the MS docs I find speak in riddles adding to confusion, watching your videos gives me clarity and peace of mind.
@NTFAQGuy2 жыл бұрын
Glad I can help.
@sevensolutions77 Жыл бұрын
You sir are so much better than every other Azure expert you need to pay for. Your videos help me a lot. ❤👍
@NTFAQGuy Жыл бұрын
Wow, thanks
@johnjacob694 Жыл бұрын
Dude that was the best distilled explanation of all that verbose MSFT documentation. Thank you so much!!! I'm working on a project designing an Azure architecture with subnets. It's good to know that PaaS services don't require a protected subnet if we can use private links, if I'm understanding right.
@AndyParka4 жыл бұрын
Mate you video deserves more views and likes. You are clear, concise and the most valuable source of Azure knowledge online. Keep up the excellent work!
@NTFAQGuy4 жыл бұрын
Just takes time :) appreciate the kind feedback. Stay safe.
@edemfromeden54322 жыл бұрын
John your content == pure gold ! Thanks a lot !
@philipvandenheever208410 ай бұрын
You have really explained this complex topic well. Hats off Bud, Chat-GPT ain't no threat to you!
@WhyM0013Y5 ай бұрын
I've never been happier in my life to have found someone, i felt stuck before, i dont know how you get it through so well but you do. Thanks alot John absolute life saver
@harvestingdata3 жыл бұрын
In-depth explanation. Awesome. Thank you John.
@NTFAQGuy3 жыл бұрын
Welcome, thanks for watching
@MrYuk07093 жыл бұрын
Awesome John! Indeed you completed my understanding of the Networking and cleared my doubt from the last video. You are one of my best Mentor in Azure, really appreciate.
@NTFAQGuy3 жыл бұрын
Welcome
@saiharsha35413 жыл бұрын
Couldn't find a better explanation other than this. Thanks for the great content!
@NTFAQGuy3 жыл бұрын
Very welcome
@KelvinGalabuzi4 жыл бұрын
This is a very good video John. Thanks for keeping us up-to-speed with Azure
@NTFAQGuy4 жыл бұрын
My pleasure. Thanks for watching
@monsterpuss4 жыл бұрын
Loving that fact that you're now surfacing this sort of stuff on KZbin - I've long followed your material on PluralSight and have found it very valuable in the past. Not sire if you're looking for suggestions on more things to cover, but here are a couple from me: (a) Could you shed a bit more light on the various ExpressRoute Peering options (Microsoft Peering vs Private Peering) as this also seems to come in to play when it comes to consumng PaaS services in a hybrid environment. (b) Some pices on Azure Firewall/Firewall Manager would also be helpful!
@NTFAQGuy4 жыл бұрын
Thanks. I have an expressroute deep dive already. Not looking to do anything beyond that on expressroute.
@allthebeesaredead1884 жыл бұрын
So good. Great clarity. I'm using service endpoints for an AKS subnet and an Azure MySQL dB but I didn't know about service endpoint policies, so that was really useful
@NTFAQGuy4 жыл бұрын
Awesome, today the policies are focused on storage but who knows over time :-)
@markkuijper18024 жыл бұрын
Very good video John. I though I knew everything about Azure networking. I was wrong... Don't understand your statement for using Service Endpoint policies for data filtration (limit data export) though. When I have a Service Endpoint defined for storage in region A and a policy for account SA01 I can still connect through the Internet to storage in region B, C, D and to non Azure storage (dropbox, box, etc.). Can't I ? So basically I think you should do data filtration / monitoring through UDR's to Azure Firewall and there log and control whatever goes out. Azure Firewall is currently very limited in this area though because you cannot specify tags like "block download sites", "block adult sites", "block etc." (category based). You either have to use an NVA for this (Fortigate, Checkpoint, Barracuda, etc.) or do this as part of your external DNS lookup system (OpenDNS for example). And then you still have PAAS platforms (webservices for, Azure Functions, etc.) that get data and communicate directly to the Internet without going through your Azure Firewall / NVA / datamonitoring solution and copy corporate data to wherever they like. So I think the topic of datafiltration / monitoring, i.e. data leakage, is a far more complicated topic than just setting a Service Endpoint Policy....
@NTFAQGuy4 жыл бұрын
Not saying it’s complete story but that is goal of policies to help there. Certainly for complete story there are more parts but my goal was to talk about what the native components in azure do.
@zhiliaev3 жыл бұрын
Brilliant video as others! Thank you! Do you have separate video for NVA and Azure Firewall?
@NTFAQGuy3 жыл бұрын
Glad you like the video, thanks! Any videos would be searchable on the site. Always adding new stuff.
@markpotter87664 жыл бұрын
Another great video - thanks John.
@NTFAQGuy4 жыл бұрын
Thanks, glad you liked it.
