update
This commit is contained in:
3
cloud/azure/azure
Normal file
3
cloud/azure/azure
Normal file
@ -0,0 +1,3 @@
|
||||
# Microsoft Azure
|
||||
|
||||
Microsoft Azure is
|
33
cloud/azure/azure-cli
Normal file
33
cloud/azure/azure-cli
Normal file
@ -0,0 +1,33 @@
|
||||
# Microsoft Azure CLI
|
||||
|
||||
## Install Azure CLI
|
||||
|
||||
### Install on Windows
|
||||
|
||||
Download and install the [Azure CLI](https://aka.ms/installazurecliwindows) for Windows.
|
||||
|
||||
### Install on macOS
|
||||
|
||||
Run the following commands to install the Azure CLI via Homebrew.
|
||||
|
||||
```bash
|
||||
brew update && brew install azure-cli
|
||||
```
|
||||
|
||||
### Install on Linux
|
||||
|
||||
Run the following commands to install the Azure CLI via the package manager for your Linux distribution.
|
||||
|
||||
```bash
|
||||
curl -sL https://aka.ms/InstallAzureCLIDeb | sudo bash
|
||||
```
|
||||
|
||||
## Login to Azure
|
||||
|
||||
Run the following command to login to Azure.
|
||||
|
||||
```bash
|
||||
az login
|
||||
```
|
||||
|
||||
The command will open a browser window and prompt you to login to Azure. Once you have logged in, you can close the browser window and return to the command line.
|
61
cloud/civo.md
Normal file
61
cloud/civo.md
Normal file
@ -0,0 +1,61 @@
|
||||
# Civo
|
||||
|
||||
Homepage: [Civo Kubernetes - Fast, Simple, Managed Kubernetes Service - Civo.com](https://www.civo.com/)
|
||||
Documentation: [Documentation - Civo.com](https://www.civo.com/docs)
|
||||
Terraform Registry: [Terraform Registry](https://registry.terraform.io/providers/civo/civo/latest)
|
||||
|
||||
---
|
||||
|
||||
## Civo CLI
|
||||
Civo CLI is a tool to manage your Civo account from the terminal. Civo CLI is built with Go and distributed as binary files, available for multiple operating systems and downloadable from https://github.com/civo/cli/releases.
|
||||
|
||||
### Authentication
|
||||
In order to use the command-line tool, you will need to authenticate yourself to the Civo API using a special key. You can find an automatically-generated API key or regenerate a new key at [https://www.civo.com/api](https://www.civo.com/api).
|
||||
|
||||
### Create Instances
|
||||
You can create an instance by running `civo instance create` with a hostname parameter, as well as any options you provide.
|
||||
|
||||
**Example:**
|
||||
```
|
||||
civo instance create --hostname=<your-hostname> --sshkey=<your-ssh-key-name> --initialuser=xcad --size=g3.xsmall --diskimage=921fcb64-8abf-4a51-8823-027d9d75c1d4
|
||||
```
|
||||
|
||||
**Parameters:**
|
||||
PARAMETER | LONG VERSION | DESCRIPTION
|
||||
---|---|---
|
||||
`-t` | `--diskimage` | the instance's disk image (from 'civo diskimage ls' command)
|
||||
`-l` | `--firewall` | the instance's firewall you can use the Name or the ID
|
||||
`-l` | `--firewall` | the instance's firewall you can use the Name or the ID
|
||||
`-s` | `--hostname` | the instance's hostname
|
||||
`-u` | `--initialuser` | the instance's initial user
|
||||
`-r` | `--network` | the instance's network you can use the Name or the ID
|
||||
`-p` | `--publicip` | This should be either "none" or "create" (default "create")
|
||||
`-i` | `--size` | the instance's size (from 'civo instance size' command)
|
||||
