This document discusses building a next generation SFTP/file transfer solution in Azure using serverless technologies. It proposes using Azure Container Instances to host an SFTP server with Azure Files for the filesystem. A Logic Apps pipeline would stage incoming files in Azure Storage Blobs, trigger virus scanning via an API, and move scanned files. The solution aims to provide a simple, secure alternative to traditional FTP for file-based integration while leveraging cloud-native technologies.
Companies need to communicate and exchange data quickly,easily and securely with their habitats.
SFTP, as a more secure alternative to File Transfer Protocol (FTP) takes place in the Business
which includes security or encryption capabilities.
Companies may also select SFTP to comply with government or trading partner mandates regarding data security.
Lock it Up: TLS for Network Operators
Chris Grundemann (Internet Society)
Transport Layer Security (TLS), the successor to Secure Sockets Layer (SSL), can be used in many applications other than Web browsers. In order to make the Internet more secure, TLS needs to be widely deployed by all kinds of applications across the Internet. In this session, we will help network operators understand how best to support the use of TLS-encrypted applications across their networks and address how operators can best support their networks and users once everything is encrypted.
FTP File Transfer Protocol secure ftp servicesftp wordwide
FTP stands for File Transfer Protocol. https://www.ftpworldwide.com/blog/ FTP is a technique to converse allowing you to move files to and from a server on the internet.
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFiDataWorks Summit
Utilizing Apache NiFi we read various open data REST APIs and camera feeds to ingest crime and related data real-time streaming it into HBase and Phoenix tables. HBase makes an excellent storage option for our real-time time series data sources. We can immediately query our data utilizing Apache Zeppelin against Phoenix tables as well as Hive external tables to HBase.
Apache Phoenix tables also make a great option since we can easily put microservices on top of them for application usage. I have an example Spring Boot application that reads from our Philadelphia crime table for front-end web applications as well as RESTful APIs.
Apache NiFi makes it easy to push records with schemas to HBase and insert into Phoenix SQL tables.
Resources:
https://community.hortonworks.com/articles/54947/reading-opendata-json-and-storing-into-phoenix-tab.html
https://community.hortonworks.com/articles/56642/creating-a-spring-boot-java-8-microservice-to-read.html
https://community.hortonworks.com/articles/64122/incrementally-streaming-rdbms-data-to-your-hadoop.html
"Wi-Fi FTP" stands for "Wireless File Transfer Protocol," and it refers to a method of transferring files wirelessly over a Wi-Fi network. It enables users to exchange files between devices such as computers, smartphones, tablets, and network-attached storage (NAS) devices using the File Transfer Protocol (FTP) protocol, but without the need for physical cables. Here's a detailed explanation of Wi-Fi FTP, along with some relevant tags:Wi-Fi (Wireless Fidelity): Wi-Fi is a wireless networking technology that allows devices to connect to the internet and communicate with each other over a local area network (LAN) without the need for physical cables. Wi-Fi FTP relies on a Wi-Fi network for wireless communication.
FTP (File Transfer Protocol): FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, like the internet or a local network. It has two modes: Active FTP and Passive FTP. Wi-Fi FTP can use either of these modes depending on the network configuration.
File Transfer: The primary purpose of Wi-Fi FTP is to facilitate the transfer of files between devices. Users can upload files from one device to another or download files from a remote device, all without a wired connection.
Wireless Connectivity: Wi-Fi FTP relies on Wi-Fi technology to establish wireless connections between devices. This eliminates the need for physical connectors or cables, making it convenient for file transfers.
Security: Security is a crucial consideration when using Wi-Fi FTP. Tags related to security might include:
Encryption: Data encryption is essential to protect files during transit.
Authentication: Users may need to provide login credentials to access FTP servers.
Firewall: Configuring firewalls to allow FTP traffic is often required.
Secure FTP: Secure FTP protocols like FTPS (FTP Secure) and SFTP (SSH File Transfer Protocol) enhance security during file transfers.
FTP Server: An FTP server is a device or software that stores and manages files for access by other devices or users. Tags related to FTP servers include:
Server Configuration: Setting up and configuring the FTP server.
Server Software: Mentioning specific FTP server software such as FileZilla Server, vsftpd, or ProFTPD.
FTP User Management: Managing users and permissions on the FTP server.
FTP Client: An FTP client is a software application or device used to connect to an FTP server and transfer files. Tags related to FTP clients include:
Client Software: Mentioning specific FTP client software such as FileZilla, Cyberduck, or WinSCP.
Client Configuration: Configuring FTP client settings for connection and file transfer.
