<?xml version="1.0" encoding="UTF-8"?>







<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
	<channel>
		<title>Microsoft Tech Community - Latest Blogs - </title>
		<link>https://techcommunity.microsoft.com</link>
		<description>
			
			
		</description>
				<item>
				<title>Introducing SOC Optimization API</title>
					<link>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-soc-optimization-api/ba-p/4176966</link>
					<description>&lt;P&gt;&lt;A href=&quot;https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/soc-optimization-unlock-the-power-of-precision-driven-security/ba-p/4130589&quot; target=&quot;_self&quot;&gt;SOC optimization&lt;/A&gt; is a new feature designed to combine the power of out of the box content with the flexibility of the SIEM to help you optimize your SOC processes and coverage to your organization’s specific needs, priorities, threats and environment. The first phase of this new feature helps you gain deep insights into your data usage patterns and coverage gaps against specific threats. It provides actionable recommendations to tighten your ingestion rates for data that doesn&#39;t provide security value, leverage correctly the data the does and improve your current coverage based on the threat landscape. You can learn more about the feature with the following resources.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Documentation: &lt;A href=&quot;https://learn.microsoft.com/azure/sentinel/soc-optimization/soc-optimization-access?tabs=azure-portal&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;SOC optimization overview&lt;/A&gt; ; &lt;A href=&quot;https://learn.microsoft.com/azure/sentinel/soc-optimization/soc-optimization-reference&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Recommendation’s logic&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Short overview and demo: &lt;A href=&quot;https://www.youtube.com/watch?v=b0rbPZwBuc0&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;SOC optimization Ninja show&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In dept webinar: &lt;A href=&quot;https://www.youtube.com/watch?v=Uk9x60grT-o&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;Manage your data, costs and protections with SOC optimization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this blog, we will focus on the API usage for SOC optimization. That’s right, if you didn’t know, there is an API available for you to interact with programmatically.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size=&quot;5&quot; color=&quot;#2356EF&quot;&gt;&lt;STRONG&gt;The API&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Having an API for the SOC optimization feature is crucial for several reasons. We aim to unlock the power of precision-driven security and empower security teams through API with flexibility in automation, integration, customization, scalability and real-time access to SOC optimization data.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Refer to the &lt;A href=&quot;https://github.com/Azure/azure-rest-api-specs/blob/main/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2024-01-01-preview/Recommendations.json&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Swagger specification&lt;/A&gt; and &lt;A href=&quot;https://github.com/Azure/azure-rest-api-specs/tree/main/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2024-01-01-preview/examples/recommendations&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;examples&lt;/A&gt; to learn more about the API.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;Swagger.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595140iCB77F17A1FA86811/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;Swagger.png&quot; alt=&quot;Swagger.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size=&quot;5&quot; color=&quot;#2356EF&quot;&gt;Use cases&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;There are numerous scenarios where the SOC optimization API can be utilized. Here are some key use cases:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;You can build custom reports and dashboards, for example, with Workbooks, Power BI, and other reporting tools. The &lt;A href=&quot;https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-microsoft-sentinel-optimization-workbook/ba-p/3901489&quot; target=&quot;_blank&quot;&gt;Sentinel Optimization workbook&lt;/A&gt; has been updated with recommendation data via the API.&lt;/LI&gt;
&lt;LI&gt;Integrate with third-party tools such as SOAR, ITSM, or any other applications that need to integrate with recommendations programmatically.&lt;/LI&gt;
&lt;LI&gt;The API allows real-time access to SOC Optimization data. Security teams can retrieve up-to-date recommendations, trigger evaluations if needed, and respond promptly to the suggestions. Recommendations are calculated every 24 hours, and with the API you’re always up to date.&lt;/LI&gt;
&lt;LI&gt;For customers or MSSPs managing multiple environments, the API provides a scalable way to handle recommendations across multiple workspaces.&lt;/LI&gt;
&lt;LI&gt;You can export the data from the API and store it externally for audit, archiving, or tracking trends.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size=&quot;3&quot;&gt;&lt;EM&gt;&lt;FONT color=&quot;#CF3600&quot;&gt;“We consider this feature as a valuable source of data for us and the customers we protect, it speeds up many tasks for us and provides meaningful insights we can act upon. The API and the reporting that it enables improves our efficiency and accuracy and reduces manual effort for custom reporting, thus reducing our costs and providing a better fidelity of service. “&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size=&quot;2&quot;&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color=&quot;#CF3600&quot;&gt;Clive Watson – Solution Director, Quorum Cyber&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size=&quot;3&quot;&gt;&lt;EM&gt;&lt;FONT color=&quot;#CF3600&quot;&gt;&lt;STRONG&gt;&lt;FONT size=&quot;5&quot; color=&quot;#2356EF&quot;&gt;Available actions&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Below is a summary of the API actions and sample their sample responses.