`-k` | `--sshkey` | the instance's ssh key you can use the Name or the ID
|
||||
`-g` | `--tags` | the instance's tags
|
||||
`-w` | `--wait` | wait until the instance's is ready
|
||||
|
||||
**Instance Sizes:**
|
||||
ID|SIZE|TYPE|CPU|MEMORY|SSD
|
||||
---|---|---|---|---|---
|
||||
g3.xsmall|ExtraSmall|Instance|1|1024|25
|
||||
g3.small|Small|Instance|1|2048|25
|
||||
g3.medium|Medium|Instance|2|4096|50
|
||||
g3.large|Large|Instance|4|8192|100
|
||||
g3.xlarge|ExtraLarge|Instance|6|16384|150
|
||||
g3.2xlarge|2XLarge|Instance|8|32768|200
|
||||
g3.k3s.xsmall|ExtraSmall|Kubernetes|1|1024|15
|
||||
g3.k3s.small|Small|Kubernetes|1|2048|15
|
||||
g3.k3s.medium|Medium|Kubernetes|2|4096|15
|
||||
g3.k3s.large|Large|Kubernetes|4|8192|15
|
||||
g3.k3s.xlarge|ExtraLarge|Kubernetes|6|16384|15
|
||||
g3.k3s.2xlarge|2XLarge|Kubernetes|8|32768|15
|
||||
|
||||
**Diskimages:**
|
||||
ID | NAME
|
||||
---|---
|
||||
`9ffb043e-37d8-4b71-80ed-81227564944f` | centos-7
|
||||
`e1a83a29-d35b-433b-b1cb-4baade48c81a` | debian-10
|
||||
`67a75d21-3726-4152-8fc9-dcdb51b6e39e` | debian-9
|
||||
`880d37ca-372e-4d33-91bd-3122cf56614b` | ubuntu-bionic
|
||||
`921fcb64-8abf-4a51-8823-027d9d75c1d4` | ubuntu-focal
|
2
cloud/digitalocean.md
Normal file
2
cloud/digitalocean.md
Normal file
@ -0,0 +1,2 @@
|
||||
# DigitalOcean
|
||||
|
56
cloud/microsoft365/microsoft365-email-protection.md
Normal file
56
cloud/microsoft365/microsoft365-email-protection.md
Normal file
@ -0,0 +1,56 @@
|
||||
# Microsoft365 EMail Protection
|
||||
|
||||
Email authentication (also known as email validation) is a group of standards that tries to stop email messages from forged senders (also known as spoofing). Microsoft 365 uses the following standards to verify inbound email:
|
||||
|
||||
- SPF (Sender Policy Framework)
|
||||
- DKIM (DomainKeys Identified Mail)
|
||||
- DMARC (Domain-based Message Authentication, Reporting, and Conformance)
|
||||
|
||||
## Prerequisites
|
||||
|
||||
WIP
|
||||
|
||||
## Set up SPF to help prevent spoofing
|
||||
|
||||
WIP
|
||||
|
||||
## Use DKIM to validate outbound email sent from your custom domain
|
||||
|
||||
### Publish two CNAME records for your custom domain in DNS
|
||||
|
||||
For each domain for which you want to add a DKIM signature in DNS, you need to publish two CNAME records.
|
||||
|
||||
```txt
|
||||
Name: selector1._domainkey
|
||||
Target: selector1-yourdomain-com._domainkey.yourdomaincom.onmicrosoft.com
|
||||
TTL: 3600
|
||||
|
||||
Name: selector2._domainkey
|
||||
Target: selector2-yourdomain-com._domainkey.yourdomaincom.onmicrosoft.com
|
||||
TTL: 3600
|
||||
```
|
||||
|
||||
### To enable DKIM signing for your custom domain in the Microsoft 365 Defender portal
|
||||
|
||||
Once you have published the CNAME records in DNS, you are ready to enable DKIM signing through Microsoft 365. You can do this either through the Microsoft 365 admin center or by using PowerShell.
|
||||
|
||||
1. In the Microsoft 365 Defender portal at [https://security.microsoft.com](https://security.microsoft.com), go to Email & Collaboration > Policies & Rules > Threat policies > Email Authentication Settings in the Rules section >DKIM. To go directly to the DKIM page, use [https://security.microsoft.com/dkimv2](https://security.microsoft.com/dkimv2).
