Azure – Azure Service Fabric 7.1 First Refresh Release
The Azure Service Fabric 7.1 first refresh release includes bug fixes, and performance enhancements for standalone, and Azure environments.
Read More for the details.
The Azure Service Fabric 7.1 first refresh release includes bug fixes, and performance enhancements for standalone, and Azure environments.
Read More for the details.
Azure Database for PostgreSQL support for encryption of data at rest using customer-managed keys (data encryption) through Azure Key Vault is now in preview.
Read More for the details.
Azure Databricks is now available in preview to Azure Government customers in the US Gov Virginia and Arizona regions. Azure Databricks provides a fast, easy, and collaborative Apache Spark™-based analytics platform as a fully managed service. It helps you increase your developer productivity, automatically scales with your most demanding workloads, and enables enterprise-grade security that’s easy to use on Azure.
Read More for the details.
The latest update to Azure DevOps Services includes new features for Azure Artifacts, Azure Boards, and Azure Pipelines. Of particular note is a new Azure Artifacts feature that makes it easier to authenticate Azure Artifacts with other popular package managers.
Read More for the details.
Azure Database for MySQL support for encryption of data at rest using customer-managed keys (data encryption) through Azure Key Vault is now in preview.
Read More for the details.
A new API version for Azure Monitor Logs resource provider, 2020-03-01-preview, is now available. This API supports new functionality like customer-managed keys (CMK), bring your own storage (BYOS), along with other capabilities.
Read More for the details.
Azure Data Factory adds new features for ADF pipelines, Synapse pipelines and data flow formats
Read More for the details.
The latest Azure Site Recovery updates provides fixes and download links for Site Recovery components.
Read More for the details.
New features in Azure Shared Image Gallery are now generally available.
You can find the details here: Read More
New preview features now available in Azure Shared Image Gallery.
You can find the details here: Read More
A security vulnerability has been identified in Moby engine components in Azure IoT Edge. (Windows versions aren’t affected.) Get details
and follow instructions to fix the issue in Moby engine version 3.0.12 or later.
You can find the details here: Read More
Deploy M-series, NV v3-series and NV v4-series Azure Virtual Machines on Azure Dedicated Hosts. This will expand the range of workloads you can run on Dedicated Hosts to include memory-intensive and graphics-intensive applications.
You can find the details here: Read More
The new Dd v4-series and Ed v4-series Azure Virtual Machines feature the Intel® Xeon® Platinum 8272CL custom processor. The Dd v4-series and Dds v4 virtual machine (VM) sizes are well suited for applications that benefit from low latency, high-speed local storage (up to 2,400 GiB.) The Edv4-series and Edsv4-series VM sizes are ideal for various memory-intensive enterprise applications and feature up to 504 GiB of RAM, in addition to high-performance local SSD storage (up to 2,400 GiB.)
You can find the details here: Read More
HBv2-series VMs for HPC now available in the West US 2 region.
You can find the details here: Read More
Enforce a minimal transport layer security (TLS) version at the server level that applies to Azure Database for MySQL using the new TLS version setting.
You can find the details here: Read More
Enforce a minimal TLS version at the server level that applies to Azure Database for PostgreSQL using the new TLS version setting.
You can find the details here: Read More
Enforce a minimal TLS version at the server level that applies to Azure Database for MariaDB using the new TLS version setting.
You can find the details here: Read More
Starting with agent version ciprod05262020, Azure Monitor for containers will collect logs (std/stderr) for the containers running on AKS clusters with Windows node pools.
You can find the details here: Read More
Last week I presented how you can create easily Azure DevOps Pipeline on YAML basis. Today I’m gonna show you how you can do this on scheduled way. (you can find the video version end of this post)
I know, several times you need to execute a scripts in every hours or days. Maybe until now you had a dedicated machine, where you did this. But from now you can eliminate that and you can use Azure DevOps Pipeline with time trigger for it.
In my post from last week (HandsOn – Azure Pipelines with YAML), you can read how you can prepare a project on GitHub and Azure DevOps. I made some tiny changes for Today. I mean, I put the code to an Azure DevOps repository. So you can use the guide from last week for preparation. Note: if you have an azure DevOps Repository, there is a fork at point 3 under Step 5. Here you should choose Azure Repos Git option.

The further steps are almost same. When you open the pipeline you can see the code we made last time.

Now we schedule our code from YAML. For this go to our Visual Studio Code where I opened the code after the git clone action. Open our YAML file. Insert the time trigger section to top of the existing YAML file.
schedules:
- cron: "* * * * *"
displayName: Runs every minutes
branches:
include:
- master
- releases/*
exclude:
- releases/ancient/*
always: true
There are three pillars here:
Save this file, then push back to your repository. Here you should know the pipeline will run immediately when you commit the changes to repo. This is the normal behavior here.
Now, let’s check the pipeline scheduling. For this, inside Azure DevOps, navigate to your Organization > your Project > Piplelines > YAML Pipeline. Here click on the three vertical dots to see the additional options and choose the Scheduled runs.

Fantastic….you can see the configured schedulings:

Some minutes later you can see your pipeline runs according to your configured schedule.

I hope you feel this is very useful. Next time we continue the playing with Azure DevOps pipelines.
Take care… 🙂
CloudSteak on Twitter ...
Last week I published an article about the new capabilities of Azure DevOps pipelines (with YAML). As I promised we continue this topic on Today. Although the last week provided documentation contains the most important information, I feel I should show you how it works in the real life. Why? Because the documentation is not the best for that….as usual.
Scenario for today: Create a basic NodeJS project which is stored on GitHub repository. This NodeJS project is a simple script which will be executed by Azure DevOps pipeline via a YAML file.
After this “episiode” you are able to execute automatically any of your existing NodeJs script or solution in Azure DevOps pipeline. This means you will have a CICD-like solution from your existing NodeJS solution. It’s cool, isn’t it?
Additionally, I’ve decided to create a video guide for this article, which helps you to see the whole flow, step-by-step. You can find it below.
As usually the first step to create a private or public repository on GitHub. This is a basic steps and I assume you can do it. 🙂
You can find the content for files here: https://github.com/cloudsteak/YAML-pipeline
When our solution is ready to use, we should push to our newly created GitHub repository. Here there is no any special steps, merely you should commit and push the changes.
Our solution is located on GitHub, so we are almost done. Now we create a project in Azure DevOps where we will create our pipeline. For this you should follow the following steps:








From this you have a Pipeline from a YAML file.
Great, we have a pipeline. To execute this pipeline we have now 2 (two) options:
This is a very simple thing.

We are done with the scope of scenario. 🙂
Last but not least. You can find the video, if you like the video content better:
CloudSteak on Twitter ...