Book Image

Hands-On Linux Administration on Azure

By : Frederik Vos
Book Image

Hands-On Linux Administration on Azure

By: Frederik Vos

Overview of this book

Azure’s market share has increased massively and enterprises are adopting it rapidly, while Linux is a widely-used operating system and has proven to be one of the most popular workloads on Azure. It has thus become crucial for Linux administrators and Microsoft professionals to be well versed with managing Linux workloads in an Azure environment. With this guide, system administrators will be able to deploy, automate, and orchestrate containers in Linux on Azure. The book follows a hands-on approach to help you understand DevOps, monitor Linux workloads on Azure and perform advanced system administration. Complete with systematic explanations of concepts, examples and self-assessment questions, the chapters will give you useful insights into Linux and Azure. You’ll explore some of Linux’s advanced features for managing multiple workloads and learn to deploy virtual machines (VMs) in Azure. Dedicated sections will also guide you with managing and extending Azure VMs’ capabilities and understanding automation and orchestration with Ansible and PowerShell DSC. In later chapters, you’ll cover useful Linux troubleshooting and monitoring techniques that will enable you to maintain your workload on Azure. By the end of this book, you’ll be able to make the most out of Azure’s services to efficiently deploy and manage your Linux workloads.
Table of Contents (14 chapters)

Chapter 4: Managing Azure

  1. Virtual networks with a
    • Resource Group
    • Vnet
    • Configured subnet
    • Network security group
    • Public IP address
    • Network interface
  1. A storage account to storage diagnostic data and have access to other data store services.
  2. Sometimes (for instance, for a storage account), the name must be unique. A prefix combined with a random generated number is a nice way make the name recognizable and unique.
  3. To define the network that can be used within a virtual network.
  4. To create one or more subnets within the virtual network that can be isolated or routed to each other, without going outside the virtual network.
  5. A network security group provides access control lists for the network and provides port-forwarding to the virtual machines or containers.
  6. Traffic from the virtual machine to the internet is done via Source Network Address Translation (SNAT). This means that...