Azure Data Explorer plugin for Grafana dashboards

Are you using Azure Data Explorer to query vast amounts of data? Are you following business metrics and KPIs with Grafana dashboards? Creating a Grafana data source with Azure Data Explorer has never been easier.

Grafana is a leading open source software designed for visualizing time series analytics. It is an analytics and metrics platform that enables you to query and visualize data and create and share dashboards based on those visualizations. Combining Grafana’s beautiful visualizations with Azure Data Explorer’s snappy ad hoc queries over massive amounts of data, creates impressive usage potential.

The Grafana and Azure Data Explorer teams have created a dedicated plugin which enables you to connect to and visualize data from Azure Data Explorer using its intuitive and powerful Kusto Query Language. In just a few minutes, you can unlock the potential of your data and create your first Grafana dashboard with Azure Data Explorer.

Once you build an Azure Data Explorer data source in Grafana, you can create a dashboard panel and select Edit to add your query.

Kusto Query Language is available for executing queries in the Metrics tab. The built-in intellisense which proposes query term completion, assists in query formulation. You run the query to visualize the data.

GithubEvent
| where Repo.name has 'Microsoft'
| summarize TotalEvents = count() by bin(CreatedAt,30d)
|order by CreatedAt asc

For more details on visualizing data from Azure Data Explorer in Grafana please visit our documentation, “Visualize data from Azure Data Explorer in Grafana.” It depicts the step-by-step process needed to set up Azure Data Explorer as a data source for Grafana, and then visualizes data from a sample cluster.

Next steps

In this blog, we depict the benefits of using Grafana for building dashboards on top of your Azure Data Explorer datasets. Additional connectors and plugins to analytics tools and services will be added in the weeks to come. Stay tuned for more updates.

To find out more about Azure Data Explorer you can:

Try Azure Data Explorer in preview now.
Find pricing information for Azure Data Explorer.
Access documentation for Azure Data Explorer.

Quelle: Azure

Microsoft Azure obtains Korea-Information Security Management System (K-ISMS) certification

Microsoft helps organizations all over the world comply with national, regional, and industry-specific regulatory requirements. These requirements are aimed at securing and protecting the data of individuals, establishments, and critical technology infrastructures. Azure meets the broadest set of international and industry-specific compliance standards, and we’ve added another country-specific compliance offering to our extensive portfolio with the K-ISMS.

The K-ISMS certification was introduced by the Korea Internet and Security Agency (KISA) and is designed to ensure the security and privacy of data in the region through a stringent set of control requirements. Achieving this certification means Azure customers in South Korea can more easily demonstrate adherence to local legal requirements for protection of key digital information assets and meet KISA compliance standards more easily.

KISA established the K-ISMS to safeguard the information technology infrastructure within Korea. This helps organizations implement and operate information security management systems that facilitate effective risk management and enable them to apply best practice security measures.

This framework is built on successful information security strategies and policies, as well as security counter measures and threat response procedures to minimize the impact of any security breaches. These requirements have a significant overlap with ISO27001/2 control objectives but are not identical.

The K-ISMS certification is overseen by the Korean Ministry of Science and Information Technology (MSIT) and is authorized and governed by Article 47 of the country’s Network Act. To obtain it, a company must undergo an assessment by an auditor that covers both management processes and data security procedures which includes one hundred and four criteria that are evaluated. Some of these include examination of the organization’s security management responsibilities, security policies, security training, incident response, risk management, and more. A special committee examines the results of the audit and grants the certification.

Microsoft is the industry leader in proactively pursuing international, national, and industry certifications and attestations. As a result the Azure is uniquely positioned to help you meet your compliance obligations, regardless of the industry or geographic location in which your organization does business.

Learn more about Microsoft’s compliance offerings by visiting the Microsoft Trust Center.
Quelle: Azure

