Microsoft Azure
Kainos achieves Kubernetes on Microsoft Azure advanced specialisation
Kainos, a leading provider of digital services and platforms, is one of the first Microsoft partners in the UK to achieve Kubernetes on Microsoft Azure Advanced Specialisation.   This new status further builds on the exceptional relationship Kainos has built with Microsoft, who in 2018 named Kainos as its UK Partner of the Year.   The recognition…
Kainos and NHS Digital utilise Kubernetes to help create a digital front door for the NHS
The Kainos Cloud capability has been helping customers undertake rapid transformation at scale for over 20 years, including landmark projects like the UK’s Government’s Register to Vote service which enabled millions of citizens to join the electoral register.  In recent years the emergence of container orchestration platforms – in particular Kubernetes – has ushered in…
Microsoft OpenHack DevOps Paris
Wrap up from the OpenHack event in Paris
Azure Search: Conclusion (part 3 of 3)
This post picks up where my previous post ‘Using Azure Search’ left off. Azure Search can be manually deployed through the Azure portal.
Azure Search: Using Azure Search (part 2 of 3)
In this section I will describe the basics of how to use Azure Search through the REST API.
Azure search: Introduction (part 1 of 3)
Azure Search is a search-as-a-service cloud solution which provides an API to allow developers to integrate powerful search functionality.
Securing your secrets using Azure Key Vault and Virtual Machine Managed Identity
In this, I will be detailing the process of implementing a secure use of Key Vault with this virtual machine and how Identity Management can be used to retrieve secrets.
Azure Managed Identities
Keeping credentials safe and secure has always been a priority, even more so when in the cloud.
Azure Action Groups – What are they?
Action Groups within Azure are a group of notification preferences and/or actions which are used by both Azure Monitor and service alerts.
Azure Network Security Groups: 10 suggestions for best practice!
As mentioned in a previous blog – NSG’s control access by permitting or denying network traffic in a number of ways.