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. &lt;STRONG&gt;Get recommendations&lt;/STRONG&gt;&lt;EM style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;Use this action to list all the recommendations in your workspace.&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/recommendations&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;GET-recommendations.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595144iF7F7D7D7A0EF129C/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;GET-recommendations.png&quot; alt=&quot;GET-recommendations.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. &lt;STRONG&gt;Get recommendation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;This allows you to get a specific recommendation by id. The id can be obtained from the previous action.&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;GET /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/recommendations/{recommendationId}&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;GET-recommendation.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595142iFD968232031F641C/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;GET-recommendation.png&quot; alt=&quot;GET-recommendation.png&quot; /&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3. &lt;STRONG&gt;Patch recommendation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;This allows you to update the status of a recommendation. For example, mark a recommendation as in progress, completed, dismissed or reactivate a recommendation.&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;Supported values when configuring the state property are ‘Active’, ‘InProgress’, ‘Dismissed’, ‘CompletedByUser’ and ‘CompletedBySystem’&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;PATCH /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/recommendations/{recommendationId}&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;Patch.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595145iC204A24D1C86C57F/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;Patch.png&quot; alt=&quot;Patch.png&quot; /&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;4. &lt;STRONG&gt;Reevaluate&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;recommendation&lt;/STRONG&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;Use this action to manually trigger the evaluation for a recommendation.&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;POST /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.OperationalInsights/workspaces/{workspaceName}/providers/Microsoft.SecurityInsights/recommendations/{recommendationId}&lt;/EM&gt; &lt;EM&gt;/triggerEvaluation&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&lt;FONT size=&quot;2&quot; color=&quot;#1460AA&quot;&gt;&lt;EM&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;Reevaluate.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595147i593F9BD4542400C0/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;Reevaluate.png&quot; alt=&quot;Reevaluate.png&quot; /&gt;&lt;/span&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style=&quot; padding-left : 30px; &quot;&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size=&quot;3&quot;&gt;&lt;EM&gt;&lt;FONT color=&quot;#CF3600&quot;&gt;&lt;STRONG&gt;&lt;FONT size=&quot;5&quot; color=&quot;#2356EF&quot;&gt;Sample workbook&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;If you need a sample for reference or to get started, you can refer to the Microsoft Sentinel Optimization Workbook as mentioned earlier. Install the workbook from the content hub, save the template, and launch the workbook. You will find the ‘SOC Optimization’ tab that visualizes the data based on the SOC optimization API.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;OptimizationWorkbook1.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595148i7025B5C26203E953/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;OptimizationWorkbook1.png&quot; alt=&quot;OptimizationWorkbook1.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Expand the items under ‘Details’ to drill down into each optimization type. Below are sample screenshots for ‘data value optimization’ and ‘threat-based optimization’ from the workbook.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;OptimizationWorkbook2.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595149iB43ABADA740633F7/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;OptimizationWorkbook2.png&quot; alt=&quot;OptimizationWorkbook2.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;OptimizationWorkbook3.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595150i17E279E4FF201542/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;OptimizationWorkbook3.png&quot; alt=&quot;OptimizationWorkbook3.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit the workbook to check the parameters defined for SOC optimization (at the top of the workbook) and see how each visualization is built.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;OptimizationWorkbookParam.png&quot; style=&quot;width: 656px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595151i64D0A80FAA462CEC/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;OptimizationWorkbookParam.png&quot; alt=&quot;OptimizationWorkbookParam.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size=&quot;3&quot;&gt;&lt;EM&gt;&lt;FONT color=&quot;#CF3600&quot;&gt;&lt;STRONG&gt;&lt;FONT size=&quot;5&quot; color=&quot;#2356EF&quot;&gt;Customer story&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Below is the case study shared by Quorum Cyber:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;“When we first saw the preview of SOC Optimization the idea resonated with work we already do for customers as their MSSP.&amp;nbsp;We knew that customers would be excited by this level of detail and insight provided and they would ask us questions about this.&amp;nbsp;We were impressed with the API provided from day one, it worked immediately with Sentinel Workbooks, and we were able to almost immediately incorporate new reports on a customer-by-customer basis.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;However, we were really interested in how we could scale this knowledge and be proactive. This is where the API really helped us; we were able to use it to detect all customers with data and bring those insights centrally to report on them.