File Management: File management includes tasks like organizing, moving, renaming, and deleting files using Wi-Fi FTP.
Device Compatibility: Different devices and operating systems may have varying levels of support for Wi-Fi FTP. Tags related to device compatibility might include:
Mobile Devices: Wi-Fi FTP on smartphones
Apache NiFi - Flow Based Programming MeetupJoseph Witt
These are the slides from the July 11th Meetup in Toronto for the Flow Based Programming meetup group at Lighthouse covering Enterprise Dataflow with Apache NiFi.
This presentation was created as an introduction to the Apache NiFi project; to be followed by “Lab 0” of the “Realtime Event Processing in Hadoop with NiFi, Kafka and Storm” tutorial hosted here: http://hortonworks.com/hadoop-tutorial/realtime-event-processing-nifi-kafka-storm/#section_1
Companies need to communicate and exchange data quickly,easily and securely with their habitats.
SFTP, as a more secure alternative to File Transfer Protocol (FTP) takes place in the Business
which includes security or encryption capabilities.
Companies may also select SFTP to comply with government or trading partner mandates regarding data security.
Lock it Up: TLS for Network Operators
Chris Grundemann (Internet Society)
Transport Layer Security (TLS), the successor to Secure Sockets Layer (SSL), can be used in many applications other than Web browsers. In order to make the Internet more secure, TLS needs to be widely deployed by all kinds of applications across the Internet. In this session, we will help network operators understand how best to support the use of TLS-encrypted applications across their networks and address how operators can best support their networks and users once everything is encrypted.
FTP File Transfer Protocol secure ftp servicesftp wordwide
FTP stands for File Transfer Protocol. https://www.ftpworldwide.com/blog/ FTP is a technique to converse allowing you to move files to and from a server on the internet.
Tracking Crime as It Occurs with Apache Phoenix, Apache HBase and Apache NiFiDataWorks Summit
Utilizing Apache NiFi we read various open data REST APIs and camera feeds to ingest crime and related data real-time streaming it into HBase and Phoenix tables. HBase makes an excellent storage option for our real-time time series data sources. We can immediately query our data utilizing Apache Zeppelin against Phoenix tables as well as Hive external tables to HBase.
Apache Phoenix tables also make a great option since we can easily put microservices on top of them for application usage. I have an example Spring Boot application that reads from our Philadelphia crime table for front-end web applications as well as RESTful APIs.
Apache NiFi makes it easy to push records with schemas to HBase and insert into Phoenix SQL tables.
Resources:
https://community.hortonworks.com/articles/54947/reading-opendata-json-and-storing-into-phoenix-tab.html
https://community.hortonworks.com/articles/56642/creating-a-spring-boot-java-8-microservice-to-read.html
https://community.hortonworks.com/articles/64122/incrementally-streaming-rdbms-data-to-your-hadoop.html
"Wi-Fi FTP" stands for "Wireless File Transfer Protocol," and it refers to a method of transferring files wirelessly over a Wi-Fi network. It enables users to exchange files between devices such as computers, smartphones, tablets, and network-attached storage (NAS) devices using the File Transfer Protocol (FTP) protocol, but without the need for physical cables. Here's a detailed explanation of Wi-Fi FTP, along with some relevant tags:Wi-Fi (Wireless Fidelity): Wi-Fi is a wireless networking technology that allows devices to connect to the internet and communicate with each other over a local area network (LAN) without the need for physical cables. Wi-Fi FTP relies on a Wi-Fi network for wireless communication.
FTP (File Transfer Protocol): FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, like the internet or a local network. It has two modes: Active FTP and Passive FTP. Wi-Fi FTP can use either of these modes depending on the network configuration.
File Transfer: The primary purpose of Wi-Fi FTP is to facilitate the transfer of files between devices. Users can upload files from one device to another or download files from a remote device, all without a wired connection.
Wireless Connectivity: Wi-Fi FTP relies on Wi-Fi technology to establish wireless connections between devices. This eliminates the need for physical connectors or cables, making it convenient for file transfers.
Security: Security is a crucial consideration when using Wi-Fi FTP. Tags related to security might include:
Encryption: Data encryption is essential to protect files during transit.
Authentication: Users may need to provide login credentials to access FTP servers.
Firewall: Configuring firewalls to allow FTP traffic is often required.
Secure FTP: Secure FTP protocols like FTPS (FTP Secure) and SFTP (SSH File Transfer Protocol) enhance security during file transfers.
FTP Server: An FTP server is a device or software that stores and manages files for access by other devices or users. Tags related to FTP servers include:
Server Configuration: Setting up and configuring the FTP server.