@roger-taylor4 жыл бұрын
Thanks John. Really useful overview
@NTFAQGuy4 жыл бұрын
Glad you enjoyed it
@P88DAL4 жыл бұрын
Another great video, John.
@NTFAQGuy4 жыл бұрын
Glad you enjoyed it!
@RafalKostrzynski3 жыл бұрын
Great content. Many thanks John.
@NTFAQGuy3 жыл бұрын
Very welcome
@Deepak97284 жыл бұрын
Thanks John for this excellent video.
@NTFAQGuy4 жыл бұрын
Glad it was useful.
@verdaguer153 жыл бұрын
Thanks as always for such a useful video!!
@NTFAQGuy3 жыл бұрын
Glad it was helpful!
@dosto-evsky4 жыл бұрын
Awesome, thank you Sir John, very informative as usual, clears a lot of key networking concepts in Azure, a lot of info that falls into place and easy enough to digest with simple explanation. Cheers.
@NTFAQGuy4 жыл бұрын
Glad was useful.
@spondichy4 жыл бұрын
Extremely useful video! Thank you for sharing your knowledge and very clear explanations.
@NTFAQGuy4 жыл бұрын
My pleasure.
@JeffGoodwins4 жыл бұрын
Great video, clear and concise as always. Thanks!
@NTFAQGuy4 жыл бұрын
Glad you liked it! Appreciate the feedback.
@shri00577 Жыл бұрын
thanks for one more indepth session
@rahulchoudhury7968 Жыл бұрын
Thank you for the explanation.
@RohitJadhav-ik8gt3 жыл бұрын
Very well explained 👍
@NTFAQGuy3 жыл бұрын
Thanks
@moizkamran60814 жыл бұрын
Great Video John!
@NTFAQGuy4 жыл бұрын
Thanks!
@eduardomdossantos1394 жыл бұрын
Great video as always!
@NTFAQGuy4 жыл бұрын
Glad you enjoyed!
@markarnold36304 жыл бұрын
Outstanding. Helps to see to see how it all ties together. Question: is private link generally preferred as a default security choice?
@NTFAQGuy4 жыл бұрын
If a company wants to eliminate public facing then definitely yes. It is the most locked down.
@TimHoekstra3 жыл бұрын
Great video. I'm at around 27:52. What is not clear to me yet is how do I then lock the sql database down from any access from the internet or bad actors within azure? What are my options? I might have some different rules in mind between the service inside the subnet with the nsg assigned to it and the sql database. Consider peering and on-premise to be N/A. One other thing, I think the answer is yes to this question but i'll ask it anyway (be my rubber ducky). If I apply service endpoint policies does that also prevent me from connecting to anything that is not specified? Think the app is using a connection string to storage that is not inside the subscription or the policies. So if we want to connect to that we would need to specify it but that could mean possible data exfiltration?
@NTFAQGuy3 жыл бұрын
to lock down the database you use things like the service endpoints or private endpoints as I talked about. if you want to stop exfiltration for storage thats storage endpoint policies.
@IlkinJamalli3 жыл бұрын
AMAZING, as usual!
@NTFAQGuy3 жыл бұрын
Thank you! Cheers!
@gauravsharma82203 жыл бұрын
You are great again
@amglover43614 жыл бұрын
As always, great video John. Regarding applying a Service Endpoint Policy to a subnet which stops VMs in that subnet from accessing Storage Account "02", surely you could do that without such a Policy simply by turning on the firewall on SA 02 and then not allowing access from that subnet?
@NTFAQGuy4 жыл бұрын
Yes but the point is data exhilaration. That would only stop to sa02 but what if the user created sa03. Using policy you are saying that subnet can only get to specific storage accounts .
@jaylee39413 жыл бұрын
Brilliant as always! Pity 95% of viewers can't be bothered to hit like!
@NTFAQGuy3 жыл бұрын
Thanks! Appreciated.
@unluckygame5455 Жыл бұрын
Why do you say (on 0:08) that Storage Account is PaaS. Doesn't it falls under IaaS?
@NTFAQGuy Жыл бұрын
No since you’re not responsible for any os etc. it provides the file service for you to leverage
@sid00000093 жыл бұрын
thanks John, quick one....does the Service End point overrides the NSG outbound rule?
@NTFAQGuy3 жыл бұрын
ues service tags to allow with NSGs if limit outbound.
@sid00000093 жыл бұрын
@@NTFAQGuy : Suppose I have set my NSG rule to block my access to PASS SQL from a Vnet, however I have added a Service End point access. In such a case would my Service End Point make the access possible or NSG would have the final say?
@NTFAQGuy3 жыл бұрын
@@sid0000009 NSG would block
@markadam15064 жыл бұрын
Another great video! may be one on DNS for hybrid environments with an on-prem AD Integrated DNS?