|
||||
2. On the DKIM page, select the domain by clicking on the name.
|
||||
3. In the details flyout that appears, change the Sign messages for this domain with DKIM signatures setting to Enabled (Toggle on.)
|
||||
When you're finished, click Rotate DKIM keys.
|
||||
4. Repeat these step for each custom domain.
|
||||
5. If you are configuring DKIM for the first time and see the error 'No DKIM keys saved for this domain' you will have to use Windows PowerShell to enable DKIM signing as explained in the next step.
|
||||
|
||||
#### (Optional) To enable DKIM signing for your custom domain by using PowerShell
|
||||
|
||||
1. Connect to Exchange Online PowerShell.
|
||||
2. Use the following syntax:
|
||||
`Set-DkimSigningConfig -Identity your-domain -Enabled $true`
|
||||
your-domain is the name of the custom domain that you want to enable DKIM signing for.
|
||||
This example enables DKIM signing for the domain contoso.com:
|
||||
`Set-DkimSigningConfig -Identity contoso.com -Enabled $true`
|
||||
|
||||
### To Confirm DKIM signing is configured properly for Microsoft 365
|
||||
|
||||
WIP
|
||||
|
134
cloud/what-is-cloud-computing.md
Normal file
134
cloud/what-is-cloud-computing.md
Normal file
@ -0,0 +1,134 @@
|
||||
# What is Cloud-Computing?
|
||||
|
||||
- A model that enables businesses to acquire resources for their IT infrastructure needs on demand
|
||||
- Cloud resources: Servers, storage, databases, netwroks, software applications, and so on
|
||||
- Ensures the instantaneous availability of resources with lower cost and operational overhead
|
||||
|
||||
|
||||
## Benefits
|
||||
|
||||
1. Cost Savings
|
||||
- Helps you reduce capital investment
|
||||
- Reduces hardare and software procurement, which further eliminates the need for power and cooling systems
|
||||
- Provides cloud services on demand and you are only charged when you use the service
|
||||
2. Data Loss Prevention
|
||||
- Cloud computing allows you to store your organizations' valuable data in the cloud rather your own data center storage hardware
|
||||
- The cloud provider's data storage solutions typically offer better access, redundancy, and availability than enterprise data centers
|
||||
- These solutions help prevent data loss through malfunction, viruses, user errors, or theft
|
||||
3. Scalability
|
||||
- Cloud computing enables you to increase or decrease IT infra resources according to your business needs
|
||||
- Both manual and automatic scaling options are available with most cloud providers
|
||||
4. Flexibility
|
||||
- IT organiztions traditionally focus on various responsibilities, from procuring, hosting, and maintaining IT infra to custumer support and security
|
||||
- Because these services are made available as managed services by the cloud provider, organizations can focus on their actual business and not IT management issues
|
||||
5. Security
|
||||
- Cloud providers offer data protection services like data encryption and policy-based user management, making cloud security equivalent to conventional systems
|
||||
6. Data Analytics
|
||||
- Cloud computing technology generally includes analytics and reporting, which helps track usage
|
||||
- This feature allows you to indentify areas of improvement, meet your business goals, and increase organizational efficiency
|
||||
7. Collaboration
|
||||
- Cloud computing allows users from different geographic locations to work as a team and collaborate easily and effectively
|
||||
- This speeds delivery of applications to market
|
||||
8. Data Recovery
|
||||
- Cloud computing provides features and technologies that help companies recover data lost during natural disasters, power outages, and other unforeseen emergencies.
|
||||
9. Mobile Access
|
||||
- Cloud applications can provide mobile access to corporate resources
|
||||
- This feature is beneficial for employees and customers, allowing them to access a cloud application from anywhere
|
||||
|
||||
## Use Cases
|
||||
|
||||
- Faster Testing and Deployment
|
||||
- Remote Working
|
||||
- Cloud Communication
|
||||
|
||||
|
||||
# What is a Cloud Application?
|
||||
|
||||
A cloud application is a software program that runs in the cloud and is accessed remotely over the network.
|
||||
It has all the functionality of a non cloud based application with the added advantage of being delivered over the network.