&amp;nbsp;This gave us a few advantages; one was that we could see where a customer had an issue and where we might need to assist.&amp;nbsp;For example, a customer has a warning about zero usage of a table (which you can’t detect otherwise), this helps our on-boarding team and improves our ongoing management, as it’s good to know that a table may have been asked for but isn’t used, or that over time the usage or importance of this may have changed and maybe we can adjust accordingly. &amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Detection coverage is a key part of us being an MSSP, we look to provide threat-led analytic rules to our customers, so having insights from the API on what might be missing and areas to investigate is crucial and looking at that data across customers at scale has given us many invaluable insights.&amp;nbsp;For example, one customer being recommended coverage is important but having many customers with the same recommendation might mean this is a crucial task and we need to adopt the recommendation faster.&amp;nbsp;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;What we also appreciated was the link back to the Microsoft Sentinel GitHub for each analytic and the counts of active vs. available, so not only did we know that there were, for example, eight of 10 active detections deployed, but we had the GUID of that detection to look it up. With that data were able to correlate that GUID to our own GitHub repository to match to any customization we have done to that use case.”&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size=&quot;3&quot;&gt;&lt;FONT color=&quot;#CF3600&quot;&gt;&lt;STRONG&gt;&lt;FONT size=&quot;5&quot; color=&quot;#2356EF&quot;&gt;Summary&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;Get started with the SOC optimization API today. We hope that this detailed walkthrough will help you unlock your use cases via the API.&lt;/P&gt;
&lt;P&gt;Here is a list of useful resources mentioned in the blog:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;API: &lt;A href=&quot;https://microsoftapc-my.sharepoint.com/personal/tatecksi_microsoft_com/Documents/Shared/raw.githubusercontent.com/Azure/azure-rest-api-specs/main/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2024-01-01-preview/Recommendations.json&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;Swagger specification&lt;/A&gt; and &lt;A href=&quot;https://github.com/Azure/azure-rest-api-specs/tree/main/specification/securityinsights/resource-manager/Microsoft.SecurityInsights/preview/2024-01-01-preview/examples/recommendations&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;examples&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Documentation: &lt;A href=&quot;https://learn.microsoft.com/azure/sentinel/soc-optimization/soc-optimization-access?tabs=azure-portal&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;SOC optimization overview&lt;/A&gt; ; &lt;A href=&quot;https://learn.microsoft.com/azure/sentinel/soc-optimization/soc-optimization-reference&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Recommendation’s logic&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Short overview and demo: &lt;A href=&quot;https://www.youtube.com/watch?v=b0rbPZwBuc0&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;SOC optimization Ninja show&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In dept webinar: &lt;A href=&quot;https://www.youtube.com/watch?v=Uk9x60grT-o&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;Manage your data, costs and protections with SOC optimization&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Workbook: &lt;A href=&quot;https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-microsoft-sentinel-optimization-workbook/ba-p/3901489&quot; target=&quot;_blank&quot;&gt;Sentinel Optimization workbook&lt;/A&gt;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/introducing-soc-optimization-api/ba-p/4176966</guid>
                    <dc:creator>Jeremy Tan</dc:creator>
					<pubDate>Thu, 27 Jun 2024 03:04:38 PDT</pubDate>
				</item>
				<item>
				<title>Using Keycloak with Azure AD to integrate AKS Cluster authentication process</title>
					<link>https://techcommunity.microsoft.com/t5/microsoft-developer-community/using-keycloak-with-azure-ad-to-integrate-aks-cluster/ba-p/4174238</link>
					<description>&lt;H2 id=&quot;toc-hId-1252630493&quot;&gt;Introduction&lt;/H2&gt;
&lt;P&gt;Integrating Azure Kubernetes Service (AKS) with Keycloak through Azure Active Directory (Azure AD) as an intermediary leverages Azure AD’s support for OpenID Connect (OIDC) to handle authentication and authorization. This integration enhances security, streamlines user management, and simplifies the authentication process for users accessing the AKS cluster.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId--554823970&quot;&gt;Integrating Azure Kubernetes Service (AKS) with Keycloak through Azure Active Directory (Azure AD) Use case&lt;/H2&gt;
&lt;P&gt;The integration of AKS with Keycloak using Azure AD is highly applicable in all these industries and beyond that prioritize security, scalability, and efficient user management, making it a best practice for organizations leveraging cloud-based Kubernetes environments.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Financial Services:&lt;/STRONG&gt; Securely manage and authenticate thousands of users accessing sensitive financial data and applications hosted on Kubernetes clusters.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Healthcare:&lt;/STRONG&gt; Protect patient data and ensure compliance with healthcare regulations while providing medical staff secure access to applications.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style=&quot;font-family: inherit;&quot;&gt;E-commerce:&lt;/STRONG&gt;&lt;SPAN&gt; Manage a large user base accessing e-commerce platforms and ensure secure transactions and user data protection.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style=&quot;font-family: inherit;&quot;&gt;Technology and Software Development:&lt;/STRONG&gt;&lt;SPAN&gt; Provide developers with secure access to development environments and resources hosted on Kubernetes clusters.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style=&quot;font-family: inherit;&quot;&gt;Education:&lt;/STRONG&gt;&lt;SPAN&gt; Manage access to educational resources and applications for students, faculty, and staff in a secure manner.