Get Go-ing with Cloud Functions: Go 1.11 is now a supported language

Since releasing Node.js and Python as supported languages for Google Cloud Functions this summer, our team has been hard at work. Today, we’re excited to announce support for Go on Cloud Functions.Now in beta, the runtime uses the latest version, Go 1.11, which includes new language features like modules for integrating third-party dependencies into your code. Starting today, you can write Go functions that scale dynamically in response to load and integrate seamlessly with Google Cloud events.Two ways to GoLet’s take a look at the two types of functions that you can use with Cloud Functions: HTTP functions and background functions.HTTP functions are what their name suggests: functions that are invoked by HTTP requests. They follow the http.HandlerFunc type from the standard library. For example, an HTTP function that returns a caller’s IP address might look like this:HTTP functions can be reached without an additional API gateway layer—Cloud Functions gives you an HTTPS URL. After the function is deployed, you can invoke the function by entering the URL into your browser.In contrast, background functions are triggered in response to an event. Your function might, for example, run every time the contents of a Cloud Storage bucket change. Let’s look at an example function that triggers when a file is added to a Cloud Storage bucket:When you deploy your function, you also indicate a specific Cloud Storage bucket. Every time a new file appears in that bucket, your function runs and logs the file’s name.These are just two small examples of what’s possible with Cloud Functions and Go. The runtime supports a rich ecosystem of Go packages via Go modules. For example, to use the Cloud Translation client library in your function, create a `go.mod` file by running the following commands:When you deploy your function, Cloud Functions fetches and installs the dependencies listed in your `go.mod` file.Using Cloud Functions, you can build serverless application backends, real-time data processing pipelines, chatbots, and video or image analysis tools, just to name a few. Now, you can also use the familiar building blocks of Go to build out your Cloud Functions.We’re continuously making improvements to Cloud Functions. For instance, environment variables are now generally available and we added new IAM security controls. We hope you’re excited to try the Go runtime. To get started, check out the Go quickstart.
Quelle: Google Cloud Platform

Azure Marketplace new offers – Volume 29

We continue to expand the Azure Marketplace ecosystem. From December 1 to December 15, 2018, 60 new offers successfully met the onboarding criteria and went live. See details of the new offers below:

Virtual machines

ArcSight Enterprise Security Manager (ESM): Using thousands of device and application connectors, ArcSight Enterprise Security Manager by Micro Focus collects, correlates, and reports on security event data, providing a central point for analysis of business operations.

Aviatrix Secure Networking Platform Bundle – PAYG: Quickly build use case-driven solutions for multi-cloud encrypted peering, inter-region encrypted peering, next-generation global transit networks, and more.

Aviatrix Secure Networking Platform SSLVPN – PAYG: Quickly build use case-driven solutions for SSL VPNs with multi-factor authentication and Security Assertion Markup Language (SAML) for user access to the cloud.

FatPipe SD-WAN for Azure: FatPipe for Azure allows you to connect your Azure virtual private cloud to your FatPipe SD-WAN overlay and run any of your licensed FatPipe features inside Azure.

GigaSECURE Cloud 5.5,00: GigaSECURE Cloud delivers intelligent network traffic visibility for workloads running in Azure and enables increased security, operational efficiency, and scale across virtual networks.

GigaSECURE Cloud 5.5.00 – Hourly (100 pack): GigaSECURE Cloud delivers intelligent network traffic visibility for workloads running in Azure and enables increased security, operational efficiency, and scale across virtual networks.

IBM Business Process Manager Express Edition 8.5: IBM Business Process Manager is ideal for development, test, and production infrastructure, and installs in just a few minutes. You also gain access to a dedicated support team from MidVision to help you get up and running.

IBM Business Process Manager Express Edition 8.6: IBM Business Process Manager is ideal for development, test, and production infrastructure, and installs in just a few minutes. You also gain access to a dedicated support team from MidVision to help you get up and running.

IBM Business Process Manager Standard Edition 8.5: IBM Business Process Manager is ideal for development, test, and production infrastructure, and installs in just a few minutes. You also gain access to a dedicated support team from MidVision to help you get up and running.

IBM Business Process Manager Standard Edition 8.6: IBM Business Process Manager is ideal for development, test, and production infrastructure, and installs in just a few minutes. You also gain access to a dedicated support team from MidVision to help you get up and running.

IBM Security Access Manager: IBM Security Access Manager enforces risk-based access policies that provide minimal friction during authentication when the user is known and stronger, multi-factor authentication if the risk is elevated.

Resource Central – Meeting Room Booking System: This meeting scheduling software for Outlook and Office 365 lets you search for suitable meeting rooms. Find the right rooms based on categories such as video conferencing or room capacity.

Web applications

Ansible: This solution template will install a Red Hat Ansible instance on a Linux virtual machine, along with tools configured to work with Azure.

Glasswall FileTrust™ for Email: Glasswall FileTrust for Email offers deep-file inspection, remediation, and sanitization technology (d-FIRST™), which reverses legacy methodologies of blocking "known bad" items by ensuring all files follow a standard of "known good."

Jumbune Enterprise-Accelerating BigData Analytics: Jumbune is an enterprise-class Big Data application performance accelerator and data quality tool for HDInsight. It offers proactive cluster monitoring, which complements distribution-specific monitoring tools.

Meridix Live Streaming Platform: Meridix makes it easy to broadcast like the pros. Stream your live sports and events from anywhere, complete with HD video, audio, scores, and stats. Get started with a smartphone or tablet, or up your game using laptops, camcorders, and more.

Nubeva Prisms: Nubeva Prisms is an advanced, easy-to-use, and affordable solution to get cloud packets to monitoring tools and services, enabling greater visibility and control for cloud operations.

