0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 3 years have passed since last update.

【AZ-301】Azure Architect Design - 試験対策

Last updated at Posted at 2020-08-21

Azure Learning Path

FAQs

Remote Direct Memory Access (RDMA)
a direct memory access from the memory of one computer into that of another without involving either one's operating system. This permits high-throughput, low-latency networking, which is especially useful in massively parallel computer clusters.

Single Root I/O Virtualization (SR-IOV)
Accelerated Networking enables single root I/O virtualization (SR-IOV) to a VM, greatly improving its networking performance

Azure Disk Encryption
Disks are encrypted by using cryptographic keys that are secured in an Azure Key Vault. You control these cryptographic keys and can audit their use.

Azure SQL

Transparent Data Encryption (TDE)

Transparent data encryption (TDE) helps protect Azure SQL Database, Azure SQL Managed Instance, and Synapse SQL in Azure Synapse Analytics against the threat of malicious offline activity by encrypting data at rest. It performs real-time encryption and decryption of the database, associated backups, and transaction log files at rest without requiring changes to the application

vCore model - Service tiers / Compute tiers

  • Higher compute, memory, IO, and storage limits.
  • Control over the hardware generation to better match compute and memory requirements of the workload.
  • Pricing discounts for Azure Hybrid Benefit (AHB) and Reserved Instance (RI).
  • Greater transparency in the hardware details that power the compute; facilitates planning for migrations from on-premises deployments.

Dynamic data masking

Dynamic data masking limits sensitive data exposure by masking it to non-privileged users.

Dynamic data masking policy

  • SQL users excluded from masking - A set of SQL users or Azure AD identities that get unmasked data in the SQL query results. Users with administrator privileges are always excluded from masking, and see the original data without any mask.
  • Masking rules - A set of rules that define the designated fields to be masked and the masking function that is used. The designated fields can be defined using a database schema name, table name, and column name.
  • Masking functions - A set of methods that control the exposure of data for different scenarios.

Migration ( on-premise -> Azure )

Azure Data Factory

Hybrid data integration service that simplifies ETL at scale

Copy data to and from SQL Server by using Azure Data Factory
https://docs.microsoft.com/ja-jp/azure/data-factory/connector-sql-server

StorSimple Virtual Array

An integrated storage solution that manages storage tasks between an on-premises virtual array running in a hypervisor and Microsoft Azure cloud storage. The virtual array is an efficient, cost-effective, and easily managed file server or iSCSI server solution that eliminates many of the issues and expenses associated with enterprise storage and data protection. The virtual array is particularly well-suited for the storage of infrequently accessed archival data.

Application Insights

How does Application Insights work ?

You install a small instrumentation package (SDK) in your application or enable Application Insights using the Application Insights Agent when supported. The instrumentation monitors your app and directs the telemetry data to an Azure Application Insights Resource using a unique GUID that we refer to as an Instrumentation Key.

image

What does Application Insights monitor ?

  • Request rates, response times, and failure rates
    • Find out which pages are most popular, at what times of day, and where your users are. See which pages perform best. If your response times and failure rates go high when there are more requests, then perhaps you have a resourcing problem.
  • Dependency rates, response times, and failure rates
    • Find out whether external services are slowing you down.
  • Exceptions
    • Analyze the aggregated statistics, or pick specific instances and drill into the stack trace and related requests. Both server and browser exceptions are reported.
  • Page views and load performance
    • reported by your users' browsers.
  • AJAX calls from web pages
    • rates, response times, and failure rates.
  • User and session counts
  • Performance counters from your Windows or Linux server machines, such as CPU, memory, and network usage.
  • Host diagnostics from Docker or Azure.
  • Diagnostic trace logs from your app
    • so that you can correlate trace events with requests.
  • Custom events and metrics that you write yourself in the client or server code, to track business events such as items sold or games won.

Azure Blueprints

Azure Blueprints enables cloud architects and central information technology groups to define a repeatable set of Azure resources that implements and adheres to an organization's standards, patterns, and requirements

Azure Front Door

Azure Front Door enables you to define, manage, and monitor the global routing for your web traffic by optimizing for best performance and instant global failover for high availability. With Front Door, you can transform your global (multi-region) consumer and enterprise applications into robust, high-performance personalized modern applications, APIs, and content that reaches a global audience with Azure.

0
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?