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_1-1719173123194.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594188iADBD67E80D659179/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_1-1719173123194.png&quot; alt=&quot;sasina_1-1719173123194.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 1: Similar use case architecture.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id=&quot;toc-hId-135737504&quot;&gt;&lt;STRONG&gt;Concept&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;To make this integration possible and effective you should have a clear understanding of the following components, the concept of using Azure AD as an intermediary, and the pre-requisites.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId-125234400&quot;&gt;Understanding the Key Components&lt;BR /&gt;&lt;BR /&gt;&lt;/H2&gt;
&lt;H3 id=&quot;toc-hId-815795874&quot;&gt;What is AKS?&lt;/H3&gt;
&lt;P&gt;Azure Kubernetes Service (AKS) is a managed Kubernetes service that simplifies deploying, managing, and operating Kubernetes clusters in the cloud.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id=&quot;toc-hId--991658589&quot;&gt;What is Keycloak&lt;/H3&gt;
&lt;P&gt;Keycloak is an open-source identity and access management solution that provides features like single sign-on (SSO), identity brokering, and user federation.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id=&quot;toc-hId-1495854244&quot;&gt;What is Azure AD?&lt;/H3&gt;
&lt;P&gt;Azure Active Directory (Azure AD/Microsoft Entra ID) is Microsoft’s cloud-based identity and access management service, which helps users access external resources like Microsoft 365, the Azure portal, and thousands of other SaaS applications.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id=&quot;toc-hId--311600219&quot;&gt;Overview of OIDC&lt;/H3&gt;
&lt;P&gt;OpenID Connect (OIDC) is an identity layer built on top of the OAuth 2.0 protocol, allowing clients to verify the identity of end-users based on the authentication performed by an authorization server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId--322103323&quot;&gt;Why Use Azure AD as an Intermediary?&lt;/H2&gt;
&lt;P&gt;Using Azure AD as an intermediary offers several benefits:&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enhanced Security:&lt;/STRONG&gt; Leverages Azure AD’s robust security features.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Simplified Management:&lt;/STRONG&gt; Centralizes authentication and authorization.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Seamless Integration:&lt;/STRONG&gt; Provides easy integration with Azure services and applications.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId--2129557786&quot;&gt;Pre-requisites for Integration&lt;/H2&gt;
&lt;P&gt;Before starting the integration process, ensure you have:&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Azure AD:&lt;/STRONG&gt; Set up and configured with necessary permissions.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Keycloak:&lt;/STRONG&gt; Configured with a realm ready to be integrated.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;AKS Cluster:&lt;/STRONG&gt; Either existing or a plan to create a new one with Azure AD integration.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_2-1719173123196.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594187i591B7E0FF2C01B84/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_2-1719173123196.png&quot; alt=&quot;sasina_2-1719173123196.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 2: Mian concept&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to the image shown in Figure 2: Main concept, the authentication processes taken place in this concept is Azure Active Directory (Azure AD/Microsoft Entra ID) at the center, and from the right Azure Kubernetes Service requested an authentication and Azure AD will perform OIDC Token Exchange to Keycloak at the left, then Keycloak will perform validation and revert back to Azure AD while, Azure AD respond back to AKS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId-2031724786&quot;&gt;Hands-on (Technical Steps)&lt;/H2&gt;
&lt;P&gt;More technical in these steps and processes, you will find step-by-step guide for seamless Integration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId-224270323&quot;&gt;Register Keycloak as an Application in Azure AD&lt;BR /&gt;&amp;nbsp;&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Create an App Registration in Azure AD:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Navigate to Azure AD and create a new app registration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_29-1719173579174.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594198i946817D8DE0C4304/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_29-1719173579174.png&quot; alt=&quot;sasina_29-1719173579174.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 3: Register Keycloak as an Application in Azure AD -1&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_30-1719173641195.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594199i66B3618D21EBED9F/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_30-1719173641195.png&quot; alt=&quot;sasina_30-1719173641195.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 4: Register Keycloak as an Application in Azure AD -2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Save the Client ID and Client Secret from Azure AD. This information will be needed later in Keycloak.&lt;/P&gt;
&lt;OL start=&quot;2&quot;&gt;
&lt;LI style=&quot; text-align : left; &quot;&gt;&lt;STRONG&gt;Obtain Client ID and Client Secret&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI style=&quot; text-align : left; &quot;&gt;After the registration is complete, go to the app&#39;s overview page and copy the &quot;Application (client) ID&quot;.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Navigate to &quot;Certificates &amp;amp; secrets&quot; and create a new client secret. Copy the value of the client secret as it will not be shown again.&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorsasina_13&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_31-1719173946464.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594200iDC3308301D5E3598/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_31-1719173946464.png&quot; alt=&quot;sasina_31-1719173946464.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 5: Register Keycloak as an Application in Azure AD -3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start=&quot;3&quot;&gt;