|
||||
|
||||
# Cloud Economics
|
||||
|
||||
Cloud computing reduces capital expenditures ( CapEx ) by eliminating the need to run and maintain your own infrastructure
|
||||
Your costs shift to operating expenses ( OpEx ), which are generally lower as you only pay for the resources you consume
|
||||
# Operational Efficiencies
|
||||
|
||||
- Reduces Capital Expenses
|
||||
- Reduces Staffing Costs
|
||||
- Improves Productivity
|
||||
|
||||
# What is a Distributed System?
|
||||
|
||||
A distriuted computing system consists of multiple independent software components. These independent software components are located on different systems that communicate in such a way that they appear as a single system to the end user
|
||||
Note - Cloud computing is based on the distributed systems model
|
||||
|
||||
### Types of Distributed Systems
|
||||
1. Peer-to-Peer -> in the peer-to-peer architectural model, responsibilities are uniformly distributed among machines in the system.
|
||||
2. Client-Server -> In the client-server model, data on the server is accessed by clients.
|
||||
3. Three-tier -> The three-tier architectural model enables information about the client to be stored in the middle tier.
|
||||
4. N-tier -> The n-tier architecture allows an application or server to forward requests to additional enterprise services on the network.
|
||||
|
||||
# Centralized v/s Distributed Systems
|
||||
|
||||
|
||||
|
||||
# Workloads
|
||||
|
||||
- The amount of work allocated to a defined computing task at any given time
|
||||
- An isolated computing task that is executed indepenedently without any support from external programs or applications
|
||||
|
||||
### Edge Computing :
|
||||
|
||||
- Is a distributed computing model that brings compute and storage workloads closer to the user
|
||||
- Decreases latency and saves bandwidth
|
||||
- Processes information close to the edge and decentralizes a network
|
||||
|
||||
### Workloads in distributed systems :
|
||||
|
||||
- Are distributed among the available IT resources based on the utilization of each resource
|
||||
- Uses an algorithm that consumes runtime logic and distributes the workload among the available IT resouces evenly
|
||||
|
||||
|
||||
# Bare Metal Server
|
||||
|
||||
- A physical server assigned to a single tenant
|
||||
- Can be modified based on the need for performance and security
|
||||
- Isolates resources from other tenants and provides security to your business
|
||||
- Can be configured for different cloud setups
|
||||
|
||||
|
||||
|
||||
# Cloud Implementations
|
||||
|
||||
# Types of Cloud
|
||||
## Public Clouds
|
||||
|
||||
- Public Clouds are environments where network infra and resources are made accessible to the public
|
||||
- Resources are partitioned and distributed amongst multiple customers or tenants
|
||||
|
||||
## Private Clouds
|
||||
|
||||
- Private Clouds environments are privately owned and hosted by an enterprise.
|
||||
- Resources are genrally made accessible to a private organization and their customers and partners
|
||||
- Managed private clouds are deployed and fully managed by a third-party, reducing the IT staffing needs for the enterprise
|
||||
- Dedicated private clouds are hosted on a public or private cloud to server a particular department within an enterprise
|
||||
|
||||
## Hybrid Clouds
|
||||
|
||||
- Hybrid Clouds are cloud environments that appear as a single cloud although they are built from multiple clouds ( connected through LANs, WANs, VPNs and/or APIs )
|
||||
- Offer flexibilty in deployment options by enabling workloads to move between private and public clouds based on computing needs
|
||||
|
||||
## Multi Clouds
|
||||
|
||||
- Multiclouds are cloud envirenments that offer more than one cloud service from more than one public cloud service provider
|
||||
- Resources are deployed accross different cloud availabilty zones and regions
|
||||
- All Hybrid Clouds are Multi Clouds
|
||||
|
||||
# Top Public Cloud Providers
|
||||
|
||||
## Microsoft Azure
|
||||
## Amazon Web Services
|
||||
## Google Cloud
|
||||
## Others Public Cloud Providers
|
||||
## Cloud Connectors
|
||||
|
Reference in New Issue
Block a user