{"id":1091,"date":"2019-08-07T00:00:00","date_gmt":"2019-08-07T00:00:00","guid":{"rendered":"https:\/\/azure.microsoft.com\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines"},"modified":"2025-06-25T03:56:59","modified_gmt":"2025-06-25T10:56:59","slug":"disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines","status":"publish","type":"post","link":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/","title":{"rendered":"Disaster recovery of Azure disk encryption (V2) enabled virtual machines"},"content":{"rendered":"\n<p class=\"wp-block-paragraph\">Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure. Among these capabilities is <a href=\"https:\/\/docs.microsoft.com\/azure\/security\/azure-security-disk-encryption\">Azure disk encryption<\/a>, designed to help protect and safeguard your data to meet your organizational security and compliance commitments. It uses the industry standard <a href=\"https:\/\/docs.microsoft.com\/windows\/security\/information-protection\/bitlocker\/bitlocker-overview\" target=\"_blank\" rel=\"noopener\">BitLocker Drive Encryption<\/a> for Windows and DM-Crypt for Linux to provide volume encryption for OS and data disks. The solution is integrated with <a href=\"https:\/\/azure.microsoft.com\/documentation\/services\/key-vault\/\">Azure Key Vault<\/a> to help you control and manage disk encryption keys and secrets, and ensures that all data on virtual machine (VM) disks are encrypted both in-transit and at rest while in Azure Storage.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond securing your applications, it is important to have a disaster recovery plan in place to keep your mission critical applications up and running when planned and unplanned outages occur. <a href=\"https:\/\/docs.microsoft.com\/azure\/site-recovery\/site-recovery-overview\" target=\"_blank\" rel=\"noopener\">Azure Site Recovery<\/a> helps orchestrate replication, failover, and recovery of applications running on Azure Virtual Machines so that they are available from a secondary region if you have any outages in the primary region.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Azure Site Recovery now supports disaster recovery of Azure disk encryption (V2) enabled virtual machines without Azure Active Directory application. While enabling replication of your VM for disaster recovery, all the required disk encryption keys and secrets are copied from the source region to the target region in the user context. If the user managing disaster recovery does not have the appropriate permissions, the user can hand over the ready-to-use script to the security administrator to <a href=\"https:\/\/docs.microsoft.com\/azure\/site-recovery\/azure-to-azure-how-to-enable-replication-ade-vms#copy-disk-encryption-keys-to-the-dr-region-by-using-the-powershell-script\" target=\"_blank\" rel=\"noopener\">copy the keys and secrets<\/a> and proceed with configuration.<\/p>\n\n\n\n<figure class=\"wp-block-image has-custom-border\"><img decoding=\"async\" src=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp\" alt=\"Configure disaster recovery for Azure disk encryption (V2) enabled virtual machines\" style=\"border-radius:0px\" title=\"Azure disk encryption (V2)\" \/><\/figure>\n\n\n\n<p class=\"wp-block-paragraph\">This feature currently supports only Windows VMs using managed disks. The support for Linux VMs using managed disks will be available in the coming weeks. This feature is available in <a href=\"https:\/\/aka.ms\/a2a-supported-regions\" target=\"_blank\" rel=\"noopener\">all Azure regions<\/a> where Azure Site Recovery is available. <a href=\"https:\/\/docs.microsoft.com\/azure\/site-recovery\/azure-to-azure-how-to-enable-replication-ade-vms\" target=\"_blank\" rel=\"noopener\">Configure disaster recovery for Azure disk encryption enabled virtual machines<\/a> using Azure Site Recovery today and become both secure and protected from outages.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","_alt_title":"","footnotes":"","msx_community_cta_settings":[]},"categories":[1482,1463,1459],"tags":[],"audience":[3053,3056],"content-type":[1465],"product":[1545,1478],"tech-community":[],"topic":[],"coauthors":[457],"class_list":["post-1091","post","type-post","status-publish","format-standard","hentry","category-management-and-governance","category-migration","category-security","audience-it-decision-makers","audience-it-implementors","content-type-announcements","product-azure-site-recovery","product-key-vault","review-flag-vm-1680286585-143"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Disaster recovery of Azure disk encryption (V2) enabled virtual machines | Microsoft Azure Blog<\/title>\n<meta name=\"description\" content=\"Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Disaster recovery of Azure disk encryption (V2) enabled virtual machines | Microsoft Azure Blog\" \/>\n<meta property=\"og:description\" content=\"Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Azure Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/microsoftazure\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-07T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T10:56:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp\" \/>\n<meta name=\"author\" content=\"Sujay Talasila\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@azure\" \/>\n<meta name=\"twitter:site\" content=\"@azure\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sujay Talasila\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\"},\"author\":[{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/sujay-talasila\/\",\"@type\":\"Person\",\"@name\":\"Sujay Talasila\"}],\"headline\":\"Disaster recovery of Azure disk encryption (V2) enabled virtual machines\",\"datePublished\":\"2019-08-07T00:00:00+00:00\",\"dateModified\":\"2025-06-25T10:56:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\"},\"wordCount\":341,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp\",\"articleSection\":[\"Management and governance\",\"Migration\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\",\"name\":\"Disaster recovery of Azure disk encryption (V2) enabled virtual machines | Microsoft Azure Blog\",\"isPartOf\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp\",\"datePublished\":\"2019-08-07T00:00:00+00:00\",\"dateModified\":\"2025-06-25T10:56:59+00:00\",\"description\":\"Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.\",\"breadcrumb\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog home\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Management and governance\",\"item\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/management-and-governance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Disaster recovery of Azure disk encryption (V2) enabled virtual machines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#website\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"name\":\"Microsoft Azure Blog\",\"description\":\"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.