&lt;LI&gt;&lt;STRONG&gt;Configure API Permissions:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Go to &quot;API permissions&quot; and add the required Microsoft Graph API permissions. Typically, you need `User.Read` and `openid`, `profile`, and `email` permissions.&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorsasina_14&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_32-1719174004345.png&quot; style=&quot;width: 724px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594201i057BD477920B213C/image-dimensions/724x284?v=v2&quot; width=&quot;724&quot; height=&quot;284&quot; role=&quot;button&quot; title=&quot;sasina_32-1719174004345.png&quot; alt=&quot;sasina_32-1719174004345.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 6: Register Keycloak as an Application in Azure AD -4&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorsasina_17&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_33-1719174062102.png&quot; style=&quot;width: 377px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594202i119BFBE3A1501E58/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_33-1719174062102.png&quot; alt=&quot;sasina_33-1719174062102.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Figure 7: Register Keycloak as an Application in Azure AD -5&lt;/P&gt;
&lt;P&gt;On click Add a permission, the above similar pane will be displayed as shown and you will click on Add permission. Then, after Add permission, you will have similar configuration to the below image.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_34-1719174139536.png&quot; style=&quot;width: 738px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594203iE420DED60FABD877/image-dimensions/738x340?v=v2&quot; width=&quot;738&quot; height=&quot;340&quot; role=&quot;button&quot; title=&quot;sasina_34-1719174139536.png&quot; alt=&quot;sasina_34-1719174139536.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 8: Register Keycloak as an Application in Azure AD -6&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId--1583184140&quot;&gt;Configure Keycloak to Use Azure AD&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Set Up Keycloak:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A href=&quot;https://www.keycloak.org/downloads&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;https://www.keycloak.org/downloads&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;A href=&quot;https://quay.io/repository/keycloak/keycloak&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;https://quay.io/repository/keycloak/keycloak&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Log in to the Keycloak admin console.&lt;/LI&gt;
&lt;LI&gt;Select the realm you want to configure or create a new realm.&lt;BR /&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_35-1719174212915.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594204i907E5E0C3C69FAEC/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_35-1719174212915.png&quot; alt=&quot;sasina_35-1719174212915.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 9: Configure Keycloak to use Azure AD&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL start=&quot;2&quot;&gt;
&lt;LI&gt;&lt;STRONG&gt;Add Azure AD as an Identity Provider:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp; In the left menu, go to &quot;Identity Providers&quot;.&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Click &quot;Add provider&quot; and select &quot;OpenID Connect v1.0&quot;.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Fill in the details:&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Alias: A friendly name for the provider (e.g., AzureAD).&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Display Name: A display name for the login button.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Authorization URL: `&lt;A href=&quot;https://login.microsoftonline.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;https://login.microsoftonline.com/&lt;/A&gt;&amp;lt;tenant-id&amp;gt;/oauth2/v2.0/authorize`&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Token URL: `&lt;A href=&quot;https://login.microsoftonline.com/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;https://login.microsoftonline.com/&lt;/A&gt;&amp;lt;tenant-id&amp;gt;/oauth2/v2.0/token`&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Client ID: The Application (client) ID obtained from Azure AD.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Client Secret: The client secret obtained from Azure AD.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp; Save the configuration.&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start=&quot;3&quot;&gt;
&lt;LI&gt;&lt;STRONG&gt;Import OIDC Metadata:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Go to the Azure AD app registration overview and find the &quot;OpenID Connect metadata document&quot; URL.&lt;/P&gt;
&lt;DIV id=&quot;tinyMceEditorsasina_27&quot; class=&quot;mceNonEditable lia-copypaste-placeholder&quot;&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;sasina_36-1719174379794.png&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/594205iFD9103720E43D91E/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;sasina_36-1719174379794.png&quot; alt=&quot;sasina_36-1719174379794.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Figure 10: Configure Keycloak: In Keycloak, use this URL to import the metadata automatically, which fills out most of the configuration fields.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId-904328693&quot;&gt;Integrate AKS with Azure AD&lt;/H2&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Enable Azure AD Integration When Creating AKS Cluster:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Use the following Azure CLI command to create an AKS cluster with Azure AD integration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;pre class=&quot;lia-code-sample language-bash&quot;&gt;&lt;code&gt;     az aks create \