@NTFAQGuy4 жыл бұрын
I did a video about AD in Azure previously which included DNS considerations. I think that would cover this topic pretty much. Open to any gaps you think is there. Thanks.
@markadam15064 жыл бұрын
John Savill thank you, I’ll take look
@pallabkolkata4 жыл бұрын
@John Savill So Service Endpoint you said that it is at a Subnet level and you get a direct connection to the Storage Account using a Service Endpoint. So i guess Service Endpoint can act as a security boundary. So what about Private Link, can i use Service Endpoint with Private Link? I mean how they are both different then?
@NTFAQGuy4 жыл бұрын
Service endpoint provides an optimized path and knowledge of the subnet so you can then on the PaaS service restrict to just that subnet. Private link is an alternate approach where the service has an actual IP in the subnet which goes to the service. You would use one or the other. The difference is private link removes the need for the PaaS service to have any public facing endpoint and instead is an interface in the subnet. Private link you can restrict to just subnet with a private endpoint and subnet could be locked down via NSG to block anything without private endpoint.
@pallabkolkata4 жыл бұрын
@@NTFAQGuy Private Link is the better option then as there is no question of Public IP and every traffic is within the Azure Backbone itself. No wonder Private Link is gaining so much popularity with Enterprises because of this huge security boost
@sid00000094 жыл бұрын
great video. Although I understood previously that public IP ( not private as you stated in the video ) was used in Service Endpoints to allow traffic and not Private. For making use of Virtual Ntwork Private IP we use Private endpoint? Can you please help clarify.. thanks
@NTFAQGuy4 жыл бұрын
No I said the public service now sees the source as a private ip not that you access the service AS a private IP. You are still using public ip of target but it now is routed differently using magic in the switch :)
@sid00000094 жыл бұрын
@@NTFAQGuy Clear thank you!
@sony92483 жыл бұрын
Really appreciate your way of explaining each things in detail..just one query what about communication between PaaS services..it won't use private endpoint..like if my SQL analysis service wants to communicate storage blob..and when I deny public access to one of my diagnostic storage account the vm stop sending diagnostic logs to storage..
@NTFAQGuy3 жыл бұрын
Paas don’t live in vnets so won’t generally use private endpoints of others unless it has its own specific functionality like a managed vnet etc
@The24hrStruggle4 жыл бұрын
Hi John, Do you have any links or info surrounding DHCP on Azure. When key production service of networking is DHCP and if you are a business of multi on-prem offices, how would you move DHCP to serve PC and Data from an Azure hosted Domain Controller?
@NTFAQGuy4 жыл бұрын
you can't. azure has to be DHCP service for vnet.
@The24hrStruggle4 жыл бұрын
John Savill thanks for replying John. New to channel. Content so far has been super.
@andrewgarbutt16343 жыл бұрын
Excellent
@paddee2k3 жыл бұрын
If you want to learn Azure, you go to John Savill!!! ;-) Great content as always, thank you very much!
@NTFAQGuy3 жыл бұрын
Very kind, thank you!
@johnmoore19707 ай бұрын
Amasingggggggggggggggggg!!!!!
@sid00000093 жыл бұрын
also if we have a service end point, does it lock the PASS service to the given Vnet and we dont need Firewall setting to be changed? in Private End point its evident we dont require the Firewall rule as it attains a private IP from the Vnet but not clear on the service end point... thank you!
@NTFAQGuy3 жыл бұрын
makes it known to the firewall so you can then lock it down. you have to make that config.
@sid00000093 жыл бұрын
Hello, If I enable a service end point from the Subnet to example a SQL Server ( Azure Paas), do I still have to add NSG rule in outbound 443 in Subnet to allow me to connect....or that is no longer required as I enabled a Service End point already. Thank you
@NTFAQGuy3 жыл бұрын
By default nsg outbound allows to internet and azure services so no change required. If you lock down then yes you would need outbound rule using service tag of the service you have endpoint for.
@sid00000093 жыл бұрын
@@NTFAQGuy Thanks..so Service End Points are more an alternate routing paths on Azure backbone. So NSGs would be anyways required to filter traffic ( unless allowed by default ).
@NTFAQGuy3 жыл бұрын
@@sid0000009 and make them known to the PaaS firewall as I talk about in the video
@MotoMelb3 жыл бұрын
Awesome .. thanks
@NTFAQGuy3 жыл бұрын
You bet!
@kdineen133 жыл бұрын
Fantastic
@javinn274 жыл бұрын
got it thanks
@NTFAQGuy4 жыл бұрын
great
@SombreSyr4 жыл бұрын
Thank you.
@NTFAQGuy4 жыл бұрын
You're welcome!
@okeychimeh9772 жыл бұрын
Has anyone seen the blockbuster movie "Legend of the Savill", ya'll should check it out