History of the deployment models (Azure)

#Azure originally provided only the classic deployment model. In this model, each resource existed independently; there was no way to group related resources together. Instead, you had to manually track which resources made up your solution or application, and remember to manage them in a coordinated approach. To deploy a solution, you had to either create each resource individually through the portal or create a script that deployed all the resources in the correct order. To delete a solution, you had to delete each resource individually. You could not easily apply and update access control policies for related resources. Finally, you could not apply tags to resources to label them with terms that help you monitor your resources and manage billing.

In 2014, Azure introduced Resource Manager, which added the concept of a resource group. A resource group is a container for resources that share a common lifecycle. The Resource Manager deployment model provides several benefits:

  • You can deploy, manage, and monitor all the services for your solution as a group, rather than handling these services individually.
  • You can repeatedly deploy your solution throughout its lifecycle and have confidence your resources are deployed in a consistent state.
  • You can apply access control to all resources in your resource group, and those policies are automatically applied when new resources are added to the resource group.
  • You can apply tags to resources to logically organize all the resources in your subscription.
  • You can use JavaScript Object Notation (JSON) to define the infrastructure for your solution. The JSON file is known as a Resource Manager template.
  • You can define the dependencies between resources so they are deployed in the correct order.

When Resource Manager was added, all resources were retroactively added to default resource groups. If you create a resource through classic deployment now, the resource is automatically created within a default resource group for that service, even though you did not specify that resource group at deployment. However, just existing within a resource group does not mean that the resource has been converted to the Resource Manager model.

要查看或添加评论,请登录

Mo . ????的更多文章

  • Tips for azure Monitor

    Tips for azure Monitor

    In the ever-evolving landscape of cloud computing, efficient monitoring is the key to maintaining optimal performance…

    2 条评论
  • Monitoring in Azure

    Monitoring in Azure

    If your organization asked you to design a monitoring strategy to cover all of its teIf your organization asked you to…

  • Sustainability and IT

    Sustainability and IT

    Over the past several years, organizations have had to adjust quickly to unprecedented, unpredictable pressures…

  • EU-U.S. data agreement an important milestone for data protection, Microsoft is committed to doing our part

    EU-U.S. data agreement an important milestone for data protection, Microsoft is committed to doing our part

    The newly announced Trans-Atlantic Data Privacy Framework between the EU and U.S.

  • Scrum : the Basics - Part 1

    Scrum : the Basics - Part 1

    the Agile Method Allow teams to self -Organize they will do a much better job working on the design and tests from the…

  • Azure Infra

    Azure Infra

    1-Azure Monitor collects two types of data: metrics and logs. Metrics are numerical values that describe some aspect of…

  • tips on hardening security with Azure security

    tips on hardening security with Azure security

    1-Classifying data that should be encrypted is commonly based on the impact it can have on customers if it is exposed…

    1 条评论
  • Connecting a local FortiGate to an Azure VNet VPN

    Connecting a local FortiGate to an Azure VNet VPN

    This recipe provides a sample configuration of a site-to-site VPN connection from a local FortiGate to an Azure VNet…

  • What is Azure AD Identity Protection?

    What is Azure AD Identity Protection?

    Microsoft claims that 60% of all successful attacks rely on compromised credentials, so extra care needs to be taken to…

  • Planning Azure AD Connect for multi-forest scenarios

    Planning Azure AD Connect for multi-forest scenarios

    more complex organizations it is common to have more than one Active Directory forest on-premises. For example, if an…

社区洞察

其他会员也浏览了