       --resource-group myResourceGroup \

       --name myAKSCluster \

       --node-count 1 \

       --enable-aad \

       --aad-admin-group-object-ids &amp;lt;admin-group-object-id&amp;gt; \

       --enable-oidc-issuer \

       --oidc-issuer-url &quot;https://&amp;lt;keycloak-server&amp;gt;/auth/realms/&amp;lt;realm&amp;gt;&quot;&lt;/code&gt;&lt;/pre&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; Replace the placeholders with actual values:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; `myResourceGroup`: The resource group name.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; `myAKSCluster`: The AKS cluster name.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; `admin-group-object-id`: The object ID of the Azure AD group that will have admin rights.&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; `oidc-issuer-url`: The URL of the Keycloak OIDC issuer.&lt;/LI&gt;
&lt;/UL&gt;
&lt;OL start=&quot;2&quot;&gt;
&lt;LI&gt;&lt;STRONG&gt;Update Existing AKS Cluster:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp; If you already have an existing AKS cluster, use the following command to enable Azure AD integration:&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;pre class=&quot;lia-code-sample language-bash&quot;&gt;&lt;code&gt;     az aks update \

       --resource-group myResourceGroup \

       --name myAKSCluster \

       --enable-aad \

       --aad-server-app-id &amp;lt;server-app-id&amp;gt; \

       --aad-server-app-secret &amp;lt;server-app-secret&amp;gt; \

       --aad-client-app-id &amp;lt;client-app-id&amp;gt; \

       --aad-tenant-id &amp;lt;tenant-id&amp;gt;&lt;/code&gt;&lt;/pre&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId--903125770&quot;&gt;&lt;STRONG&gt;Outcome&lt;/STRONG&gt;&lt;/H2&gt;
&lt;P&gt;The benefits of successful integration are not limited to the followings:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Streamlined User Management: Centralized user management through Azure AD.&lt;/LI&gt;
&lt;LI&gt;Enhanced Security: Leverages Azure AD’s security features to protect your AKS cluster.&lt;/LI&gt;
&lt;LI&gt;Simplify Security: Using Azure AD’s security features and Keycloak settings to simplifies the authentication process for users&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2 id=&quot;toc-hId-1584387063&quot;&gt;Conclusion&lt;/H2&gt;
&lt;P&gt;We saw in this article how integrating AKS with Keycloak using Azure AD as an intermediary provides a robust and secure authentication solution. In addition, to the above steps, you can use `kubectl` to log into the AKS cluster test the integration, redirecting to the Azure AD login page, and after successful authentication, you should be redirected back to Keycloak if configured correctly. Verify that users have the appropriate roles and permissions in both Azure AD and Keycloak to access the AKS cluster. For troubleshooting, ensure the Client ID, Secret, and URLs are correct, and verify all required permissions and alignment of Keycloak and Azure AD settings and use HTTPS for all communications and regularly review and update access controls and permissions for security. Maintaining the system by keeping all components updated and implementing monitoring tools to track the health and performance of the integration and also, advanced configurations include adjusting claims in Keycloak to meet specific requirements and configuring group memberships according to organizational structure which will be in the next article. By following the steps outlined in this article, you can ensure a seamless and efficient integration process to simplify and enhance app security.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/microsoft-developer-community/using-keycloak-with-azure-ad-to-integrate-aks-cluster/ba-p/4174238</guid>
                    <dc:creator>sasina</dc:creator>
					<pubDate>Thu, 27 Jun 2024 00:00:00 PDT</pubDate>
				</item>
				<item>
				<title>Microsoft Copilot in Azure Series - Copilot Access Management</title>
					<link>https://techcommunity.microsoft.com/t5/itops-talk-blog/microsoft-copilot-in-azure-series-copilot-access-management/ba-p/4176867</link>
					<description>&lt;P&gt;Hello folks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Today, we’re diving into &lt;STRONG&gt;Microsoft Copilot in Azure&lt;/STRONG&gt;. It’s like having a super-smart assistant in the cloud!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It’s an AI-powered tool that’s all about making your life easier when you’re working with Azure, when you’re navigating the Azure portal, or using the Azure mobile app.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, keep in mind, at the time of recording this, Copilot in Azure is still in preview. That means it’s like a sneak peek, and &lt;A href=&quot;https://aka.ms/CopilotInAzure/preview-supplemental-terms&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;there are some extra terms you have to check&lt;/A&gt; out before you jump in.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This Copilot in Azure can be a real lifesaver. It knows a ton about Azure’s services and resources, it also has access to all the information in Azure Resource Graph.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It’s like having a cheat sheet for the cloud. You can ask it questions about your environment, and it’ll give you answers tailored to your own Azure resources, and &lt;STRONG&gt;your &lt;/STRONG&gt;level of access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That means that Microsoft Copilot in Azure will only report on the resources that you &lt;SPAN&gt;have access to.&lt;/SPAN&gt; It can only take the actions that you have permission to perform, and it requires confirmation before making changes to your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It complies with all existing access management rules and protections such as:&lt;/P&gt;
&lt;P&gt;1- Azure role-based access control (Azure RBAC),&lt;/P&gt;
&lt;P&gt;2- Privileged Identity Management,&lt;/P&gt;
&lt;P&gt;3- Azure Policy,&lt;/P&gt;
