<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Azure &#8211; Made For Cloud</title>
	<atom:link href="https://madeforcloud.com/category/azure/feed/" rel="self" type="application/rss+xml" />
	<link>https://madeforcloud.com</link>
	<description>Just another WordPress site</description>
	<lastBuildDate>Fri, 26 Jan 2024 01:11:21 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Running IBM DB2 database in &#8216;the cloud&#8217;</title>
		<link>https://madeforcloud.com/2024/01/26/running-ibm-db2-database-in-the-cloud/</link>
					<comments>https://madeforcloud.com/2024/01/26/running-ibm-db2-database-in-the-cloud/#respond</comments>
		
		<dc:creator><![CDATA[gocallag]]></dc:creator>
		<pubDate>Fri, 26 Jan 2024 01:11:21 +0000</pubDate>
				<category><![CDATA[AWS]]></category>
		<category><![CDATA[Azure]]></category>
		<guid isPermaLink="false">https://madeforcloud.com/?p=161</guid>

					<description><![CDATA[IBM DB2, in my view, is challenging to use and support due to its complexity compared to other databases. Despite this, some people highly regard it. My experience with it ranges from isolated mainframe deployments to modern distributed versions. AWS AWS now supports DB2 in their RDS family, offering features like provisioning, patching, backup, recovery,&#8230;<p><a class="more-link" href="https://madeforcloud.com/2024/01/26/running-ibm-db2-database-in-the-cloud/" title="Continue reading &#8216;Running IBM DB2 database in &#8216;the cloud&#8217;&#8217;">Continue reading <span class="meta-nav">&#8594;</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>IBM DB2, in my view, is challenging to use and support due to its complexity compared to other databases. Despite this, some people highly regard it. My experience with it ranges from isolated mainframe deployments to modern distributed versions.</p>



<h2 class="wp-block-heading">AWS</h2>



<p>AWS now supports DB2 in their <a href="https://aws.amazon.com/about-aws/whats-new/2023/11/amazon-rds-db2/">RDS </a>family, offering features like provisioning, patching, backup, recovery, and failure detection. They’ve also introduced <a href="https://aws.amazon.com/about-aws/whats-new/2024/01/amazon-rds-db2-cross-region-automated-backups/">Cross Region automated backups</a>, beneficial for DB2 databases used as corporate systems of record. AWS’s Data Migration Services now <a href="https://aws.amazon.com/about-aws/whats-new/2023/12/aws-dms-amazon-relational-database-service-db2-target-endpoint/">support </a>DB2, offering full load and Change Data Capture migration modes. </p>



<p>In my view, AWS offers the best cloud integration for IBM DB2.</p>



<h2 class="wp-block-heading">AZURE</h2>



<p>Azure offers extensive options for running IBM DB2, focusing more on DB2’s technology rather than simplifying its management. This includes running DB2 HADR options. IBM views Azure as a platform for <a href="https://www.ibm.com/docs/en/db2/11.5?topic=providers-db2-azure">self-managed DB2 applications</a> without much support for deeper cloud integration. Azure and its partners are skilled in managing complex DB2 workloads, including transitioning Z/OS based workloads to a cloud architecture based on <a href="https://learn.microsoft.com/en-us/azure/virtual-machines/workloads/mainframe-rehosting/ibm/deploy-ibm-db2-purescale-azure">purescale</a>.</p>



<h2 class="wp-block-heading">Summary</h2>



<p>IBM DB2 is a complex, non-trivial database with different versions for distributed systems and Z/OS. It’s been battle-tested through extensive enterprise use. Now, AWS offers simplified database management, while Azure and AWS allow re-platforming from on-premises or mainframe to the cloud. It’s important to consider costs, including hidden ones in maintaining custom solutions. The addition of cloud-based DB2 solutions provides more options for organizations.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://madeforcloud.com/2024/01/26/running-ibm-db2-database-in-the-cloud/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Azure Credentials for Ansible</title>
		<link>https://madeforcloud.com/2019/11/24/azure-credentials-for-ansible/</link>
					<comments>https://madeforcloud.com/2019/11/24/azure-credentials-for-ansible/#comments</comments>
		
		<dc:creator><![CDATA[gocallag]]></dc:creator>
		<pubDate>Sun, 24 Nov 2019 03:42:16 +0000</pubDate>
				<category><![CDATA[Ansible]]></category>
		<category><![CDATA[Ansible Tower]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[Red Hat]]></category>
		<guid isPermaLink="false">https://madeforcloud.com/?p=72</guid>

					<description><![CDATA[So, you need Ansible to connect to Azure. Congrats, Ansible is awesome for managing Azure resources. The Ansible team has already put together a scenario on how to integrate Ansible with Azure over at https://docs.ansible.com/ansible/latest/scenario_guides/guide_azure.html The section &#8216;Authenticating with Azure&#8216; sounds like the right place, but you can&#8217;t use your AD username / password from&#8230;<p><a class="more-link" href="https://madeforcloud.com/2019/11/24/azure-credentials-for-ansible/" title="Continue reading &#8216;Azure Credentials for Ansible&#8217;">Continue reading <span class="meta-nav">&#8594;</span></a></p>]]></description>
										<content:encoded><![CDATA[
<p>So, you need Ansible to connect to Azure.   Congrats,  Ansible is awesome for managing Azure resources.   The Ansible team has already put together a scenario on how to integrate Ansible with Azure over at <a href="https://docs.ansible.com/ansible/latest/scenario_guides/guide_azure.html">https://docs.ansible.com/ansible/latest/scenario_guides/guide_azure.html</a>   </p>