Refinitiv Deployed TRIT: Get Refinitiv Deployed TRIT by Thomson Reuters in the Azure Marketplace.

SARA: The servicing assessment and repair appraisal calculator (SARA) by Avtopro is a web service aimed at insurance companies, service stations, and businesses with a large car fleet. SARA makes it quick to calculate the cost of auto parts.

Container solutions

Elasticsearch 5 Alpine Container with Antivirus: Deploy an enterprise-ready container for Elasticsearch 5 on Alpine. Elasticsearch is a search engine based on the Lucene library.

Gosu Secured Ubuntu Container with Antivirus: Deploy an enterprise-ready container for Gosu on Ubuntu. Gosu is a general-purpose programming language built on top of a Java virtual machine. Gosu’s syntax will allow you to write fewer lines of code to accomplish the same task.

MySQL 5.5 Secured Ubuntu Container with Antivirus: Deploy an enterprise-ready container for MySQL 5.5 on Ubuntu. MySQL is a popular open-source relational SQL database management system.

MySQL 5.7 Secured Ubuntu Container with Antivirus: Deploy an enterprise-ready container for MySQL 5.7 on Ubuntu. MySQL is a popular open-source relational SQL database management system.

Node 6 Secured Alpine Container with Antivirus: Deploy an enterprise-ready container for Node 6 on Alpine. Node.js is an open-source, cross-platform JavaScript runtime environment for developing a variety of tools and applications.

Node 10 Secured Alpine Container with Antivirus: Deploy an enterprise-ready container for Node 10 on Alpine. Node.js is an open-source, cross-platform JavaScript runtime environment for developing a variety of tools and applications.

Node 10 Secured Ubuntu Container with Antivirus: Deploy an enterprise-ready container for Node 10 on Ubuntu Bionic. Node.js is an open-source, cross-platform JavaScript runtime environment for developing a variety of tools and applications.

OpenJDK Secured Alpine 3.7 Container – Antivirus: Deploy an enterprise-ready container for OpenJDK on Alpine 3.7. OpenJDK is an open-source implementation of the Java Standard Edition platform with contributions from Oracle and the open Java community.

OpenJDK Secured Alpine3.8 Container with Antivirus: Deploy an enterprise-ready container for OpenJDK on Alpine 3.8. OpenJDK is an open-source implementation of the Java Standard Edition platform with contributions from Oracle and the open Java community.

Redis 3.2 Secured Alpine Container with Antivirus: Deploy an enterprise-ready container for Redis 3.2 on Alpine. Redis is an open-source, networked, and in-memory data structure server used as a database, cache, and message broker.

Redis 4.0 Secured Alpine Container with Antivirus: Deploy an enterprise-ready container for Redis 4.0 on Alpine. Redis is an open-source, networked, and in-memory data structure server used as a database, cache, and message broker.

Redis 4.0 Secured Ubuntu Container with Antivirus: Deploy an enterprise-ready container for Redis 4.0 on Ubuntu. Redis is an open-source, networked, and in-memory data structure server used as a database, cache, and message broker.

Redis 5.0 RC Secured Alpine Container – Antivirus: Deploy an enterprise-ready container for Redis 5.0 RC on Alpine. Redis is an open-source, networked, and in-memory data structure server used as a database, cache, and message broker.

Ruby 2.3 Secured Alpine 3.7 Container – Antivirus: Deploy an enterprise-ready container for Ruby 2.3 on Alpine 3.7. Ruby is a dynamic, object-oriented general-purpose programming language that supports multiple programming paradigms.

Ruby 2.3 Secured Alpine 3.8 Container – Antivirus: Deploy an enterprise-ready container for Ruby 2.3 on Alpine 3.8. Ruby is a dynamic, object-oriented general-purpose programming language that supports multiple programming paradigms.

Ruby 2.4 Secured Alpine Container with Antivirus: Deploy an enterprise-ready container for Ruby 2.4 on Alpine. Ruby is a dynamic, object-oriented general-purpose programming language that supports multiple programming paradigms.

Ruby 2.6RC Secured alpine 3.7 Container-Antivirus: Deploy an enterprise-ready container for Ruby 2.6RC on Alpine 3.7. Ruby is a dynamic, object-oriented general-purpose programming language that supports multiple programming paradigms.

Ruby 2.6RC Secured alpine 3.8 Container-Antivirus: Deploy an enterprise-ready container for Ruby 2.6RC on Alpine 3.8. Ruby is a dynamic, object-oriented general-purpose programming language that supports multiple programming paradigms.

Secured Alpine 3.7 Container with Antivirus: Deploy an enterprise-ready container for Alpine 3.7 on Ubuntu. Alpine Linux is a Linux distribution based on musl and Busybox, primarily designed for power users who appreciate security, simplicity, and resource efficiency.