&lt;P&gt;4- and resource locks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can chat with Copilot right in the Azure portal or on the go with the Azure mobile app. It’s like texting with a friend who can do some of your homework for you. It’ll answer questions, run queries, and even perform tasks for you, all while keeping your organization’s policies in check.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Oh, to use Microsoft Copilot in Azure &lt;SPAN&gt;you might need to have a chat with your network or security admins about a&lt;/SPAN&gt; WebSocket connections to &lt;A href=&quot;https://directline.botframework.com&quot; target=&quot;_blank&quot; rel=&quot;nofollow noopener noreferrer&quot;&gt;https://directline.botframework.com&lt;/A&gt; .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It&#39;s required for Copilot in Azure to work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, Let’s dive into controlling the Access to Microsoft Copilot in Azure.&amp;nbsp;&amp;nbsp;By default, everyone in your tenant gets to play with Copilot in Azure. But, as the Global Administrator, you’ve got the power to manage access. Want to give specific users or groups a sneak peek? No problem!&amp;nbsp; the video below shows you how to control access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;div class=&quot;video-embed-center video-embed&quot;&gt;&lt;iframe class=&quot;embedly-embed&quot; src=&quot;https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FXIUjCOLl43M%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DXIUjCOLl43M&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FXIUjCOLl43M%2Fhqdefault.jpg&amp;amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube&quot; width=&quot;600&quot; height=&quot;337&quot; scrolling=&quot;no&quot; title=&quot;Microsoft Copilot in Azure Series - Copilot Access Management&quot; frameborder=&quot;0&quot; allow=&quot;autoplay; fullscreen; encrypted-media; picture-in-picture;&quot; allowfullscreen=&quot;true&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remember,&amp;nbsp;Copilot in Azure only helps you with the stuff you’re already allowed to touch. So, if you’ve already got access to certain data and resources, “Cool, let’s get to work!” But if it’s locked away from you, or you don’t have rights, Copilot respects that – no sneaking in or anything. It’s all about keeping things above board.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And that’s a wrap on this episode of ITOpsTalk &quot;Using Microsoft Copilot in Azure&quot;! Stay tuned to this channel for more episodes and updates&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Catch you in the cloud!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers!&lt;BR /&gt;&lt;BR /&gt;Pierre&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/itops-talk-blog/microsoft-copilot-in-azure-series-copilot-access-management/ba-p/4176867</guid>
                    <dc:creator>Pierre Roman</dc:creator>
					<pubDate>Thu, 27 Jun 2024 00:00:00 PDT</pubDate>
				</item>
				<item>
				<title>Language in Azure AI prompt flow</title>
					<link>https://techcommunity.microsoft.com/t5/ai-azure-ai-services-blog/language-in-azure-ai-prompt-flow/ba-p/4176899</link>
					<description>&lt;P&gt;&lt;A href=&quot;https://learn.microsoft.com/en-us/azure/ai-studio/how-to/prompt-flow&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Prompt flow in Azure AI Studio&lt;/A&gt; is a development tool designed to streamline the entire development cycle of AI applications powered by Large Language Models (LLMs). Last Ignite, we announced Azure AI Language prompt flow available on &lt;A href=&quot;https://pypi.org/project/promptflow-azure-ai-language/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;GitHub&lt;/A&gt;. Today, we are excited to announce that Azure AI Language tooling is now available in prompt flow natively. With that, you can explore, quickly start to use and fine-tune various natural language processing capabilities from Azure AI Language, reducing your time to valueand deploying solutions with reliable evaluation.&lt;/P&gt;
&lt;P&gt;The Azure AI Language sample flows in Azure AI prompt flow gallery are good starting point for you. You can simply start by cloning one of the two sample flows:&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;YanlingX_0-1719440583037.png&quot; style=&quot;width: 400px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595118i8A005062C3EA27D3/image-size/medium?v=v2&amp;amp;px=400&quot; role=&quot;button&quot; title=&quot;YanlingX_0-1719440583037.png&quot; alt=&quot;YanlingX_0-1719440583037.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Analyze Documents: This flow is designed to analyze and extract insights from textual document input, such as identifying named entities, redacting Personal Identifiable Information (PII), analyzing sentiments, summarizing main points and translating to other languages.&lt;/LI&gt;
&lt;LI&gt;Analyze Conversations: This flow is designed for conversational input and particularly useful for contact center analytics or meeting review, such as summarizing customer issues and resolution, analyzing customer sentiment trend during calls, redacting PII, chaptering long meeting into segments making it easy to navigate and find topics of interest.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then you will see a wizard that guides you to configure tools in your flow, and run, evaluate, and deploy your flow:&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-inline&quot; image-alt=&quot;YanlingX_1-1719440583049.png&quot; style=&quot;width: 400px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595117iE5F22F57419C0351/image-size/medium?v=v2&amp;amp;px=400&quot; role=&quot;button&quot; title=&quot;YanlingX_1-1719440583049.png&quot; alt=&quot;YanlingX_1-1719440583049.png&quot; /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Graph view of your flow&lt;/LI&gt;
&lt;LI&gt;Files in your flow&lt;/LI&gt;
&lt;LI&gt;Azure AI Language tools in the “More tools” dropdown menu, which you can add capabilities that you need for your flow. There are more tools that you can add from LLM, Prompt, and Python menu.&lt;/LI&gt;
&lt;LI&gt;Configure output&lt;/LI&gt;
&lt;LI&gt;Configure steps (or tools) in the flow&lt;/LI&gt;