<p>The section &#8216;<strong>Authenticating with Azure</strong>&#8216; sounds like the right place, but you can&#8217;t use your AD username / password from Ansible because you turned on 2FA &#8211;  You turned it on RIGHT?  So the option left to you is to create a Service Principal (SP).</p>



<p><strong>Note:  having 2FA on your account is what you should be doing, so don&#8217;t turn it off.</strong></p>



<p>It&#8217;s quite simple to create a credential for Ansible to use when connecting to Azure.  Simply, fire up the Cloud Shell  (awesome feature BTW Microsoft) and create a Service Principal (SP).</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://madeforcloud.com/wp-content/uploads/2019/11/AzureCloudShell-1024x133.png" alt="" class="wp-image-73"/></figure>



<p>But <span style="text-decoration: underline;">Hang On</span>,  what is a Service Principal?  The Ansible guide refers you to the Azure documentation over at <a href="https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal">https://docs.microsoft.com/en-us/azure/active-directory/develop/howto-create-service-principal-portal</a>  which you will read, and if you&#8217;re like me,  you&#8217;ll wonder what you actually just read.   Have no fear.  As I mentioned above you can use a simple Azure CLI command (via the Cloud Shell you just started) and create the Service Principal.     Think of the Service Principal as a credential an application (in this case Ansible) can use to access the Azure service(s).  </p>



<pre class="wp-block-code"><code>geoff@Azure:~$ az ad sp create-for-rbac --name svc-ansible-azure  # (optional if not specified one will be generated)  --password 'ALovelyComplexPasswor@'
Changing "svc-ansible-azure" to a valid URI of "http://svc-ansible-azure", which is the required format used for service principal names
Creating a role assignment under the scope of "/subscriptions/88888888-4444-4444-4444-cccccccccccc"
  Retrying role assignment creation: 1/36
  Retrying role assignment creation: 2/36
{
  "appId": "appid888-4444-4444-4444-cccccccccccc",
  "displayName": "svc-ansible-azure",
  "name": "http://svc-ansible-azure",
  "password": "password-4444-4444-4444-cccccccccccc",
  "tenant": "tenant88-4444-4444-4444-cccccccccccc"
}
geoff@Azure:~$</code></pre>



<p>If you want to see what that command just did in the Azure portal, head over to the Azure Active Directory -> App registrations blade.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://madeforcloud.com/wp-content/uploads/2019/11/aad.png" alt="" class="wp-image-74"/></figure>



<p>and then you can see the Service Principal you just created.</p>



<figure class="wp-block-image size-large"><img decoding="async" src="https://madeforcloud.com/wp-content/uploads/2019/11/appregistrations.png" alt="" class="wp-image-75"/></figure>



<p>So what do you do with the new credential.</p>



<p>The Ansible Azure scenario guide has a section on what to do, however, it&#8217;s a bit too vague for me.</p>



<h4 class="wp-block-heading">Using Environment Variables</h4>



<p>To pass service principal credentials via the environment, define the following variables:</p>



<ul class="wp-block-list"><li>AZURE_CLIENT_ID</li><li>AZURE_SECRET</li><li>AZURE_SUBSCRIPTION_ID</li><li>AZURE_TENANT</li></ul>



<p>Azure has given me :</p>



<p>&#8220;appId&#8221;: &#8220;appid888-4444-4444-4444-cccccccccccc&#8221;,<br>&#8220;displayName&#8221;: &#8220;svc-ansible-azure&#8221;,<br>&#8220;name&#8221;: &#8220;http://svc-ansible-azure&#8221;,<br>&#8220;password&#8221;: &#8220;password-4444-4444-4444-cccccccccccc&#8221;,<br>&#8220;tenant&#8221;: &#8220;tenant88-4444-4444-4444-cccccccccccc&#8221;</p>



<p>For your sanity,  <br>AZURE_CLIENT_ID ==&gt; appId<br>AZURE_SECRET ==&gt; password<br>AZURE_TENANT ==&gt; tenant</p>



<p>The remaining item, AZURE_SUBSCRIPTION_ID  is exactly that,  you can also get from the Cloud Shell as follows</p>



<pre class="wp-block-code"><code>geoff@Azure:~$ az account list
[
  {
    "cloudName": "AzureCloud",
    "id": "subscrip-4444-4444-4444-cccccccccccc
    "isDefault": true,
.
.
.</code></pre>



<p>In this case AZURE_SUBSCRIPTION_ID ==> id ,   whichever id in your account that is valid for your use case.</p>



<p>If you want to add these credentials into Ansible Tower, simply create a Credential of type <strong>Microsoft Azure Resource Manager </strong>and use the values you&#8217;ve deduced above.   Ansible Tower will automatically translate them into Environment Variables for your Tower template execution.</p>



<p>Enjoy Ansible and Azure!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://madeforcloud.com/2019/11/24/azure-credentials-for-ansible/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