Server Software: Mentioning specific FTP server software such as FileZilla Server, vsftpd, or ProFTPD.
FTP User Management: Managing users and permissions on the FTP server.
FTP Client: An FTP client is a software application or device used to connect to an FTP server and transfer files. Tags related to FTP clients include:
Client Software: Mentioning specific FTP client software such as FileZilla, Cyberduck, or WinSCP.
Client Configuration: Configuring FTP client settings for connection and file transfer.
File Management: File management includes tasks like organizing, moving, renaming, and deleting files using Wi-Fi FTP.
Device Compatibility: Different devices and operating systems may have varying levels of support for Wi-Fi FTP. Tags related to device compatibility might include:
Mobile Devices: Wi-Fi FTP on smartphones
Apache NiFi - Flow Based Programming MeetupJoseph Witt
These are the slides from the July 11th Meetup in Toronto for the Flow Based Programming meetup group at Lighthouse covering Enterprise Dataflow with Apache NiFi.
This presentation was created as an introduction to the Apache NiFi project; to be followed by “Lab 0” of the “Realtime Event Processing in Hadoop with NiFi, Kafka and Storm” tutorial hosted here: http://hortonworks.com/hadoop-tutorial/realtime-event-processing-nifi-kafka-storm/#section_1
Data sharing is an essential operation for any business. FTP Worldwide https://www.ftpworldwide.com/affordable-ftp/ has been a trusted leader provide best affordable ftp server to insure that your data is protected and secure 24x7.
1) To show you how to spot an Aspera opportunity ! 2) To outline the Aspera portfolio (Sales overview not technical) 3) To look at the Aspera opportunity from Sharepoint 4) Summary / Q and A / Close – But interaction is welcomed throughout.. 5) But before all of that…. This… 2 AGENDA AND OBJECTIVES
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptxanbesa1
Computer security is the protection that is set up for computer systems and keeps critical information from unauthorized access, theft, or misuse. There are various practices in place that are widely in use, mainly for the protection of computer systems, networks and preventing potential malicious activities. While computer hardware is secured in the same way that sensitive equipment such as lockers and doors are protected, critical information and system access and authorization, on the other hand, are protected through complex security tactics and practices.
File Transfer Protocol (FTP) and Secure FTP (SFTP) are among the most widely used methods for file sharing. Part of the appeal is that they are simple to use and often free or very inexpensive. Typically, organizations get started with FTP because they have an occasional need to send non-sensitive files. The technology works well in these situations, but when used more broadly it can put your business at risk.
In the past, developers have chosen to develop their own content-centric apps from scratch or by leveraging low level libraries. A content repository like Alfresco can save time and cost. Even if you don't choose Alfresco, you should still consider leveraging a standard API like CMIS as much as possible.
Our approach https://www.ftpworldwide.com/ is simple – build extensive expertise in FTP hosting and stay focused on the customer. This comes to life in our philosophy of live customer support. See what some of our customers have to say about our service and support.
Is it time for TLS for SIP-based Voice over IP(VoIP)? At SIPNOC 2014 on June 10, 2014, I spoke about how to secure VOIP communications using TLS and what are both the challenges and benefits.
DANE: The Future of Transport Layer Security (TLS)
Dan York (Internet Society)
If you connect to a “secure” server using TLS/SSL (such as a web server, email server or xmpp server), how do you know you are using the correct certificate? With DNSSEC now being deployed, a new protocol has emerged called “DANE” (“DNS-Based Authentication of Named Entities“), which allows you to securely specify exactly which TLS/SSL certificate an application should use to connect to your site. DANE has great potential to make the Internet much more secure by marrying the strong integrity protection of DNSSEC with the confidentiality of SSL/TLS certificates. In this session, we will explain how DANE works and how you can use it to secure your websites, email, XMPP, VoIP, and other web services.
Discover HDP 2.1: Apache Falcon for Data Governance in HadoopHortonworks
Beginning with HDP 2.1, Hortonworks Data Platform ships with Apache Falcon for Hadoop data governance. Himanshu Bari, Hortonworks senior product manager, and Venkatesh Seetharam, Hortonworks co-founder and committer to Apache Falcon, lead this 30-minute webinar, including:
+ Why you need Apache Falcon
+ Key new Falcon features
+ Demo: Defining data pipelines with replication; policies for retention and late data arrival; managing Falcon server with Ambari
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
More Related Content
Similar to 2019 maug cloud native-serverless sftp solutions v1-0
Data sharing is an essential operation for any business. FTP Worldwide https://www.ftpworldwide.com/affordable-ftp/ has been a trusted leader provide best affordable ftp server to insure that your data is protected and secure 24x7.
