Azure

Using dependency injection with Azure .NET SDK

Register your Azure clients the proper way

I love how the Azure SDKs have evolved over the years. In the past, there was no consistency between the various Azure SDKs. However, that's not longer the case (at least for most Azure libraries), as they now adhere to the same principles and follow a set of well-defined guidelines.

Read more...

Effortlessly Configure GitHub Repositories for Azure Deployment via OIDC

Scripting your Azure-Ready GitHub Repository using Azure and GitHub CLI

What if we could script the creation and configuration of a GitHub Repository so that it is ready to provision or deploy Azure resources from a GitHub Actions pipeline? We will do that in this article using the Azure CLI and GitHub CLI.

Read more...

Deploying to Azure from Azure DevOps without secrets

Azure DevOps Workload identity federation (OIDC) with Pulumi

If you are deploying your application to Azure from Azure Pipelines, you might want to leverage the ability to do so without using secrets thanks to Workload identity federation. In this article, I will demonstrate how to automate the configuration of your Azure DevOps project, with everything pre-configured to securely deploy applications to Azure.

Read more...

Create an Azure-Ready GitHub Repository using Pulumi

Using Azure OpenID Connect with Pulumi in GitHub Actions

Creating an application and deploying it to Azure is not complicated. You write some code on your machine, do some clicks in the Azure portal, or run some Azure CLI commands from your terminal and that's it: your application is up and running in Azure.

Read more...

When Pulumi met Nuke: a .NET love story

Pushing an ASP.NET Core API to Azure using .NET from provisioning to deployment

Today is a great time to be a developer:

Read more...

How to provision an Azure SQL Database with Active Directory authentication

Using Pulumi and its command provider to grant database permissions

In this article, we will talk about how to provision an Azure SQL Database with authentication restricted to Active Directory users/groups/applications. We will use Pulumi to do that.

Read more...

Pulumi with an Azure Blob Storage backend

Pulumi without Pulumi Service.

By default when you use Pulumi, the state is managed by Pulumi Service which is very convenient as you can concentrate on building your project infrastructure instead of spending time on where to store the state and how to handle concurrency. However, sometimes for governance or pricing concerns, or any other reasons, you don't want to use Pulumi Service and you prefer to manage the state yourself with your own backend. In this article, we will see how we can do that using Azure.

Read more...

Week 39, 2021 - Tips I learned this week

Azure emulators, Use my current account Edge extension, Azure icons in Visio, and Azure Charts.

This week is mainly about learning Azure tooling.

Read more...

ASP.NET Core - Lost in configuration

How should you use configuration providers in ASP.NET Core?

Have you ever felt a bit overwhelmed by the configuration in a project, not knowing where to look for the settings between the command line parameters, the environment variables, the configuration files in code, the configuration in Azure, ... ? When developing an ASP.NET Core application there are many places where you can put your configuration which makes it difficult to know where you should put it. Even if the official documentation about configuration in ASP.NET Core is very complete and well written, it only describes what you can use and how to use it, not what you should use and when. In this article, I will try to answer these questions and give you my opinion about how we should use configuration providers in ASP.NET Core.

Read more...

AzureWebJobsStorage, the secret you don't need in your Function App.

If you are using Azure Functions chances are you are using the setting AzureWebJobsStorage in your Function App configuration. And it is quite likely that the value of this setting which is a secret is stored in a non-secured way directly in your Function App configuration, available to anyone who has access to this configuration. But do not worry, we will see in this article how we can make your Function App more secure by removing this secret.

Read more...