Project Scope
Coverage Scope
Governance, RBAC, Azure Policy, template-based deployment, virtual networking, traffic management, storage, VMs, backup, and monitoring.
Execution Model
Portal, Azure PowerShell, Azure CLI, ARM templates, and Bicep used together instead of relying on one administration path only.
Network Focus
Multi-VNet planning, subnet segmentation, ASG and NSG logic, DNS, peering, Load Balancer, and Application Gateway.
Operations Focus
Storage protection, VM and VMSS administration, Recovery Services Vault, alerting, and query-backed monitoring validation.
Project Overview
This project brings a broad Azure lab into one clear administration project. Instead of showing isolated tasks, it shows how governance, deployment, networking, storage, compute, backup, and monitoring fit together.
The material was reorganized into one project page with consistent terminology, visuals, and structure.
Why This Project Exists
Certification labs often contain useful technical depth but weak portfolio structure. They usually end up as fragmented steps and screenshots rather than one clear project.
This page turns that material into one Azure administration project. It is not meant to present a production migration; it shows broad Azure coverage explored in a structured way.
Platform Coverage
The project spans multiple Azure administration areas and intentionally connects them into one platform view.
Governance and Access
- Management groups used to think about hierarchy and inherited scope.
- RBAC review covering built-in roles and custom permission boundaries for operational access.
- Tags, Azure Policy, remediation, and resource locks used as governance controls rather than optional metadata.
Automation and Provisioning
- Resource creation in the portal followed by template export and JSON review.
- ARM template editing and parameterization to avoid hardcoding environment-specific values.
- Deployment through both Azure PowerShell and Azure CLI, plus Bicep exposure for cleaner declarative authoring.
Networking and Services
- CoreServicesVnet and ManufacturingVnet planning with subnet sizing for present needs and projected growth.
- ASG and NSG usage, DNS zones, virtual network peering, and custom route logic.
- Azure Load Balancer and Application Gateway as the public traffic-management layer.
Data, Compute, and Operations
- Storage account configuration, lifecycle movement, secure blob handling, and Azure file shares.
- Virtual machine deployment, resizing, VM Scale Set autoscaling, and workload review.
- Recovery Services Vault, backup policy understanding, Azure Monitor, alerts, action groups, and query-backed monitoring validation.
What I Implemented
- Reviewed Azure tenant hierarchy and role assignment patterns, including management groups and constrained operational permissions.
- Worked through policy-backed tagging and resource protection so the project reflects governance thinking instead of resource creation only.
- Used exported ARM templates, edited JSON, parameter files, and deployment commands to move from portal actions to repeatable infrastructure execution.
- Planned and documented virtual networks, subnets, DNS, ASG and NSG usage, VNet peering, and traffic-management components.
- Configured storage-oriented controls such as redundancy choice, restricted access, lifecycle rules, blob immutability awareness, and file share handling.
- Covered compute operations through VM deployment, resize actions, VM Scale Set concepts, and scale rules.
- Included recovery and observability work through Recovery Services Vault, backup posture review, Azure Monitor alerting, and query-based validation.
- Reworked the raw lab material into one clear project page with custom visuals and concise technical notes.
Reliability and Administrative Quality
A strong Azure administration project should show more than successful resource creation. It should show that access scope, naming, cleanup, service boundaries, lifecycle behavior, and recovery posture were considered deliberately.
This project reflects that mindset by pairing governance controls with automation, by separating networking and public-entry concerns, and by treating monitoring and backup as baseline responsibilities rather than nice-to-have additions.
The public page leaves out secrets, temporary credentials, and training material.
Testing and Validation
- Checked that governance controls, scope decisions, and metadata requirements were understood before treating the environment as a free-form sandbox.
- Validated template-based workflows by moving from exported portal resources to edited ARM and Bicep-style deployment patterns.
- Reviewed networking logic across subnet planning, DNS, NSG and ASG behavior, peering, and public traffic-management placement.
- Confirmed that storage, compute, backup, and monitoring areas are represented as connected service layers, not as isolated screenshots with no operational meaning.
- Checked that the published page reflects the actual lab work and not just isolated screenshots.
Key Learnings
- Broad cloud-administration work becomes much more convincing when governance, deployment, networking, operations, and validation are presented as one system.
- ARM and Bicep matter most when they reduce manual drift and make changes reproducible, not when they exist only as exported files.
- Networking is easier to explain and defend when address planning, segmentation, peering, DNS, and frontend service entry are mapped together visually.
- Backup and monitoring deserve first-class treatment in portfolio work because they signal operational maturity, not just service familiarity.
- Certification lab work becomes much stronger portfolio material when it is organized as one clear project with defined scope and validation.