Skip to content

Instantly share code, notes, and snippets.

View staslebedenko's full-sized avatar

Stanislav staslebedenko

View GitHub Profile
<policies>
<inbound>
<base />
<validate-jwt header-name="Authorization" failed-validation-httpcode="401" failed-validation-error-message="Failed.">
<openid-config url="https://demo.identityserver.io/.well-known/openid-configuration" />
<audiences>
<audience>api</audience>
</audiences>
<issuers>
<issuer>https://demo.identityserver.io/</issuer>
location=northeurope
postfix=$RANDOM
groupName=apimAuth$postfix
az group create --name $groupName --location $location
location=northeurope
accountSku=Standard_LRS
accountName=${groupName,,}
echo "accountName = " $accountName
resourceGroup="azureadventcalendar29399"
subscriptionId="03766965-6d6"
actionGroupId="/subscriptions/03766965-6d6/resourceGroups/default-activitylogalerts/providers/microsoft.insights/actionGroups/Admins"
scope='/subscriptions/03766965-6d6/resourceGroups/AzureAdventCalendar29399/providers/Microsoft.Sql/servers/azureadventcalendar29399/databases/azureadventcalendar29399'
desc='Spike detection'
name="SQLServerlessCostAlert"
cpuBilled="total app_cpu_billed > 10000"
az monitor metrics alert create -n $name -g $resourceGroup --scopes $scope --description "Spike detection" \
--condition $cpuBilled --window-size 1h --evaluation-frequency 5m --severity 3 \
resourceGroup="AzureDurableDemo14397"
subscriptionId="03766965-6d6"
actionGroupId="/subscriptions/03766965-6d6/resourceGroups/default-activitylogalerts/providers/microsoft.insights/actionGroups/Admins"
scope='/subscriptions/03766965-6d6/resourceGroups/AzureDurableDemo14397/providers/Microsoft.Web/sites/azuredurabledemo14397'
desc='Spike detection 10 GBsec or 5000 requests over period of 6 hours'
name="ConsumptionCostAlert"
funcExecUnits="total FunctionExecutionUnits > 10000000"
funcExecCount="total FunctionExecutionCount > 5000"
az monitor metrics alert create -n $name -g $resourceGroup --scopes $scope --description "Spike detection 10 GBsec or 5000 requests" \
Login-AzureRmAccount
Select-AzureRmSubscription -TenantId 30593919-4e6a
$probename = "HttpsPassProbe"
$rulename="AppPortLBRuleFor8427"
$groupname="bootcamp2019-fabric-cluster-group"
$frontPort=8427
$backPort=8427
Connect-AzureRmAccount
$vaultname="yourFancyVault"
$certname="SomeCertName"
$certpw="SuperPassword"
$groupname="your-fabric-group"
$clustername = "your-cluster-name"
$ExistingPfxFilePath="C:\certificates\SomeCertName.pfx"
$appcertpwd = ConvertTo-SecureString -String $certpw -AsPlainText -Force
export vaultResourceGroup="bootcamp2019-keyvault-group"
export vaultName="bootcamp2019DemoVault"
export primaryLocation="northeurope"
az group create --name $vaultResourceGroup --location $primaryLocation
az keyvault create --name $vaultName --resource-group $vaultResourceGroup --location $primaryLocation
export clusterResourceGroup="bootcamp2019-fabric-cluster-group"
az group create --name $clusterResourceGroup --location $primaryLocation
@staslebedenko
staslebedenko / gist:d16a34006dd7f79bb41d2f5d93043f58
Created August 27, 2019 18:03
Deployment slot functionality comparison
╔══════════════════════════════╦═════════════════════════════╗
║ Classic App Service plans ║ Serverless plans ║
╠══════════════════════════════╬═════════════════════════════╣
║ Up go 4(20) deployment slots ║ 1 deployment slot ║
║ Traffic redirect ║ ---- ║
║ Slot specific settings ║ Slot specific settings ║
║ Application IP range shared ║ Application IP range shared ║
║ SSL binding ║ SSL binding ║
╚══════════════════════════════╩═════════════════════════════╝
@staslebedenko
staslebedenko / gist:69a99991d3f1af7fa305c1d1f0c4a6c3
Last active August 26, 2019 12:46
Azure cli for function app with staging slot
location=northeurope
functionsGroupName=atom-serverless-2019
az group create --name $functionsGroupName --location $location
functionsStorAccName=atomserv2019
storageAccountSku=Standard_LRS
az storage account create --name $functionsStorAccName --location $location \
--resource-group $functionsGroupName --sku $storageAccountSku