\",\"publisher\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization\",\"name\":\"Microsoft Azure Blog\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"contentUrl\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp\",\"width\":512,\"height\":512,\"caption\":\"Microsoft Azure Blog\"},\"image\":{\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/microsoftazure\",\"https:\/\/x.com\/azure\",\"https:\/\/www.instagram.com\/microsoftdeveloper\/\",\"https:\/\/www.linkedin.com\/company\/16188386\",\"https:\/\/www.youtube.com\/user\/windowsazure\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117\",\"name\":\"shakir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g\",\"caption\":\"shakir\"},\"sameAs\":[\"https:\/\/azure.microsoft.com\"],\"url\":\"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Disaster recovery of Azure disk encryption (V2) enabled virtual machines | Microsoft Azure Blog","description":"Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/","og_locale":"en_US","og_type":"article","og_title":"Disaster recovery of Azure disk encryption (V2) enabled virtual machines | Microsoft Azure Blog","og_description":"Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.","og_url":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/","og_site_name":"Microsoft Azure Blog","article_publisher":"https:\/\/www.facebook.com\/microsoftazure","article_published_time":"2019-08-07T00:00:00+00:00","article_modified_time":"2025-06-25T10:56:59+00:00","og_image":[{"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp","type":"","width":"","height":""}],"author":"Sujay Talasila","twitter_card":"summary_large_image","twitter_creator":"@azure","twitter_site":"@azure","twitter_misc":{"Written by":"Sujay Talasila","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#article","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/"},"author":[{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/sujay-talasila\/","@type":"Person","@name":"Sujay Talasila"}],"headline":"Disaster recovery of Azure disk encryption (V2) enabled virtual machines","datePublished":"2019-08-07T00:00:00+00:00","dateModified":"2025-06-25T10:56:59+00:00","mainEntityOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/"},"wordCount":341,"commentCount":0,"publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp","articleSection":["Management and governance","Migration","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/","name":"Disaster recovery of Azure disk encryption (V2) enabled virtual machines | Microsoft Azure Blog","isPartOf":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage"},"thumbnailUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp","datePublished":"2019-08-07T00:00:00+00:00","dateModified":"2025-06-25T10:56:59+00:00","description":"Choosing Azure for your applications and services allows you take advantage of a wide array of security tools and capabilities. These tools and capabilities help make it possible to create secure solutions on Azure.","breadcrumb":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#primaryimage","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2019\/08\/1a0dd5f4-992b-4d9f-ac4e-6c9c82c1fc7a.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/disaster-recovery-of-azure-disk-encryption-v2-enabled-virtual-machines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog home","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/"},{"@type":"ListItem","position":2,"name":"Management and governance","item":"https:\/\/azure.microsoft.com\/en-us\/blog\/category\/management-and-governance\/"},{"@type":"ListItem","position":3,"name":"Disaster recovery of Azure disk encryption (V2) enabled virtual machines"}]},{"@type":"WebSite","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#website","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","name":"Microsoft Azure Blog","description":"Get the latest Azure news, updates, and announcements from the Azure blog. From product updates to hot topics, hear from the Azure experts.","publisher":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/azure.microsoft.com\/en-us\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#organization","name":"Microsoft Azure Blog","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","contentUrl":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-content\/uploads\/2024\/06\/microsoft_logo.webp","width":512,"height":512,"caption":"Microsoft Azure Blog"},"image":{"@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/microsoftazure","https:\/\/x.com\/azure","https:\/\/www.instagram.com\/microsoftdeveloper\/","https:\/\/www.linkedin.com\/company\/16188386","https:\/\/www.youtube.com\/user\/windowsazure"]},{"@type":"Person","@id":"https:\/\/azure.microsoft.com\/en-us\/blog\/#\/schema\/person\/c702e5edd662b328b49b7e1180cab117","name":"shakir","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g7664e653ea371ce16eaf75e9fa8952c4","url":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9342c7c05bb16548741bc5cd3a3e3b7ee0c8e746844ad2cc582db5beb5514c6f?s=96&d=mm&r=g","caption":"shakir"},"sameAs":["https:\/\/azure.microsoft.com"],"url":"https:\/\/azure.microsoft.com\/en-us\/blog\/author\/shakir\/"}]}},"msxcm_display_generated_audio":false,"msxcm_animated_featured_image":null,"distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"Microsoft Azure Blog","distributor_original_site_url":"https:\/\/azure.microsoft.com\/en-us\/blog","push-errors":false,"_links":{"self":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/comments?post=1091"}],"version-history":[{"count":1,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1091\/revisions"}],"predecessor-version":[{"id":43271,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/posts\/1091\/revisions\/43271"}],"wp:attachment":[{"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/media?parent=1091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/categories?post=1091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tags?post=1091"},{"taxonomy":"audience","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/audience?post=1091"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/content-type?post=1091"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/product?post=1091"},{"taxonomy":"tech-community","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/tech-community?post=1091"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/topic?post=1091"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/azure.microsoft.com\/en-us\/blog\/wp-json\/wp\/v2\/coauthors?post=1091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}