1) To show you how to spot an Aspera opportunity ! 2) To outline the Aspera portfolio (Sales overview not technical) 3) To look at the Aspera opportunity from Sharepoint 4) Summary / Q and A / Close – But interaction is welcomed throughout.. 5) But before all of that…. This… 2 AGENDA AND OBJECTIVES
Pros and Cons of Filezilla FTP in case of Secured Enterprise file Transfer.pptxanbesa1
Computer security is the protection that is set up for computer systems and keeps critical information from unauthorized access, theft, or misuse. There are various practices in place that are widely in use, mainly for the protection of computer systems, networks and preventing potential malicious activities. While computer hardware is secured in the same way that sensitive equipment such as lockers and doors are protected, critical information and system access and authorization, on the other hand, are protected through complex security tactics and practices.
File Transfer Protocol (FTP) and Secure FTP (SFTP) are among the most widely used methods for file sharing. Part of the appeal is that they are simple to use and often free or very inexpensive. Typically, organizations get started with FTP because they have an occasional need to send non-sensitive files. The technology works well in these situations, but when used more broadly it can put your business at risk.
In the past, developers have chosen to develop their own content-centric apps from scratch or by leveraging low level libraries. A content repository like Alfresco can save time and cost. Even if you don't choose Alfresco, you should still consider leveraging a standard API like CMIS as much as possible.
Our approach https://www.ftpworldwide.com/ is simple – build extensive expertise in FTP hosting and stay focused on the customer. This comes to life in our philosophy of live customer support. See what some of our customers have to say about our service and support.
Is it time for TLS for SIP-based Voice over IP(VoIP)? At SIPNOC 2014 on June 10, 2014, I spoke about how to secure VOIP communications using TLS and what are both the challenges and benefits.
DANE: The Future of Transport Layer Security (TLS)
Dan York (Internet Society)
If you connect to a “secure” server using TLS/SSL (such as a web server, email server or xmpp server), how do you know you are using the correct certificate? With DNSSEC now being deployed, a new protocol has emerged called “DANE” (“DNS-Based Authentication of Named Entities“), which allows you to securely specify exactly which TLS/SSL certificate an application should use to connect to your site. DANE has great potential to make the Internet much more secure by marrying the strong integrity protection of DNSSEC with the confidentiality of SSL/TLS certificates. In this session, we will explain how DANE works and how you can use it to secure your websites, email, XMPP, VoIP, and other web services.
Discover HDP 2.1: Apache Falcon for Data Governance in HadoopHortonworks
Beginning with HDP 2.1, Hortonworks Data Platform ships with Apache Falcon for Hadoop data governance. Himanshu Bari, Hortonworks senior product manager, and Venkatesh Seetharam, Hortonworks co-founder and committer to Apache Falcon, lead this 30-minute webinar, including:
+ Why you need Apache Falcon
+ Key new Falcon features
+ Demo: Defining data pipelines with replication; policies for retention and late data arrival; managing Falcon server with Ambari
Similar to 2019 maug cloud native-serverless sftp solutions v1-0 (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
3. Reasons FTP-Based File Transfer is still Pervasive
https://solutionsreview.com/data-integration/the-four-most-commonly-used-data-integration-delivery-types/
The File Transfer Protocol was drafted in 1971 for use with the scientific and research network, ARPANET
- https://en.wikipedia.org/wiki/FTPS
5. FTP/File Transfer Administration Headaches
Anonymous Authentication, Directory Traversal Attack and Dridex-based Malware Attacks are some of the most
common security risks for FTP-Based Data Transfer
- https://www.globalscape.com/blog/top-4-ftp-exploits-used-hackers
7. CaaS
Container Platform
PaaS
Application Platform
FaaS
Serverless Platform
IaaS
Infrastructure Platform
Cloud application hosting continuum
More Control of execution environment
Less Agile development & deployment
Less Control of execution environment
More Agile development & deployment
Patching, Management, Deployment Management (Container & Pod) Limitations of Execution environment Cold start, long running process
Curated VM Hosting Curated Orchestration Curated Execution Environment Scale to ‘zero’
IT/Infra focused Value Prop Dev/App Admin focused Value Prop
Challenges
What you get
Technology decisions
11. Azure Container Instances (ACI)
Easily run containers on Azure with a single command
Cloud-scale
container capacity
Hyper-visor
isolation
Start using
containers right away
Azure Container
Instances (ACI)
Azure Container
Registry
Open Service
Broker API (OSBA)
Release
Automation Tools
Azure Kubernetes
Service (AKS)