&lt;LI&gt;Run, evaluate, and deploy your flow&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What’s Next&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We will continue enhancing the underlying capabilities by leveraging state-of-the-art SLMs and LLMs, and enriching prompt flow offerings to further ease your effort in utilizing the best service Azure AI offers.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Learn more about Azure AI Language in the following resources: &lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Azure AI Language homepage: &lt;A href=&quot;https://aka.ms/azure-language&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://aka.ms/azure-language&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure AI Language product documentation: &lt;A href=&quot;https://aka.ms/language-docs&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://aka.ms/language-docs&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure AI Language product demo videos: &lt;A href=&quot;https://aka.ms/language-videos&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://aka.ms/language-videos&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Explore Azure AI Language in Azure AI Studio: &lt;A href=&quot;https://aka.ms/AzureAiLanguage&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://aka.ms/AzureAiLanguage&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Prompt flow in Azure AI Studio: &lt;A href=&quot;https://learn.microsoft.com/en-us/azure/ai-studio/how-to/prompt-flow&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;https://learn.microsoft.com/en-us/azure/ai-studio/how-to/prompt-flow&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;PyPl package (includes general documentation): &lt;A href=&quot;https://pypi.org/project/promptflow-azure-ai-language/&quot; target=&quot;_blank&quot; rel=&quot;noopener nofollow noreferrer&quot;&gt;promptflow-azure-ai-language · PyPI&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure AI Language prompt flow github examples (includes READMEs): &lt;A href=&quot;https://github.com/microsoft/promptflow/tree/main/examples/flows/integrations/azure-ai-language&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;promptflow/examples/flows/integrations/azure-ai-language at main · microsoft/promptflow · GitHub&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/ai-azure-ai-services-blog/language-in-azure-ai-prompt-flow/ba-p/4176899</guid>
                    <dc:creator>YanlingX</dc:creator>
					<pubDate>Wed, 26 Jun 2024 15:24:08 PDT</pubDate>
				</item>
				<item>
				<title>Advanced Network Observability for your Azure Kubernetes Service clusters through Azure Monitor</title>
					<link>https://techcommunity.microsoft.com/t5/azure-observability-blog/advanced-network-observability-for-your-azure-kubernetes-service/ba-p/4176736</link>
					<description>&lt;P&gt;Last year at BUILD we announced &lt;A href=&quot;https://techcommunity.microsoft.com/t5/azure-observability-blog/comprehensive-network-observability-for-aks-through-azure/ba-p/3825852&quot; target=&quot;_blank&quot;&gt;the public preview of the Network Observability add-on&lt;/A&gt;. Today we’re excited to share a massive upgrade to the network observability capabilities available to AKS customers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;What’s new?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;We are excited to announce &lt;EM&gt;Advanced Container Networking Services (ACNS), &lt;/EM&gt;a suite of services built to significantly enhance the operational capabilities of your Azure Kubernetes Service (AKS) clusters. &lt;EM&gt;Advanced Network Observability&lt;/EM&gt; is the inaugural feature of the &lt;EM&gt;ACNS &lt;/EM&gt;suite bringing the power of&amp;nbsp;Hubble’s control plane to both Cilium and Non-Cilium Linux data planes. With &lt;EM&gt;Advanced Network Observability, &lt;/EM&gt;customers can now pinpoint network-related issues with more precision and detect root causes faster.&amp;nbsp;&amp;nbsp;The offering provides pod level packet statistics, DNS statistics, L4 connections and enhanced debugging capabilities with network flow logs and DNS error tracking.&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-center&quot; image-alt=&quot;Data flow for Advanced Network Observability&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595078iAC5106C323CE80F9/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;Data_Flow_ACNS.png&quot; alt=&quot;Data flow for Advanced Network Observability&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Data flow for Advanced Network Observability&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How can Azure customers use the new offering?&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;ACNS is integrated deeply with existing Azure Monitor capabilities for monitoring AKS clusters. Using the new capabilities requires no extra configuration from customers. Customers can enable advanced network observability with a single command. The metrics are then ingested automatically by Azure Monitor managed service for Prometheus. Additionally, customers can visualize the metrics in pre-built dashboards in Azure Managed Grafana. Customers have access to 6 pre-built dashboards in Azure Managed Grafana covering a breadth of signals from cluster traffic to DNS and pod level flows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class=&quot;lia-inline-image-display-wrapper lia-image-align-center&quot; image-alt=&quot;Pod flows dashboard built into Azure Manged Grafana&quot; style=&quot;width: 999px;&quot;&gt;&lt;img src=&quot;https://techcommunity.microsoft.com/t5/image/serverpage/image-id/595034i5BF0A59DEA3A84BB/image-size/large?v=v2&amp;amp;px=999&quot; role=&quot;button&quot; title=&quot;ACNS_Dashboard.png&quot; alt=&quot;Pod flows dashboard built into Azure Manged Grafana&quot; /&gt;&lt;span class=&quot;lia-inline-image-caption&quot; onclick=&quot;event.preventDefault();&quot;&gt;Pod flows dashboard built into Azure Manged Grafana&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;How to get ACNS&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;To get started with ACNS capabilities, please see our &lt;A href=&quot;https://learn.microsoft.com/azure/aks/advanced-network-observability-cli?tabs=non-cilium&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;onboarding documentation&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Read more about ACNS:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Documentation: &lt;A href=&quot;https://learn.microsoft.com/en-us/azure/aks/advanced-container-networking-services-overview&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;What is Advanced Container Networking Services?&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Azure Blog:&amp;nbsp; &lt;A href=&quot;https://azure.microsoft.com/en-us/blog/announcing-advanced-container-networking-services-for-your-azure-kubernetes-service-clusters/&quot; target=&quot;_blank&quot; rel=&quot;noopener noreferrer&quot;&gt;Announcing Advanced Container Networking Services for your Azure Kubernetes Service clusters&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
					<guid>https://techcommunity.microsoft.com/t5/azure-observability-blog/advanced-network-observability-for-your-azure-kubernetes-service/ba-p/4176736</guid>
                    <dc:creator>DalanMendonca</dc:creator>
					<pubDate>Wed, 26 Jun 2024 13:15:57 PDT</pubDate>
				</item>
	</channel>
</rss>
