
Wesley Noordam
Consultant, Azure developer and Azure architect at XPRTZ
Consultant, Azure developer en Azure architect bij XPRTZ
Zutphen, The Netherlands
Actions
Wesley is a Azure Developer and Architect at XPRTZ. In his role as consultant he helps companies in different branches to migrate to Azure, further develop their cloud strategy and improve team performances. Wesley is passionate about good working software and teams. His day to day activities include designing, implementing and optimizing Azure solutions. On the side he also likes to have a good in depth discussion about new tech and ways of working. This is also why he loves to share knowledge and improve his own.
Wesley is een Azure Developer en architect bij XPRTZ. In zijn rol als consultant helpt hij bedrijven in verschillende branches met het migreren naar Azure, doorontwikkelen van hun cloud strategie en het verbeteren van de samenwerking in teams. Wesley is passievol als het goed om goed draaiende software en teams. Dagelijks is hij bezig met het ontwerpen, implementeren en verbeteren van Azure oplossingen. Naast zijn werkzaamheden houdt Wesley ook van het uitproberen en doorgronden van nieuwe technologie en manieren van werken. Dit is dan ook de reden waarom Wesley het leuk vindt om kennis te delen.
Area of Expertise
Topics
Taming the Software Release Dragon: A tale of DevOps Magic en
Join me on a journey through the enchanted forest of software delivery, where brave DevOps adventurers confront the chaos of unreliable releases. Along the way, we’ll uncover common pitfalls that haunt release cycles and discover powerful techniques to transform your process into a trusted, repeatable spell.
Uncover the magic of health checks, automation, observability and many more. This session reveals how DevOps practices enable you to tame the software release dragon. Whether you're a seasoned sorcerer or a curious apprentice, you'll leave with practical enchantments to bring peace and predictability to your kingdom of code.
Leveraging the power of Managed Identity in Azure en
The authentication landscape in Azure has changed a lot. Traditionally applications used certificates, keys, passwords and many other things to be able to connect to external resources. Sometimes these methods still apply and are valid to use, but most of the time they can be insecure and are very annoying to maintain. These days authentication through identity is very popular and makes maintenance a joke.
In this session I will show you what managed identities are, we will have a look into what the difference is between system-assigned and user-assigned identities and we will dive into an example application which leverages managed identities. We will also dive into using managed identities with Azure SQL Server and the quirks you need to think about.
Prevent data breaches: private connections in Azure en
As software developers Initially we all expected to never do so much with networking. With cloud solutions being the go to landing zones most of the time teams are not only responsible for the applications itself, but also the networking. There are multiple resources for networking which all have their own use cases, but how do you really make sure your applications are not publicly available? This is made available with private connections. Private connections are established through the usage of private link and private endpoints.
Do you want your networking to be even more secure and prevent data breaches? In this session I will tell you about the different resources and how to use them. We will discuss why you should use private connections and I'll show you that they are not that complicated when you're familiar with the fundamentals. We will also go through an small architecture in which we will implement private connections.
Creating preconfigured clusters with Azure Kubernetes Service Automatic en
Kubernetes is great for running containerized applications in a automated scalable environment. The addition of AKS makes is even easier to running that same cluster in Azure. Running those AKS clusters became even more powerful with features like Kubernetes Event-driven Autoscaling (KEDA), Workload Identity and integrations with Azure services like Azure Key Vault and Azure Policy. Recently Microsoft also added Azure managed resources for Prometheus and Grafana.
These additions are great, but there is still lots of configuration to do before the cluster is production ready. What if all this configuration is done for you? Microsoft felt the same and thus created Azure Kubernetes Service Automatic. With AKS Automatic you are able to create clusters quick and complete with features you want. Do you want a cluster with monitoring and scaling prebuild? AKS Automatic will do that for you.
In this session we will have a look at the features AKS Automatic has to offer and if it is something you could use.
Basic knowledge of AKS and Azure is required.
Mastering DevOps: Improving application development with a buzzword en
There are lots of different ways to handle application development. The differences in management style of companies will make it even harder to create a 'golden standard'. Most of the time, companies have some sort software development lifecycle (SDLC). This SDLC describes how you should develop applications. The goal of an SDLC is all about delivering good quality software in a short period of time without having to compromise key concepts like security and reliability.
The creation of an SDLC is mostly done with DevOps in mind. Even though DevOps is mostly used by recruiters and mentioned in vacancies, doesn't mean it is just a buzzword. In this session, we will be discussing the true meaning of DevOps and specifically what we can learn from it. We will create our own project and implement our own SDLC with the usage of Azure and Azure DevOps.
Fortresses in Azure simplified: using Network Security Perimeter en nl
In the past, we only needed knowledge about running applications on Windows servers. Networking tasks were handled by 'the networking guys,' and in-depth knowledge was rarely required. Nowadays, running that same application in Azure demands much more. Even though the network gurus are still around, you'll most likely be responsible for at least part of the network. Another option is to opt-out of using Virtual Networks, but that would make your application less secure.
Using Virtual Networks adds complexity, which impacts the required knowledge of engineers. Setting up a well-functioning Virtual Network also requires multiple components. These components most likely include Network Security Groups and Private Endpoints. Simplifying your own virtual network 'fortress' helps teams maintain control. The newly released resource, Network Security Perimeter, is here to help. In this session, we will explore what features NSP offers and how it can help you simplify your Azure network.
Perimeternetwerk in Azure versimpeld: Network Security Perimeter en nl
Vroeger hadden we alleen kennis nodig over het draaien van applicaties op Windows-servers. Netwerktaken werden afgehandeld door ‘de netwerk gurus’, en diepgaande kennis was zelden nodig. Tegenwoordig vraagt het draaien van diezelfde applicatie in Azure om veel meer. Hoewel de netwerkspecialisten er nog steeds zijn, ben je nu waarschijnlijk zelf (deels) verantwoordelijk voor het netwerk. Je kunt er ook voor kiezen om geen gebruik te maken van Virtual Networks, maar dat maakt je applicatie minder veilig.
Het gebruik van Virtual Networks voegt complexiteit toe, wat invloed heeft op de benodigde kennis van engineers. Het opzetten van een goed functionerend Virtual Network vereist meerdere componenten. Denk hierbij aan Network Security Groups en Private Endpoints. Door je eigen virtuele netwerk-‘vesting’ te vereenvoudigen (ook wel perimeter netwerk), help je teams om de controle te behouden. De nieuw geïntroduceerde resource, Network Security Perimeter, kan hierbij helpen. In deze sessie verkennen we welke mogelijkheden NSP biedt en hoe het je kan helpen om je Azure-netwerk te vereenvoudigen.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top