Home
Programming With Wolfgang
Cancel

Managed DevOps Pools - Identity Assignment Made Easy

This post explains how to securely access Azure resources using managed identities with Azure DevOps pools. This method eliminates the need to store secrets directly in your code, significantly enh...

Inject your Managed DevOps Pool into a VNet

This post explains how to securely access Azure resources by integrating your Azure DevOps pools with a private Azure VNet. This approach eliminates public access to resources like Azure Key Vault,...

Protect your Pipelines with Microsoft Defender for DevOps

This post provides a comprehensive guide on installing and configuring Microsoft Defender for DevOps, based on a recent video exploring the presenter’s learning experience and findings. What is Mi...

Access Private AKS Clusters with Azure Bastion

This post explains how to securely access Azure resources by integrating your Azure DevOps pools with a private Azure VNet. This approach eliminates public access to resources like Azure Key Vault,...

Speaking about Azure DevOps Agent Hosting at MS Tech Summit 2025

I am excited to announce that I will be speaking at MS Tech Summit 2025! My session, titled “From VMs to Managed Pools: Navigating Azure DevOps Agent Hosting,” will be available as VOD and will del...

Custom Agent Images for Azure Managed DevOps Pools

Building and utilizing custom agent images for Azure DevOps Managed Pools offers a powerful and efficient approach to CI/CD. This method provides a flexible and streamlined alternative to tradition...

Secure your Kubernetes Secrets with Azure Key Vault Secrets Provider

This post provides a comprehensive guide on integrating Azure Key Vault secrets with Kubernetes clusters using the Azure Key Vault Secrets Provider extension. This extension allows you to mount sec...

How to use Entra Workload ID in Azure Kubernetes Service

This post provides a comprehensive guide on configuring Entra Workload Identity in Azure Kubernetes Service (AKS) clusters to securely access Azure resources. It explains the authentication workflo...

Secure your AKS Deployments with a private Azure Container Registry

This post explains how to deploy images from a private container registry into a Kubernetes cluster, focusing on enhancing security by preventing internet exposure of resources. The Importance of ...

Article - Successful with .NET Aspire - Core Features for Effective Software Development

My article, “Successful with .NET Aspire: Core Features for Effective Software Development,” is now out in the March 2025 issue of the German “windows .developer” magazine. I am especially excited ...