☁️ Azure Cloud Platforms & Infra Services
AKS (Azure Kubernetes Service)
Azure App Gateway vs Application Gateway
Azure Front Door vs Traffic Manager
Azure Virtual Desktop (AVD)
Azure Load Balancer types (Basic vs Standard)
Azure App Services + Deployment Slots
Azure Functions (Triggers, Bindings)
Azure Site Recovery (ASR) + Geo Redundancy
VNet, NSG, UDR, ExpressRoute, Private Endpoints
Azure Bastion, Container Registry, Backup, DNS
🚀 CI/CD & DevOps Pipelines (Azure DevOps)
Classic vs YAML pipelines
Multi-stage pipelines with approvals
Service Connections & Deployment Groups
Blue-Green vs Canary deployment strategy
Feature Flags + Release Gates
Artifact Feeds, Pipeline Templates
GitHub Actions vs Azure Pipelines
📦 Infrastructure as Code (IaC)
Terraform modules, remote backend, workspaces
Bicep vs ARM templates
Azure CLI vs PowerShell
Policy as Code (Terraform + Azure Policy)
Azure Blueprints + Template Specs
📊 Monitoring & Observability
Dynatrace integrations & synthetic monitors
KQL (Kusto Query Language)
Azure Monitor vs Log Analytics vs App Insights
Heartbeat alerts, Action Groups, Service Health
Custom telemetry + Workbook dashboards
Azure Managed Grafana
⚙️ Automation & Scripting
PowerShell Functions, Modules, Schedulers
Bash/CLI scripting for automation
Runbooks, Logic Apps, Microsoft Flow
REST API Integration (Azure ARM endpoints)
Managed Identity in automation
🔐 Security, Compliance & Governance
Azure Key Vault access policies + RBAC
Defender for Cloud use cases
Just-In-Time VM Access
Azure Policy (custom + built-in)
Conditional Access + PIM
Secure Score + Audit Logs
🧱 Microservices & Kubernetes Architecture
Helm Chart design + dependencies
Ingress Controllers (Nginx, App Gateway Ingress)
Readiness/Liveness probes
AKS rolling updates, node pools
Dapr POC design
Secrets injection via Key Vault
Log correlation, TraceID management
0 Comments