Secured Alpine 3.8 Container with Antivirus: Deploy an enterprise-ready container for Alpine 3.8 on Ubuntu. Alpine Linux is a Linux distribution based on musl and Busybox, primarily designed for power users who appreciate security, simplicity, and resource efficiency.

Secured OpenJDK on Ubu jre8 Container – Antivirus: Deploy an enterprise-ready container for OpenJDK on Ubuntu JRE 8. OpenJDK is an open-source implementation of the Java Standard Edition platform with contributions from Oracle and the open Java community.

Secured Python on Ubuntu Container with Antivirus: Deploy an enterprise-ready container for Python on Ubuntu. Python's built-in data structures, combined with dynamic typing and dynamic binding, make it attractive for rapid application development.

Consulting services

App Innovation: 1 Day Assessment: In this assessment, you'll work with Dootrix's expert team to build a customized road map to deliver a modern app experience. We will help you utilize the power and groundbreaking services of Microsoft Azure.

Azure Active Directory 3 Day Security Assessment: FMT Consultants will provide a thorough security assessment of your Office 365 environment by evaluating your business’s security controls and identifying gaps that may be prone to cyber threats.

Azure back-up and DR workshop – 2.5 days: Acora's team will review your on-premises or cloud environment in order to provide a recommended approach for migrating to Azure Backup and Azure Site Recovery.

Azure Migration: 2.5 day Workshop: Acora will review your technical capability and readiness for a migration to Azure, then provide recommendations on the cost, resources, and time needed to move with minimal downtime.

Azure Onboarding Services: 1-Day Implementation: In this implementation, CDW will provide initial Azure tenant configuration and best-practice approaches to deploying virtual machines.

Azure PaaS: 1 Hour Briefing: After this briefing by Dootrix, you will come away with a deeper understanding of the benefits of utilizing Azure Platform-as-a-Service for your business and how to implement a PaaS strategy within your organization.

Azure Readiness: 1 Day Assessment: This one-day review by Atech Support, either on-site or via a video call, will cover Azure readiness, machine properties, virtual machine Azure sizing, an estimate of monthly costs, and a recommendations document for migration.

Cloud Accelerator (Cloudamize): 4 Week Assessment: BUI’s Cloud Accelerator Assessment provides high-precision, data-driven analytics combined with powerful automation, enabling clients to make accurate cloud decisions faster and easier.

Cognitive Services: 1 Hour Briefing: This briefing by Dootrix focuses on Azure Cognitive Services and the practical applications of AI technology in a range of high-performance apps.

DC Migration Solution: 1-Week Implementation: The Cloud Factory will help you move the right areas of your IT infrastructure into Microsoft Azure, creating either a public-cloud footprint or a hybrid-cloud footprint based on your goals and requirements.

DevOps In Azure : 1 Hour Briefing: This DevOps masterclass briefing by Dootrix focuses on our approach of implementing Azure DevOps services for your business. The range of developer tools will allow you to plan smarter, collaborate better, and ship faster.

End-to-End Core Insurance System: 2-hours Briefing: The Faktor-Zehn suite is your end-to-end core insurance solution in the cloud, running on Azure Web Apps as well as on an Azure Kubernetes cluster. Model your products centrally and make them available to all modules.

FastStart | App Innovation: 6 – Wk Workshop: Marquam has developed this program to support organizations that want to maximize productivity by leveraging the latest Microsoft technologies, including Azure Bot Service and Azure Cognitive Services.

Finance & Optimisation Azure: 3 Day Assessment: Atech Support will conduct a comprehensive analysis of your current spending on cloud infrastructure and provide a report detailing optimization recommendations.

Innovation Sprint: 5 Day Workshop: Sprints are useful starting points when kicking off a new feature, workflow, product, or business, or when solving problems with an existing product. This sprint by Dootrix allows us to tackle business issues in a short, focused time frame.

Protera FlexBridge: 1-Day Self-Service Assessment: Plan for your SAP migration to Azure with Protera’s self-service custom migration assessment. The Protera FlexBridge Migration Platform helps customers migrate by reducing costs and complexity.

Stortech BaaS/DR-4week Implementation: The backup archive disaster recovery solution that StorTech offers customers is a full implementation of Azure services. The engagement involves an on-site consultation, cloud reference architecture design, migration, and testing.

Windows 08 SQL Database Migration 1 Day Assessment: Atech Support will perform an on-premises SQL workload assessment, provide a plan for a phased approach to the migration, identify compatibility issues, and provide recommendations for storage, security, and more.

Zerto to Azure: 10-Week Implementation: The Zerto to Azure integration provides protection from disasters by publishing data to Azure and ensuring processes are restored with tight recovery time objective (RTO) and recovery point objective (RPO) configurations.

Quelle: Azure